Vault - Package Updates
-
[1.15.3]
- Update Vault to 1.17.2
- Full changelog
-
[1.15.4]
- Update Vault to 1.17.3
- Full changelog
-
[1.15.5]
- Update Vault to 1.17.4
- Full changelog
-
[1.15.6]
- Update Vault to 1.17.5
- Full changelog
-
[1.15.7]
- Update Vault to 1.17.6
- Full changelog
-
[1.16.0]
- Update Vault to 1.18.0
- Full changelog
-
[1.16.1]
- Update Vault to 1.18.1
- Full changelog
-
[1.16.2]
- Update vault to 1.18.2
- Full Changelog
- raft/snapshotagent (enterprise): upgrade raft-snapshotagent to v0.0.0-20241115202008-166203013d8e
- auth/azure: Update plugin to v0.19.2 [GH-28848]
- core/ha (enterprise): Failed attempts to become a performance standby node are now using an exponential backoff instead of a
- login (enterprise): Return a 500 error during logins when performance standby nodes make failed gRPC requests to the active node. [GH-28807]
- Product Usage Reporting: Added product usage reporting, which collects anonymous, numerical, non-sensitive data about Vault secrets usage, and adds it to the existing utilization reports. See the [docs] for more info [GH-28858]
- secret/pki: Introduce a new value
always_enforce_errwithinleaf_not_after_behaviorto force the error in all circumstances such as CA issuance and ACME requests if requested TTL values are beyond the issuer's NotAfter. [GH-28907] - secrets-sync (enterprise): No longer attempt to unsync a random UUID secret name in GCP upon destination creation.
- ui: Adds navigation for LDAP hierarchical roles [GH-28824]
- website/docs: changed outdated reference to consul-helm repository to consul-k8s repository. [GH-28825]
- auth/ldap: Fixed an issue where debug level logging was not emitted. [GH-28881]
- core: Improved an internal helper function that sanitizes paths by adding a check for leading backslashes
- secret/pki: Fix a bug that prevents PKI issuer field enable_aia_url_templating
- secrets-sync (enterprise): Fixed issue where secret-key granularity destinations could sometimes cause a panic when loading a sync status.
- secrets/aws: Fix issue with static credentials not rotating after restart or leadership change. [GH-28775]
- secrets/ssh: Return the flag
allow_empty_principalsin the read role api when key_type is "ca" [GH-28901] - secrets/transform (enterprise): Fix nil panic when accessing a partially setup database store.
- secrets/transit: Fix a race in which responses from the key update api could contain results from another subsequent update [GH-28839]
- ui: Fixes rendering issues of LDAP dynamic and static roles with the same name [GH-28824]
Hello! It looks like you're interested in this conversation, but you don't have an account yet.
Getting fed up of having to scroll through the same posts each visit? When you register for an account, you'll always come back to exactly where you were before, and choose to be notified of new replies (either via email, or push notification). You'll also be able to save bookmarks and upvote posts to show your appreciation to other community members.
With your input, this post could be even better 💗
Register Login