Vault - Package Updates
-
[1.80.1]
- Update vault to 1.19.1
- Full Changelog
-
[1.80.2]
- Update vault to 1.19.2
- Full Changelog
- core: Bump Go version to 1.23.8
- secrets/openldap: Update plugin to v0.15.4 [GH-30279]
- secrets/openldap: Prevent static role rotation on upgrade when
NextVaultRotation
is nil. Fixes an issue where static roles were unexpectedly rotated after upgrade due to a missingNextVaultRotation
value. Now sets it to eitherLastVaultRotation + RotationPeriod
ornow + RotationPeriod
. [GH-30265] - secrets/pki (enterprise): Address a parsing bug that rejected CMPv2 requests containing a validity field.
- secrets/pki: fix a bug where key_usage was ignored when generating root certificates, and signing certain intermediate certificates. [GH-30034]
- secrets/transit: fix a panic when rotating on a managed key returns an error [GH-30214]
-
[1.80.3]
- Update vault to 1.19.3
- Full Changelog
-
[1.80.4]
- Update vault to 1.19.4
- Full Changelog
- Update vault-plugin-auth-cf to v0.20.1 GH-30586]
- auth/azure: Update plugin to v0.20.4 GH-30543]
- core: Bump Go version to 1.24.3.
- Namespaces (enterprise): allow a root token to relock a namespace
- core (enterprise): update to FIPS 140-3 cryptographic module in the FIPS builds.
- core: Updated code and documentation to support FIPS 140-3 compliant algorithms. GH-30576]
- core: support for X25519MLKEM768 (post quantum key agreement) in the Go TLS stack. GH-30603]
- ui: Replaces all instances of the deprecated event.keyCode with event.key GH-30493]
- core (enterprise): fix a bug where plugin automated root rotations would stop after seal/unseal operations
- plugins (enterprise): Fix an issue where Enterprise plugins can't run on a standby node when it becomes active because standby nodes don't extract the artifact when the plugin is registered. Remove extracting from Vault and require the operator to place the extracted artifact in the plugin directory before registration.
-
[1.80.5]
- Update vault to 1.19.5
- Full Changelog