Vault - Package Updates
Pinned
Vault
-
[1.12.0]
- Initial version of a totally new package which uses OIDC instead of LDAP
-
[1.13.0]
- Update Vault to 1.15.5
- Full changelog
-
[1.13.1]
- Update Vault to 1.15.6
- Full changelog
-
[1.15.0]
- Update Vault to 1.16.3
- Full changelog
- Update base image to 5.0.0
-
[1.15.2]
- Update Vault to 1.17.1
- Full changelog
-
[1.15.3]
- Update Vault to 1.17.2
- Full changelog
-
[1.15.4]
- Update Vault to 1.17.3
- Full changelog
-
[1.15.5]
- Update Vault to 1.17.4
- Full changelog
-
[1.15.6]
- Update Vault to 1.17.5
- Full changelog
-
[1.15.7]
- Update Vault to 1.17.6
- Full changelog
-
[1.16.0]
- Update Vault to 1.18.0
- Full changelog
-
[1.16.1]
- Update Vault to 1.18.1
- Full changelog
-
[1.16.2]
- Update vault to 1.18.2
- Full Changelog
- raft/snapshotagent (enterprise): upgrade raft-snapshotagent to v0.0.0-20241115202008-166203013d8e
- auth/azure: Update plugin to v0.19.2 [GH-28848]
- core/ha (enterprise): Failed attempts to become a performance standby node are now using an exponential backoff instead of a
- login (enterprise): Return a 500 error during logins when performance standby nodes make failed gRPC requests to the active node. [GH-28807]
- Product Usage Reporting: Added product usage reporting, which collects anonymous, numerical, non-sensitive data about Vault secrets usage, and adds it to the existing utilization reports. See the [docs] for more info [GH-28858]
- secret/pki: Introduce a new value
always_enforce_err
withinleaf_not_after_behavior
to force the error in all circumstances such as CA issuance and ACME requests if requested TTL values are beyond the issuer's NotAfter. [GH-28907] - secrets-sync (enterprise): No longer attempt to unsync a random UUID secret name in GCP upon destination creation.
- ui: Adds navigation for LDAP hierarchical roles [GH-28824]
- website/docs: changed outdated reference to consul-helm repository to consul-k8s repository. [GH-28825]
- auth/ldap: Fixed an issue where debug level logging was not emitted. [GH-28881]
- core: Improved an internal helper function that sanitizes paths by adding a check for leading backslashes
- secret/pki: Fix a bug that prevents PKI issuer field enable_aia_url_templating
- secrets-sync (enterprise): Fixed issue where secret-key granularity destinations could sometimes cause a panic when loading a sync status.
- secrets/aws: Fix issue with static credentials not rotating after restart or leadership change. [GH-28775]
- secrets/ssh: Return the flag
allow_empty_principals
in the read role api when key_type is "ca" [GH-28901] - secrets/transform (enterprise): Fix nil panic when accessing a partially setup database store.
- secrets/transit: Fix a race in which responses from the key update api could contain results from another subsequent update [GH-28839]
- ui: Fixes rendering issues of LDAP dynamic and static roles with the same name [GH-28824]