Vault - Package Updates
Pinned
Vault
-
[1.15.2]
- Update Vault to 1.17.1
- Full changelog
-
-
App Devwrote on Aug 8, 2024, 7:16 AM last edited by Package Updates Aug 8, 2024, 7:17 AM
[1.15.3]
- Update Vault to 1.17.2
- Full changelog
-
[1.15.4]
- Update Vault to 1.17.3
- Full changelog
-
-
[1.15.5]
- Update Vault to 1.17.4
- Full changelog
-
[1.15.6]
- Update Vault to 1.17.5
- Full changelog
-
-
[1.15.7]
- Update Vault to 1.17.6
- Full changelog
-
-
[1.16.0]
- Update Vault to 1.18.0
- Full changelog
-
-
[1.16.1]
- Update Vault to 1.18.1
- Full changelog
-
-
[1.16.2]
- Update vault to 1.18.2
- Full Changelog
- raft/snapshotagent (enterprise): upgrade raft-snapshotagent to v0.0.0-20241115202008-166203013d8e
- auth/azure: Update plugin to v0.19.2 [GH-28848 ]
- core/ha (enterprise): Failed attempts to become a performance standby node are now using an exponential backoff instead of a
- login (enterprise): Return a 500 error during logins when performance standby nodes make failed gRPC requests to the active node. [GH-28807 ]
- Product Usage Reporting: Added product usage reporting, which collects anonymous, numerical, non-sensitive data about Vault secrets usage, and adds it to the existing utilization reports. See the [docs ] for more info [GH-28858 ]
- secret/pki: Introduce a new value
always_enforce_err
withinleaf_not_after_behavior
to force the error in all circumstances such as CA issuance and ACME requests if requested TTL values are beyond the issuer's NotAfter. [GH-28907 ] - secrets-sync (enterprise): No longer attempt to unsync a random UUID secret name in GCP upon destination creation.
- ui: Adds navigation for LDAP hierarchical roles [GH-28824 ]
- website/docs: changed outdated reference to consul-helm repository to consul-k8s repository. [GH-28825 ]
- auth/ldap: Fixed an issue where debug level logging was not emitted. [GH-28881 ]
- core: Improved an internal helper function that sanitizes paths by adding a check for leading backslashes
- secret/pki: Fix a bug that prevents PKI issuer field enable_aia_url_templating
- secrets-sync (enterprise): Fixed issue where secret-key granularity destinations could sometimes cause a panic when loading a sync status.
- secrets/aws: Fix issue with static credentials not rotating after restart or leadership change. [GH-28775 ]
- secrets/ssh: Return the flag
allow_empty_principals
in the read role api when key_type is "ca" [GH-28901 ] - secrets/transform (enterprise): Fix nil panic when accessing a partially setup database store.
- secrets/transit: Fix a race in which responses from the key update api could contain results from another subsequent update [GH-28839 ]
- ui: Fixes rendering issues of LDAP dynamic and static roles with the same name [GH-28824 ]
-
-
[1.16.3]
- Update vault to 1.18.3
- Full Changelog
-
-
[1.16.4]
- Update vault to 1.18.4
- Full Changelog
-
-
[1.16.5]
- Update vault to 1.18.5
- Full Changelog
-
-
[1.17.0]
- Update vault to 1.19.0
- Full Changelog
- raft/snapshotagent (enterprise): upgrade raft-snapshotagent to v0.0.0-20241115202008-166203013d8e
- raft/snapshotagent (enterprise): upgrade raft-snapshotagent to v0.2.0
- api: Add to sys/health whether the node has been removed from the HA cluster. If the node has been removed, return code 530 by default or the value of the
removedcode
query parameter. [GH-28991 ] - api: Add to sys/health whether the standby node has been able to successfully send heartbeats to the active node and the time in milliseconds since the last heartbeat. If the standby has been unable to send a heartbeat, return code 474 by default or the value of the
haunhealthycode
query parameter. [GH-28991 ] - auth/alicloud: Update plugin to v0.20.0 [GH-29613 ]
-
[1.80.0]
- Update base image to 5.0.0
-
-
[1.80.1]
- Update vault to 1.19.1
- Full Changelog
-
-
[1.80.2]
- Update vault to 1.19.2
- Full Changelog
- core: Bump Go version to 1.23.8
- secrets/openldap: Update plugin to v0.15.4 [GH-30279 ]
- secrets/openldap: Prevent static role rotation on upgrade when
NextVaultRotation
is nil. Fixes an issue where static roles were unexpectedly rotated after upgrade due to a missingNextVaultRotation
value. Now sets it to eitherLastVaultRotation + RotationPeriod
ornow + RotationPeriod
. [GH-30265 ] - secrets/pki (enterprise): Address a parsing bug that rejected CMPv2 requests containing a validity field.
- secrets/pki: fix a bug where key_usage was ignored when generating root certificates, and signing certain intermediate certificates. [GH-30034 ]
- secrets/transit: fix a panic when rotating on a managed key returns an error [GH-30214 ]