🛡️ A private certificate authority (X.509 & SSH) & ACME server for secure automated certificate management, so you can use TLS everywhere & SSO for SSH.
We've added a note to the docs about the way the GitHub auth backend works
as it may not be readily apparent that GitHub personal access tokens, which
are used by the backend, can be used for unauthorized access if they are
stolen from third party services and access to Vault is public.
DEPRECATIONS/CHANGES:
Database Plugin Backends: Passwords generated for these backends now
enforce stricter password requirements, as opposed to the previous behavior
of returning a randomized UUID. Passwords are of length 20, and have a A1a-
characters prepended to ensure stricter requirements. No regressions are
expected from this change. (For database backends that were previously
substituting underscores for hyphens in passwords, this will remain the
case.)
Lease Endpoints: The endpoints sys/renew, sys/revoke, sys/revoke-prefix,
sys/revoke-force have been deprecated and relocated under sys/leases.
Additionally, the deprecated path sys/revoke-force now requires the sudo
capability.
Response Wrapping Lookup Unauthenticated: The sys/wrapping/lookup endpoint
is now unauthenticated. This allows introspection of the wrapping info by
clients that only have the wrapping token without then invalidating the
token. Validation functions/checks are still performed on the token.
FEATURES:
Cassandra Storage: Cassandra can now be used for Vault storage
CockroachDB Storage: CockroachDB can now be used for Vault storage
CouchDB Storage: CouchDB can now be used for Vault storage
SAP HANA Database Plugin: The databases backend can now manage users
for SAP HANA databases
Plugin Backends: Vault now supports running secret and auth backends as
plugins. Plugins can be mounted like normal backends and can be developed
independently from Vault.
PROXY Protocol Support Vault listeners can now be configured to honor
PROXY protocol v1 information to allow passing real client IPs into Vault. A
list of authorized addresses (IPs or subnets) can be defined and
accept/reject behavior controlled.
Lease Lookup and Browsing in the Vault Enterprise UI: Vault Enterprise UI
now supports lookup and listing of leases and the associated actions from the
sys/leases endpoints in the API. These are located in the new top level
navigation item "Leases".
Filtered Mounts for Performance Mode Replication: Whitelists or
blacklists of mounts can be defined per-secondary to control which mounts
are actually replicated to that secondary. This can allow targeted
replication of specific sets of data to specific geolocations/datacenters.
Disaster Recovery Mode Replication (Enterprise Only): There is a new
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
- `@dependabot rebase` will rebase this PR
- `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it
- `@dependabot merge` will merge this PR after your CI passes on it
- `@dependabot squash and merge` will squash and merge this PR after your CI passes on it
- `@dependabot cancel merge` will cancel a previously requested merge and block automerging
- `@dependabot reopen` will reopen this PR if it is closed
- `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
- `@dependabot show ignore conditions` will show all of the ignore conditions of the specified dependency
- `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
- `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
- `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
Bumps github.com/hashicorp/vault/api/auth/aws from 0.7.0 to 0.8.0.
Changelog
Sourced from github.com/hashicorp/vault/api/auth/aws's changelog.
... (truncated)
Commits
af63d87
Cut version 0.8.0dbf1b9b
Prep for released2b3f42
docs: MFA usage details (#3133)27b2764
Add an extra sentence to the github warningc3083ab
splitting cache into transactional and non-transactional cache structs (#3132)f2cf43b
docs: API docs for TOTP, Okta and Duo MFA (#3129)6e6bd6e
Bump database plugin protocol versionbe97eee
Add 0.8 guide (#3130)ffc7901
Add plugin backends docs (#3125)d60dd42
API Docs updates (#3101)Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting
@dependabot rebase
.Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show