chore(deps): update dependency hashicorp/vault to v1.19.3 - autoclosed
This MR contains the following updates:
| Package | Update | Change |
|---|---|---|
| hashicorp/vault | minor |
1.17.6 -> 1.19.3
|
Release Notes
hashicorp/vault (hashicorp/vault)
v1.19.3
1.19.3
April 30, 2025
CHANGES:
- auth/jwt: Update plugin to v0.23.2 [GH-30434]
BUG FIXES:
- core (enterprise): fix issue with errors being swallowed on failed HSM logins.
- database: Prevent static roles created in versions prior to 1.15.0 from rotating on backend restart. [GH-30320]
- database: no longer incorrectly add an "unrecognized parameters" warning for certain SQL database secrets config operations when another warning is returned [GH-30327]
- identity: Fix non-deterministic merge behavior when two entities have conflicting local aliases. [GH-30390]
- plugins: plugin registration should honor the
plugin_tmpdirconfig [GH-29978] - secrets/aws: fix a case where GovCloud wasn't taken into account; fix a case where the region setting wasn't respected [GH-30312]
v1.19.2
1.19.2
April 18, 2025
CHANGES:
- core: Bump Go version to 1.23.7
- core: Bump Go version to 1.23.8
- secrets/openldap: Update plugin to v0.15.4 [GH-30279]
BUG FIXES:
- secrets/openldap: Prevent static role rotation on upgrade when
NextVaultRotationis nil. Fixes an issue where static roles were unexpectedly rotated after upgrade due to a missingNextVaultRotationvalue. Now sets it to eitherLastVaultRotation + RotationPeriodornow + RotationPeriod. [GH-30265] - secrets/pki (enterprise): Address a parsing bug that rejected CMPv2 requests containing a validity field.
- secrets/pki: fix a bug where key_usage was ignored when generating root certificates, and signing certain intermediate certificates. [GH-30034]
- secrets/transit: fix a panic when rotating on a managed key returns an error [GH-30214]
v1.19.1
1.19.1
April 4, 2025
Enterprise LTS: Vault Enterprise 1.19 is a Long-Term Support (LTS) release.
CHANGES:
- UI: remove outdated and unneeded js string extensions [GH-29834]
- auth/azure: Update plugin to v0.20.2. Login requires
resource_group_name,vm_name, andvmss_nameto match token claims [GH-30052] - auth/azure: Update plugin to v0.20.3 [GH-30082]
- auth/gcp: Update plugin to v0.20.2 [GH-30081]
- core: Verify that the client IP address extracted from an X-Forwarded-For header is a valid IPv4 or IPv6 address [GH-29774]
- secrets/azure: Update plugin to v0.21.2 [GH-30037]
- secrets/azure: Update plugin to v0.21.3 [GH-30083]
- secrets/gcp: Update plugin to v0.21.2 [GH-29970]
- secrets/gcp: Update plugin to v0.21.3 [GH-30080]
- secrets/openldap: Update plugin to v0.15.2 [GH-30079]
IMPROVEMENTS:
- activity: mount_type was added to the API response of sys/internal/counters/activity [GH-30071]
- activity: mount_type was added to the API response of sys/internal/counters/activity
- core (enterprise): report errors from the underlying seal when getting entropy.
- storage/raft: Upgrade hashicorp/raft library to v1.7.3 which includes additional logging on the leader when opening and sending a snapshot to a follower. [GH-29976]
BUG FIXES:
- auth/aws: fix a panic when a performance standby node attempts to write/update config. [GH-30039]
- auth/ldap: Fix a bug that does not properly delete users and groups by first converting their names to lowercase when case senstivity option is off. [GH-29922]
- auth/ldap: fix a panic when a performance standby node attempts to write/update config. [GH-30039]
- aws/secrets: Prevent vault from rejecting secret role configurations where no regions or endpoints are set [GH-29996]
- core (enterprise): add nil check before attempting to use Rotation Manager operations.
- core: Fix a bug that prevents certain loggers from writing to a log file. [GH-29917]
- identity: reintroduce RPC functionality for group creates, allowing performance standbys to handle external group changes during login and token renewal [GH-30069]
- plugins (enterprise): Fix plugin registration with artifact when a binary for the same plugin is already present in the plugin directory.
- secrets/aws: fix a bug where environment and shared credential providers were overriding the WIF configuration [GH-29982]
- secrets/aws: fix a panic when a performance standby node attempts to write/update config. [GH-30039]
- secrets/db: fix a panic when a performance standby node attempts to write/update config. [GH-30039]
- secrets/pki: Fix a bug that prevents enabling automatic tidying of the CMPv2 nonce store. [GH-29852]
v1.19.0
1.19.0
March 5, 2025
Enterprise LTS: Vault Enterprise 1.19 is a Long-Term Support (LTS) release.
SECURITY:
- raft/snapshotagent (enterprise): upgrade raft-snapshotagent to v0.0.0-20241115202008-166203013d8e
- raft/snapshotagent (enterprise): upgrade raft-snapshotagent to v0.2.0
CHANGES:
- agent/config: Configuration values including IPv6 addresses will be automatically translated and displayed conformant to RFC-5952 §4. [GH-29517]
- api: Add to sys/health whether the node has been removed from the HA cluster. If the node has been removed, return code 530 by default or the value of the
removedcodequery parameter. [GH-28991] - api: Add to sys/health whether the standby node has been able to successfully send heartbeats to the active node and the time in milliseconds since the last heartbeat. If the standby has been unable to send a heartbeat, return code 474 by default or the value of the
haunhealthycodequery parameter. [GH-28991] - auth/alicloud: Update plugin to v0.20.0 [GH-29613]
- auth/azure: Update plugin to v0.19.1 [GH-28712]
- auth/azure: Update plugin to v0.19.2 [GH-28848]
- auth/azure: Update plugin to v0.20.0 [GH-29606]
- auth/azure: Update plugin to v0.20.1 [GH-29728]
- auth/cf: Update plugin to v0.19.1 [GH-29295]
- auth/cf: Update plugin to v0.20.0 [GH-29528]
- auth/gcp: Update plugin to v0.20.0 [GH-29591]
- auth/gcp: Update plugin to v0.20.1 [GH-29736]
- auth/jwt: Update plugin to v0.23.0 [GH-29553]
- auth/kerberos: Update plugin to v0.14.0 [GH-29617]
- auth/kubernetes: Update plugin to v0.21.0 [GH-29619]
- auth/ldap: An error will now be returned on login if the number of entries returned from the user DN LDAP search is more than one. [GH-29302]
- auth/ldap: No longer return authentication warnings to client. [GH-29134]
- auth/oci: Update plugin to v0.18.0 [GH-29620]
- core (enterprise): Add tracking of performance standbys by their HA node ID so that RPC connections can be more easily cleaned up when nodes are removed. [GH-29303]
- core/ha (enterprise): Failed attempts to become a performance standby node are now using an exponential backoff instead of a 10 second delay in between retries. The backoff starts at 2s and increases by a factor of two until reaching the maximum of 16s. This should make unsealing of the node faster in some cases.
- core/raft: Return an error on sys/storage/raft/join if a node that has been removed from raft cluster attempts to re-join when it still has existing raft data on disk. [GH-29090]
- core: Bump Go version to 1.23.6.
- database/couchbase: Update plugin to v0.13.0 [GH-29543]
- database/elasticsearch: Update plugin to v0.17.0 [GH-29542]
- database/mongodbatlas: Update plugin to v0.14.0 [GH-29584]
- database/redis-elasticache: Update plugin to v0.6.0 [GH-29594]
- database/redis: Update plugin to v0.5.0 [GH-29597]
- database/snowflake: Update plugin to v0.13.0 [GH-29554]
- kmip (enterprise): RSA key generation now enforces key sizes of 2048 or higher
- login (enterprise): Return a 500 error during logins when performance standby nodes make failed gRPC requests to the active node. [GH-28807]
- proxy/config: Configuration values including IPv6 addresses will be automatically translated and displayed conformant to RFC-5952 §4. [GH-29517]
- raft/autopilot (enterprise): Alongside the CE autopilot update, update raft-autopilot-enterprise library to v0.3.0 and add enterprise-specific regression testing.
- sdk: Upgrade to go-secure-stdlib/plugincontainer@v0.4.1, which also bumps github.com/docker/docker to v27.2.1+incompatible [GH-28456]
- secrets/ad: Update plugin to v0.20.1 [GH-29648]
- secrets/alicloud: Update plugin to v0.19.0 [GH-29512]
- secrets/aws: The AWS Secrets engine now persists entries to storage between writes. This enables users to not have to pass every required field on each write and to make individual updates as necessary. Note: in order to zero out a value that is previously configured, users must now explicitly set the field to its zero value on an update. [GH-29497]
- secrets/azure: Update plugin to v0.20.1 [GH-28699]
- secrets/azure: Update plugin to v0.21.0 [GH-29639]
- secrets/azure: Update plugin to v0.21.1 [GH-29729]
- secrets/gcp: Update plugin to v0.21.0 [GH-29598]
- secrets/gcp: Update plugin to v0.21.1 [GH-29747]
- secrets/gcpkms: Update plugin to v0.20.0 [GH-29612]
- secrets/kubernetes: Update plugin to v0.10.0 [GH-29592]
- secrets/kv: Update plugin to v0.21.0 [GH-29614]
- secrets/mongodbatlas: Update plugin to v0.14.0 [GH-29583]
- secrets/openldap: Update plugin to v0.14.1 [GH-28479]
- secrets/openldap: Update plugin to v0.14.2 [GH-28704]
- secrets/openldap: Update plugin to v0.14.3 [GH-28780]
- secrets/openldap: Update plugin to v0.14.5 [GH-29551]
- secrets/openldap: Update plugin to v0.15.0 [GH-29605]
- secrets/openldap: Update plugin to v0.15.1 [GH-29727]
- secrets/pki: Enforce the issuer constraint extensions (extended key usage, name constraints, issuer name) when issuing or signing leaf certificates. For more information see PKI considerations [GH-29045]
- secrets/terraform: Update plugin to v0.11.0 [GH-29541]
- server/config: Configuration values including IPv6 addresses will be automatically translated and displayed conformant to RFC-5952 §4. [GH-29228]
- storage/raft: Do not allow nodes that have been removed from the raft cluster configuration to respond to requests. Shutdown and seal raft nodes when they are removed. [GH-28875]
- ui: Partially reverts #20431 and removes ability to download unencrypted kv v2 secret data [GH-29290]
- ui: Upgrade Ember data to v5.3.2 (and minor upgrade of ember-cli, ember-source to v5.8.0) [GH-28798]
FEATURES:
- AWS Secrets Cross-Account Management Support (enterprise): Add support for cross-account management of static roles in AWS secrets engine.
- Automated Root Rotation: A schedule or ttl can be defined for automated rotation of the root credential. [GH-29535]
- Automated Root Rotation: Adds Automated Root Rotation capabilities to the AWS Auth and AWS Secrets plugins. This allows plugin users to automate their root credential rotations based on configurable schedules/periods via the Rotation Manager. Note: Enterprise only. [GH-29497]
- Automated Root Rotation: Adds Automated Root Rotation capabilities to the DB Secrets plugin. This allows plugin users to automate their root credential rotations based on configurable schedules/periods via the Rotation Manager. Note: Enterprise only. [GH-29557]
- Automated Root Rotation: Adds Automated Root Rotation capabilities to the GCP Auth plugin. This allows plugin users to automate their root credential rotations based on configurable schedules/periods via the Rotation Manager. Note: Enterprise only. [GH-29591]
- Automated Root Rotation: Adds Automated Root Rotation capabilities to the GCP Secrets plugin. This allows plugin users to automate their root credential rotations based on configurable schedules/periods via the Rotation Manager. Note: Enterprise only. [GH-29598]
-
Identity De-duplication: Vault can now automatically resolve duplicate
Entities and Groups by renaming them. This feature is disabled by default and
can be enabled through the
force_identity_deduplicationactivation flag. [GH-29356] - Plugins: Allow Enterprise plugins to run externally on Vault Enterprise only.
- Product Usage Reporting: Added product usage reporting, which collects anonymous, numerical, non-sensitive data about Vault feature usage, and adds it to the existing utilization reports. [GH-28858]
- Rotation Manager: Add Rotation Manager to Vault Enterprise Core. The Rotation Manager enables plugin users to automate their root credential rotations based on configurable schedules/periods.
- Skip auto import rotation of static roles (enterprise): The Database secrets engine now allows skipping the automatic rotation of static roles during import.
- Transit Ed25519ph and Ed25519ctx support (Enterprise): Support for signing and verifying Ed25519ph and Ed25519ctx signatures types.
IMPROVEMENTS:
- CLI: adds an optional flag (--fail-if-not-fulfilled) to the renew command, which lets the renew command fail on unfulfillable requests and allows command chaining to allow further executions. [GH-29060]
- audit: Audit logs will contain User-Agent headers when they are present in the incoming request. They are not
HMAC'ed by default but can be configured to be via the
/sys/config/auditing/request-headers/user-agentendpoint. [GH-28596] - auth/approle: seal wrap approle secrets if seal wrap is enabled. [GH-28703]
- auth/cert: Add new configuration option
enable_metadata_on_failuresto add client cert metadata on login failures to audit log and response [GH-29044] - auth/ldap: Adds an option to enable sAMAccountname logins when upndomain is set. [GH-29118]
- auth/okta: update to okta sdk v5 from v2. Transitively updates go-jose dependency to >=3.0.3 to resolve GO-2024-2631. See https://github.com/okta/okta-sdk-golang/blob/master/MIGRATING.md for details on changes. [GH-28121]
- auto-auth/cert: support watching changes on certificate/key files and notifying the auth handler when
enable_reauth_on_new_credentialsis enabled. [GH-28126] - auto-auth: support new config option
enable_reauth_on_new_credentials, supporting re-authentication when receiving new credential on certain auto-auth types [GH-28126] - command/server: Add support for dumping pprof files during startup using CLI option
pprof-dump-dir[GH-27033] - core/identity: Improve performance of loading entities when unsealing by batching updates, caching local alias storage reads, and doing more work in parallel. [GH-29326]
- core: Add
removed_from_clusterfield to sys/seal-status and vault status output to indicate whether the node has been removed from the HA cluster. [GH-28938] - core: Add a mount tuneable that trims trailing slashes of request paths during POST. Needed to support CMPv2 in PKI. [GH-28752]
- core: Add activation flags. A mechanism for users to opt in to new functionality at a convenient time. Previously used only in Enterprise for SecretSync, activation flags are now available in CE for future features to use. [GH-29237]
- core: Added new
enable_post_unseal_traceandpost_unseal_trace_directoryconfig options to generate Go traces during the post-unseal step for debug purposes. [GH-28895] - core: Config reloading on SIGHUP now includes some Raft settings, which are now also present in
/sys/config/state/sanitizedoutput. [GH-29485] - core: add support for reading certain sensitive seal wrap and managed key (enterprise) configuration values from the environment or files. [GH-29402]
- events (enterprise): Send events downstream to a performance standby node only when there is a subscriber on the standby node with a filter matching the events. [GH-29618]
- events (enterprise): Send events downstream to performance standby nodes in a cluster, removing the need to redirect client event subscriptions to the active node. [GH-29470]
- events (enterprise): Use the
pathevent metadata field when authorizing a client'ssubscribecapability for consuming an event, instead of requiringdata_pathto be present in the event metadata. - identity: Added reporting in Vault logs during unseal to help identify any duplicate identify resources in storage. [GH-29325]
- physical/dynamodb: Allow Vault to modify its DynamoDB table and use per-per-request billing mode. [GH-29371]
- raft/autopilot: We've updated the autopilot reconciliation logic (by updating the raft-autopilot dependency to v0.3.0) to avoid artificially increasing the quorum in presence of an unhealthy node. Now autopilot will start the reconciliation process by attempting to demote a failed voter node before any promotions, fixing the issue where Vault would initially increase quorum when faced with a failure of a voter node. In certain configurations, especially when using Vault Enterprise Redundancy Zones and losing a voter then a non-voter in quick succession, this would lead to a loss of quorum and cluster failure. [GH-29306]
- raft/snapshotagent (enterprise): upgrade raft-snapshotagent to v0.0.0-20241003195753-88fef418d705
- sdk/helper: utitilize a randomly seeded cryptographic determinstic random bit generator for RSA key generation when using slow random sources, speeding key generation considerably. [GH-29020]
- sdk: Add Vault build date to system view plugin environment response [GH-29082]
- sdk: Add helpers and CE stubs for plugins to communicate with Rotation Manager (Enterprise). [GH-29273]
- secret/pki: Introduce a new value
always_enforce_errwithinleaf_not_after_behaviorto force the error in all circumstances such as CA issuance and ACME requests if requested TTL values are beyond the issuer's NotAfter. [GH-28907] - secrets(pki): Error if attempt to set a manual chain on an issuer that can't issue any certificate. [GH-29473]
- secrets-sync (enterprise): No longer attempt to unsync a random UUID secret name in GCP upon destination creation.
- secrets-sync (enterprise): add support for user-managed encryption keys in GCP secrets sync destinations.
- secrets/aws: add fallback endpoint and region parameters to sts configuration [GH-29051]
- secrets/pki (enterprise): Add issuer configuration fields which allow disabling specific validations on certificate chains.
- secrets/pki: Add ACME error types to errors encountered during challenge validation. [GH-28678]
- secrets/pki: Add
serial_number_sourceoption to PKI roles to control the source for the subject serial number. [GH-29369] - secrets/pki: Add a CRL entry limit to prevent runaway revocations from overloading Vault, reconfigurable with max_crl_entries on the CRL config. [GH-28654]
- secrets/pki: Add a new set of APIs that allow listing ACME account key ids, retrieving ACME account information along with the associated order and certificate information and updating an ACME account's status [GH-29173]
- secrets/pki: Add a warning when issuers are updated with validations that cause the issuer to be non-functional.
- secrets/pki: Add necessary validation configuration fields to CMPv2 to enable customers with different clients.
- secrets/pki: Complete the set of name constraints parameters by adding permitted_email_addresses, permitted_ip_ranges, permitted_uri_domains, excluded_dns_domains, excluded_email_addresses, excluded_ip_ranges, and excluded_uri_domains; this makes it possible for the name constraints extension to be fully specified when creating root and intermediate CA certificates. [GH-29245]
- secrets/transit: Add support for RSA padding scheme pkcs1v15 for encryption [GH-25486]
- storage/dynamodb: Pass context to AWS SDK calls [GH-27927]
- storage/s3: Pass context to AWS SDK calls [GH-27927]
- ui (enterprise): Allow WIF configuration on the Azure secrets engine. [GH-29047]
- ui (enterprise): Allow WIF configuration on the GCP secrets engine. [GH-29423]
- ui: Add button to copy secret path in kv v1 and v2 secrets engines [GH-28629]
- ui: Add identity_token_key to mount view for the GCP and Azure Secret engines. [GH-28822]
- ui: Add support for the name constraints extension to be fully specified when creating root and intermediate CA certificates. [GH-29263]
- ui: Adds ability to edit, create, and view the Azure secrets engine configuration. [GH-29047]
- ui: Adds ability to edit, create, and view the GCP secrets engine configuration. [GH-29423]
- ui: Adds copy button to identity entity, alias and mfa method IDs [GH-28742]
- ui: Adds navigation for LDAP hierarchical libraries [GH-29293]
- ui: Adds navigation for LDAP hierarchical roles [GH-28824]
- ui: Adds params to postgresql database to improve editing a connection in the web browser. [GH-29200]
- ui: Application static breadcrumbs should be formatted in title case. [GH-29206]
- ui: Replace KVv2 json secret details view with Hds::CodeBlock component allowing users to search the full secret height. [GH-28808]
- website/docs: changed outdated reference to consul-helm repository to consul-k8s repository. [GH-28825]
BUG FIXES:
- UI: Fix missing Client Count card when running as a Vault Dedicated cluster [GH-29241]
- activity: Include activity records from clients created by deleted or disabled auth mounts in Export API response. [GH-29376]
- activity: Show activity records from clients created in deleted namespaces when activity log is queried from admin namespace. [GH-29432]
- agent: Fix chown error running agent on Windows with an auto-auth file sinks. [GH-28748]
- agent: Fixed an issue where giving the agent multiple config files could cause the merged config to be incorrect
when
template_configis set in one of the config files. [GH-29680] - audit: Fixing TestAudit_enableAudit_fallback_two test failure.
- audit: Prevent users from enabling multiple audit devices of file type with the same file_path to write to. [GH-28751]
- auth/ldap: Fixed an issue where debug level logging was not emitted. [GH-28881]
- auth/radius: Fixed an issue where usernames with upper case characters where not honored [GH-28884]
- autosnapshots (enterprise): Fix an issue where snapshot size metrics were not reported for cloud-based storage.
- cli: Fixed a CLI precedence issue where -agent-address didn't override VAULT_AGENT_ADDR as it should [GH-28574]
- core/api: Added missing LICENSE files to API sub-modules to ensure Go module tooling recognizes MPL-2.0 license. [GH-27920]
- core/managed-keys (enterprise): Allow mechanism numbers above 32 bits in PKCS#11 managed keys.
- core/metrics: Fix unlocked mounts read for usage reporting. [GH-29091]
- core/seal (enterprise): Fix bug that caused seal generation information to be replicated, which prevented disaster recovery and performance replication clusters from using their own seal high-availability configuration.
- core/seal (enterprise): Fix problem with nodes unable to join Raft clusters with Seal High Availability enabled. [GH-29117]
- core/seal: Azure seals required client_secret, preventing use of managed service identities and user assigned identities. [GH-29499]
- core/seal: Fix an issue that could cause reading from sys/seal-backend-status to return stale information. [GH-28631]
- core: Fix Azure authentication for seal/managed keys to work for both federated workload identity and managed user identities. Fixes regression for federated workload identities. [GH-29792]
- core: Fix an issue where duplicate identity aliases in storage could be merged inconsistently during different unseal events or on different servers. [GH-28867]
- core: Fix bug when if failing to persist the barrier keyring to track encryption counts, the number of outstanding encryptions remains added to the count, overcounting encryptions. [GH-29506]
- core: Fixed panic seen when performing help requests without /v1/ in the URL. [GH-28669]
- core: Improved an internal helper function that sanitizes paths by adding a check for leading backslashes in addition to the existing check for leading slashes. [GH-28878]
- core: Prevent integer overflows of the barrier key counter on key rotation requests [GH-29176]
- core: fix bug in seal unwrapper that caused high storage latency in Vault CE. For every storage read request, the seal unwrapper was performing the read twice, and would also issue an unnecessary storage write. [GH-29050]
- core: fix issue when attempting to re-bootstrap HA when using Raft as HA but not storage [GH-18615]
- core: revert Azure wrapper that introduced a regression in Azure auth for seals. [GH-29775]
- database/mssql: Fix a bug where contained databases would silently fail root rotation if a custom root rotation statement was not provided. [GH-29399]
- database: Fix a bug where static role passwords are erroneously rotated across backend restarts when using skip import rotation. [GH-29537]
- export API: Normalize the start_date parameter to the start of the month as is done in the sys/counters API to keep the results returned from both of the API's consistent. [GH-29562]
- export API: Normalize the start_date parameter to the start of the month as is done in the sys/counters API to keep the results returned from both of the API's consistent.
- identity/oidc (enterprise): Fix delays in rotation and invalidation of OIDC keys when there are too many namespaces. The Cache-Control header returned by the identity/oidc/.well-known/keys endpoint now depends only on the named keys for the queried namespace. [GH-29312]
- kmip (enterprise): Use the default KMIP port for IPv6 addresses missing a port, for the listen_addrs configuration field, in order to match the existing IPv4 behavior
- namespaces (enterprise): Fix issue where namespace patch requests to a performance secondary would not patch the namespace's metadata.
- plugins: Fix a bug that causes zombie dbus-daemon processes on certain systems. [GH-29334]
- proxy: Fix chown error running proxy on Windows with an auto-auth file sink. [GH-28748]
- sdk/database: Fix a bug where slow database connections can cause goroutines to be blocked. [GH-29097]
- secret/aws: Fixed potential panic after step-down and the queue has not repopulated. [GH-28330]
- secret/db: Update static role rotation to generate a new password after 2 failed attempts. Unblocks customers that were stuck in a failing loop when attempting to rotate static role passwords. [GH-28989]
- secret/pki: Fix a bug that prevents PKI issuer field enable_aia_url_templating to be set to false. [GH-28832]
- secrets-sync (enterprise): Add new parameters for destination configs to specify allowlists for IP's and ports.
- secrets-sync (enterprise): Fixed issue where secret-key granularity destinations could sometimes cause a panic when loading a sync status.
- secrets/aws: Add sts_region parameter to root config for STS API calls. [GH-22726]
- secrets/aws: Fix issue with static credentials not rotating after restart or leadership change. [GH-28775]
- secrets/database: Fix a bug where a global database plugin reload exits if any of the database connections are not available [GH-29519]
- secrets/openldap: Update static role rotation to generate a new password after 2 failed attempts. Unblocks customers that were stuck in a failing loop when attempting to rotate static role passwords. [GH-29131]
- secrets/pki: Address issue with ACME HTTP-01 challenges failing for IPv6 IPs due to improperly formatted URLs [GH-28718]
- secrets/pki: Fix a bug that prevented the full CA chain to be used when enforcing name constraints. [GH-29255]
- secrets/pki: fixes issue #28749 requiring all chains to be single line of authority. [GH-29342]
- secrets/ssh: Return the flag
allow_empty_principalsin the read role api when key_type is "ca" [GH-28901] - secrets/transform (enterprise): Fix nil panic when accessing a partially setup database store.
- secrets/transit: Fix a race in which responses from the key update api could contain results from another subsequent update [GH-28839]
- sentinel (enterprise): No longer report inaccurate log messages for when failing an advisory policy.
- ui (enterprise): Fixes login to web UI when MFA is enabled for SAML auth methods [GH-28873]
- ui (enterprise): Fixes token renewal to ensure capability checks are performed in the relevant namespace, resolving 'Not authorized' errors for resources that users have permission to access. [GH-29416]
- ui/database: Fixes 'cannot update static username' error when updating static role's rotation period [GH-29498]
- ui: Allow users to search the full json object within the json code-editor edit/create view. [GH-28808]
- ui: Decode
connection_urlto fix database connection updates (i.e. editing connection config, deleting roles) failing when urls include template variables. [GH-29114] - ui: Fixes login to web UI when MFA is enabled for OIDC (i.e. azure, auth0) and Okta auth methods [GH-28873]
- ui: Fixes navigation for quick actions in LDAP roles' popup menu [GH-29293]
- ui: Fixes rendering issues of LDAP dynamic and static roles with the same name [GH-28824]
- ui: Fixes text overflow on Secrets engines and Auth Engines list views for long names & descriptions [GH-29430]
- ui: MFA methods now display the namespace path instead of the namespace id. [GH-29588]
- ui: No longer running decodeURIComponent on KVv2 list view allowing percent encoded data-octets in path name. [GH-28698]
- vault/diagnose: Fix time to expiration reporting within the TLS verification to not be a month off. [GH-29128]
v1.18.5
v1.18.4
1.18.4
January 30, 2025
CHANGES:
- auth/cf: Update plugin to v0.19.1 [GH-29295]
- sdk: Updated golang and dependency versions to be consistent across core, API, SDK to address [GO-2024-3333] and ensure version consistency [GH-29422]
IMPROVEMENTS:
- plugins (enterprise): The Database secrets engine now allows skipping the automatic rotation of static roles during import.
- events (enterprise): Use the
pathevent metadata field when authorizing a client'ssubscribecapability for consuming an event, instead of requiringdata_pathto be present in the event metadata. - ui: Adds navigation for LDAP hierarchical libraries [GH-29293]
- ui: Adds params to postgresql database to improve editing a connection in the web browser. [GH-29200]
BUG FIXES:
- activity: Include activity records from clients created by deleted or disabled auth mounts in Export API response. [GH-29376]
- core: Prevent integer overflows of the barrier key counter on key rotation requests [GH-29176]
- database/mssql: Fix a bug where contained databases would silently fail root rotation if a custom root rotation statement was not provided. [GH-29399]
- plugins: Fix a bug that causes zombie dbus-daemon processes on certain systems. [GH-29334]
- sdk/database: Fix a bug where slow database connections can cause goroutines to be blocked. [GH-29097]
- secrets/pki: Fix a bug that prevented the full CA chain to be used when enforcing name constraints. [GH-29255]
- sentinel (enterprise): No longer report inaccurate log messages for when failing an advisory policy.
- ui (enterprise): Fixes login to web UI when MFA is enabled for SAML auth methods [GH-28873]
- ui: Fixes login to web UI when MFA is enabled for OIDC (i.e. azure, auth0) and Okta auth methods [GH-28873]
- ui: Fixes navigation for quick actions in LDAP roles' popup menu [GH-29293]
v1.18.3
1.18.3
December 18, 2024
CHANGES:
- secrets/openldap: Update plugin to v0.14.4 [GH-29131]
- secrets/pki: Enforce the issuer constraint extensions (extended key usage, name constraints, issuer name) when issuing or signing leaf certificates. For more information see PKI considerations [GH-29045]
IMPROVEMENTS:
- auth/okta: update to okta sdk v5 from v2. Transitively updates go-jose dependency to >=3.0.3 to resolve GO-2024-2631. See https://github.com/okta/okta-sdk-golang/blob/master/MIGRATING.md for details on changes. [GH-28121]
- core: Added new
enable_post_unseal_traceandpost_unseal_trace_directoryconfig options to generate Go traces during the post-unseal step for debug purposes. [GH-28895] - sdk: Add Vault build date to system view plugin environment response [GH-29082]
- ui: Replace KVv2 json secret details view with Hds::CodeBlock component allowing users to search the full secret height. [GH-28808]
BUG FIXES:
- autosnapshots (enterprise): Fix an issue where snapshot size metrics were not reported for cloud-based storage.
- core/metrics: Fix unlocked mounts read for usage reporting. [GH-29091]
- core/seal (enterprise): Fix problem with nodes unable to join Raft clusters with Seal High Availability enabled. [GH-29117]
- core: fix bug in seal unwrapper that caused high storage latency in Vault CE. For every storage read request, the seal unwrapper was performing the read twice, and would also issue an unnecessary storage write. [GH-29050]
- secret/db: Update static role rotation to generate a new password after 2 failed attempts. [GH-28989]
- ui: Allow users to search the full json object within the json code-editor edit/create view. [GH-28808]
- ui: Decode
connection_urlto fix database connection updates (i.e. editing connection config, deleting roles) failing when urls include template variables. [GH-29114] - vault/diagnose: Fix time to expiration reporting within the TLS verification to not be a month off. [GH-29128]
v1.18.2
1.18.2
November 21, 2024
SECURITY:
- raft/snapshotagent (enterprise): upgrade raft-snapshotagent to v0.0.0-20241115202008-166203013d8e
CHANGES:
- auth/azure: Update plugin to v0.19.2 [GH-28848]
- core/ha (enterprise): Failed attempts to become a performance standby node are now using an exponential backoff instead of a 10 second delay in between retries. The backoff starts at 2s and increases by a factor of two until reaching the maximum of 16s. This should make unsealing of the node faster in some cases.
- login (enterprise): Return a 500 error during logins when performance standby nodes make failed gRPC requests to the active node. [GH-28807]
FEATURES:
- Product Usage Reporting: Added product usage reporting, which collects anonymous, numerical, non-sensitive data about Vault secrets usage, and adds it to the existing utilization reports. See the [docs] for more info [GH-28858]
IMPROVEMENTS:
- secret/pki: Introduce a new value
always_enforce_errwithinleaf_not_after_behaviorto force the error in all circumstances such as CA issuance and ACME requests if requested TTL values are beyond the issuer's NotAfter. [GH-28907] - secrets-sync (enterprise): No longer attempt to unsync a random UUID secret name in GCP upon destination creation.
- ui: Adds navigation for LDAP hierarchical roles [GH-28824]
- website/docs: changed outdated reference to consul-helm repository to consul-k8s repository. [GH-28825]
BUG FIXES:
- auth/ldap: Fixed an issue where debug level logging was not emitted. [GH-28881]
- core: Improved an internal helper function that sanitizes paths by adding a check for leading backslashes in addition to the existing check for leading slashes. [GH-28878]
- secret/pki: Fix a bug that prevents PKI issuer field enable_aia_url_templating to be set to false. [GH-28832]
- secrets-sync (enterprise): Fixed issue where secret-key granularity destinations could sometimes cause a panic when loading a sync status.
- secrets/aws: Fix issue with static credentials not rotating after restart or leadership change. [GH-28775]
- secrets/ssh: Return the flag
allow_empty_principalsin the read role api when key_type is "ca" [GH-28901] - secrets/transform (enterprise): Fix nil panic when accessing a partially setup database store.
- secrets/transit: Fix a race in which responses from the key update api could contain results from another subsequent update [GH-28839]
- ui: Fixes rendering issues of LDAP dynamic and static roles with the same name [GH-28824]
v1.18.1
1.18.1
October 30, 2024
CHANGES:
- auth/azure: Update plugin to v0.19.1 [GH-28712]
- secrets/azure: Update plugin to v0.20.1 [GH-28699]
- secrets/openldap: Update plugin to v0.14.1 [GH-28479]
- secrets/openldap: Update plugin to v0.14.2 [GH-28704]
- secrets/openldap: Update plugin to v0.14.3 [GH-28780]
IMPROVEMENTS:
- core: Add a mount tuneable that trims trailing slashes of request paths during POST. Needed to support CMPv2 in PKI. [GH-28752]
- raft/snapshotagent (enterprise): upgrade raft-snapshotagent to v0.0.0-20241003195753-88fef418d705
- ui: Add button to copy secret path in kv v1 and v2 secrets engines [GH-28629]
- ui: Adds copy button to identity entity, alias and mfa method IDs [GH-28742]
BUG FIXES:
- agent: Fix chown error running agent on Windows with an auto-auth file sinks. [GH-28748]
- audit: Prevent users from enabling multiple audit devices of file type with the same file_path to write to. [GH-28751]
- cli: Fixed a CLI precedence issue where -agent-address didn't override VAULT_AGENT_ADDR as it should [GH-28574]
- core/seal (enterprise): Fix bug that caused seal generation information to be replicated, which prevented disaster recovery and performance replication clusters from using their own seal high-availability configuration.
- core/seal: Fix an issue that could cause reading from sys/seal-backend-status to return stale information. [GH-28631]
- core: Fixed panic seen when performing help requests without /v1/ in the URL. [GH-28669]
- kmip (enterprise): Use the default KMIP port for IPv6 addresses missing a port, for the listen_addrs configuration field, in order to match the existing IPv4 behavior
- namespaces (enterprise): Fix issue where namespace patch requests to a performance secondary would not patch the namespace's metadata.
- proxy: Fix chown error running proxy on Windows with an auto-auth file sink. [GH-28748]
- secrets/pki: Address issue with ACME HTTP-01 challenges failing for IPv6 IPs due to improperly formatted URLs [GH-28718]
- ui: No longer running decodeURIComponent on KVv2 list view allowing percent encoded data-octets in path name. [GH-28698]
v1.18.0
CHANGES:
- activity (enterprise): filter all fields in client count responses by the request namespace [GH-27790]
- activity (enterprise): remove deprecated fields distinct_entities and non_entity_tokens [GH-27830]
- activity log: Deprecated the field "default_report_months". Instead, the billing start time will be used to determine the start time when querying the activity log endpoints. [GH-27350]
- activity log: Deprecates the current_billing_period field for /sys/internal/counters/activity. The default start time will automatically be set the billing period start date. [GH-27426]
- activity: The activity export API now requires the
sudoACL capability. [GH-27846] - activity: The activity export API now responds with a status of 204 instead 400 when no data exists within the time range specified by
start_timeandend_time. [GH-28064] - activity: The startTime will be set to the start of the current billing period by default. The endTime will be set to the end of the current month. This applies to /sys/internal/counters/activity, /sys/internal/counters/activity/export, and the vault operator usage command that utilizes /sys/internal/counters/activity. [GH-27379]
- api: Update backoff/v3 to backoff/v4.3.0 [GH-26868]
- auth/alicloud: Update plugin to v0.19.0 [GH-28263]
- auth/azure: Update plugin to v0.19.0 [GH-28294]
- auth/cf: Update plugin to v0.18.0 [GH-27724]
- auth/cf: Update plugin to v0.19.0 [GH-28266]
- auth/gcp: Update plugin to v0.19.0 [GH-28366]
- auth/jwt: Update plugin to v0.21.0 [GH-27498]
- auth/jwt: Update plugin to v0.22.0 [GH-28349]
- auth/kerberos: Update plugin to v0.13.0 [GH-28264]
- auth/kubernetes: Update plugin to v0.20.0 [GH-28289]
- auth/oci: Update plugin to v0.17.0 [GH-28307]
- cli: The undocumented
-dev-three-nodeand-dev-four-clusterCLI options have been removed. [GH-27578] - consul-template: updated to version 0.39.1 [GH-27799]
- core(enterprise): Updated the following two control group related errors responses to respond with response code 400 instead of 500:
control group: could not find token, andcontrol group: token is not a valid control group token. - core: Bump Go version to 1.22.7
- database/couchbase: Update plugin to v0.12.0 [GH-28327]
- database/elasticsearch: Update plugin to v0.16.0 [GH-28277]
- database/mongodbatlas: Update plugin to v0.13.0 [GH-28268]
- database/redis-elasticache: Update plugin to v0.5.0 [GH-28293]
- database/redis: Update plugin to v0.4.0 [GH-28404]
- database/snowflake: Update plugin to v0.12.0 [GH-28275]
- sdk: Upgrade to go-secure-stdlib/plugincontainer@v0.4.0, which also bumps github.com/docker/docker to v26.1.5+incompatible [GH-28269]
- secrets/ad: Update plugin to v0.19.0 [GH-28361]
- secrets/alicloud: Update plugin to v0.18.0 [GH-28271]
- secrets/azure: Update plugin to v0.19.2 [GH-27652]
- secrets/azure: Update plugin to v0.20.0 [GH-28267]
- secrets/gcp: Update plugin to v0.20.0 [GH-28324]
- secrets/gcpkms: Update plugin to v0.18.0 [GH-28300]
- secrets/gcpkms: Update plugin to v0.19.0 [GH-28360]
- secrets/kubernetes: Update plugin to v0.9.0 [GH-28287]
- secrets/kv: Update plugin to v0.20.0 [GH-28334]
- secrets/mongodbatlas: Update plugin to v0.13.0 [GH-28348]
- secrets/openldap: Update plugin to v0.14.0 [GH-28325]
- secrets/ssh: Add a flag,
allow_empty_principalsto allow keys or certs to apply to any user/principal. [GH-28466] - secrets/terraform: Update plugin to v0.10.0 [GH-28312]
- secrets/terraform: Update plugin to v0.9.0 [GH-28016]
- ui: Uses the internal/counters/activity/export endpoint for client count export data. [GH-27455]
FEATURES:
- AWS secrets engine STS session tags support: Adds support for setting STS session tags when generating temporary credentials using the AWS secrets engine. [GH-27620]
- Adaptive Overload Protection (enterprise): Enables Adaptive Overload Protection for write requests as a GA feature (enabled by default) for Integrated Storage.
- Audit Entry Exclusion: Audit devices support excluding fields from entries being written to them, with expression-based rules (powered by go-bexpr) to determine when the specific fields are excluded.
- Workload Identity Federation UI for AWS (enterprise): Add WIF fields to AWS secrets engine. [GH-28148]
- KV v2 Patch/Subkey (enterprise): Adds GUI support to read the subkeys of a KV v2 secret and patch (partially update) secret data. [GH-28212]
- Self-Managed Static Roles: Self-Managed Static Roles are now supported for select SQL database engines (Postgres, Oracle). Requires Vault Enterprise. [GH-28199]
- Vault Minimal Version: Add the ability to build a minimal version of Vault with only core features using the BUILD_MINIMAL environment variable. [GH-27394]
- Vault PKI 3GPP CMPv2 Server (Enterprise): Support for the PKI 3GPP CMPv2 certificate management protocol has been added to the Vault PKI Plugin. This allows standard CMPv2 clients to request certificates from a Vault server with no knowledge of Vault APIs.
IMPROVEMENTS:
- activity log: Changes how new client counts in the current month are estimated, in order to return more visibly sensible totals. [GH-27547]
- activity: The activity export API can now be called in non-root namespaces. Resulting records will be filtered to include the requested namespace (via
X-Vault-Namespaceheader or within the path) and all child namespaces. [GH-27846] - activity: The activity export API now includes identity metadata about entity clients. [GH-28064]
- activity:
/sys/internal/counters/activitywill now include a warning if the specified usage period contains estimated client counts. [GH-28068] - agent/sink: Allow configuration of the user and group ID of the file sink. [GH-27123]
- agent: Add metric (vault.agent.authenticated) that is set to 1 when vault agent has a valid token and zero if it does not. [GH-26570]
- agent: Add the ability to dump pprof to the filesystem using SIGUSR2 [GH-27510]
- audit: Adds TRACE logging to log request/response under certain circumstances, and further improvements to the audit subsystem. [GH-28056]
- audit: Ensure that any underyling errors from audit devices are logged even if we consider auditing to be a success. [GH-27809]
- audit: Internal implementation changes to the audit subsystem which improve performance. [GH-27952]
- audit: Internal implementation changes to the audit subsystem which improve relability. [GH-28286]
- audit: sinks (file, socket, syslog) will attempt to log errors to the server operational log before returning (if there are errors to log, and the context is done). [GH-27859]
- auth/cert: Cache full list of role trust information separately to avoid eviction, and avoid duplicate loading during multiple simultaneous logins on the same role. [GH-27902]
- cli: Add a
--dev-no-kvflag to prevent auto mounting a key-value secret backend when running a dev server [GH-16974] - cli: Allow vault CLI HTTP headers to be specified using the JSON-encoded VAULT_HEADERS environment variable [GH-21993]
- cli:
vault operator usagewill now include a warning if the specified usage period contains estimated client counts. [GH-28068] - core/activity: Ensure client count queries that include the current month return consistent results by sorting the clients before performing estimation [GH-28062]
- core/cli: Example 'help' pages for vault read / write docs improved. [GH-19064]
- core/identity: allow identity backend to be tuned using standard secrets backend tuning parameters. [GH-14723]
- core/metrics: ensure core HA metrics are always output to Prometheus. [GH-27966]
- core: log at level ERROR rather than INFO when all seals are unhealthy. [GH-28564]
- core: make authLock and mountsLock in Core configurable via the detect_deadlocks configuration parameter. [GH-27633]
- database/postgres: Add new fields to the plugin's config endpoint for client certificate authentication. [GH-28024]
- db/cassandra: Add
disable_host_initial_lookupoption to backend, allowing the disabling of initial host lookup. [GH-9733] - identity: alias metadata is now returned when listing entity aliases [GH-26073]
- license utilization reporting (enterprise): Auto-roll billing start date. [GH-27656]
- physical/raft: Log when the MAP_POPULATE mmap flag gets disabled before opening the database. [GH-28526]
- proxy/sink: Allow configuration of the user and group ID of the file sink. [GH-27123]
- proxy: Add the ability to dump pprof to the filesystem using SIGUSR2 [GH-27510]
- raft-snapshot (enterprise): add support for managed identity credentials for azure snapshots
- raft/autopilot: Persist Raft server versions so autopilot always knows the versions of all servers in the cluster. Include server versions in the Raft bootstrap challenge answer so autopilot immediately knows the versions of new nodes. [GH-28186]
- sdk/helper: Allow setting environment variables when using NewTestDockerCluster [GH-27457]
- secrets-sync (enterprise): add support for specifying the replication regions for secret storage within GCP Secret Manager destinations
- secrets-sync (enterprise): add support for syncing secrets to github environments within repositories
- secrets-sync (enterprise): add support for syncing secrets to github organizations (beta)
- secrets/database/hana: Update HANA db client to v1.10.1 [GH-27950]
- secrets/database: Add support for GCP CloudSQL private IP's. [GH-26828]
- secrets/pki: Key Usage can now be set on intermediate and root CAs, and CSRs generated by the PKI secret's engine. [GH-28237]
- secrets/pki: Track the last time auto-tidy ran to address auto-tidy not running if the auto-tidy interval is longer than scheduled Vault restarts. [GH-28488]
- serviceregistration: Added support for Consul ServiceMeta tags from config file from the new
service_metaconfig field. [GH-11084] - storage/azure: Updated metadata endpoint to
GetMSIEndpoint, which supports more than just the metadata service. [GH-10624] - storage/dynamodb: Speed up list and delete of large directories by only requesting keys from DynamoDB [GH-21159]
- storage/etcd: Update etcd3 client to v3.5.13 to allow use of TLSv1.3. [GH-26660]
- storage/raft: Bump raft to v1.7.0 which includes pre-vote. This should make clusters more stable during network partitions. [GH-27605]
- storage/raft: Improve autopilot logging on startup to show config values clearly and avoid spurious logs [GH-27464]
- ui/secrets-sync: Hide Secrets Sync from the sidebar nav if user does not have access to the feature. [GH-27262]
- ui: AWS credentials form sets credential_type from backing role [GH-27405]
- ui: Creates separate section for updating sensitive creds for Secrets sync create/edit view. [GH-27538]
- ui: For AWS and SSH secret engines hide mount configuration details in toggle and display configuration details or cta. [GH-27831]
- ui: Mask obfuscated fields when creating/editing a Secrets sync destination. [GH-27348]
- ui: Move secret-engine configuration create/edit from routing
vault/settings/secrets/configure/<backend>tovault/secrets/<backend>/configuration/edit[GH-27918] - ui: Remove deprecated
current_billing_periodfrom dashboard activity log request [GH-27559] - ui: Update the client count dashboard to use API namespace filtering and other UX improvements [GH-28036]
- ui: remove initial start/end parameters on the activity call for client counts dashboard. [GH-27816]
- ui: simplify the date range editing experience in the client counts dashboard. [GH-27796]
- website/docs: Added API documentation for Azure Secrets Engine delete role [GH-27883]
- website/docs: corrected invalid json in sample payload for azure secrets engine create/update role [GH-28076]
BUG FIXES:
- activity: The sys/internal/counters/activity endpoint will return current month data when the end_date parameter is set to a future date. [GH-28042]
- agent: Fixed an issue causing excessive CPU usage during normal operation [GH-27518]
- auth/appid, auth/cert, auth/github, auth/ldap, auth/okta, auth/radius, auth/userpass: fixed an issue with policy name normalization that would prevent a token associated with a policy containing an uppercase character to be renewed. [GH-16484]
- auth/aws: fixes an issue where not supplying an external id was interpreted as an empty external id [GH-27858]
- auth/cert: During certificate validation, OCSP requests are debug logged even if Vault's log level is above DEBUG. [GH-28450]
- auth/cert: Merge error messages returned in login failures and include error when present [GH-27202]
- auth/cert: Use subject's serial number, not issuer's within error message text in OCSP request errors [GH-27696]
- auth/cert: When using ocsp_ca_certificates, an error was produced though extra certs validation succeeded. [GH-28597]
- auth/cert: ocsp_ca_certificates field was not honored when validating OCSP responses signed by a CA that did not issue the certificate. [GH-28309]
- auth/token: Fix token TTL calculation so that it uses
max_lease_ttltune value for tokens created viaauth/token/create. [GH-28498] - auth/token: fixes an edge case bug that "identity_policies" is nil and causes cli vault login error [GH-17007]
- auth: Updated error handling for missing login credentials in AppRole and UserPass auth methods to return a 400 error instead of a 500 error. [GH-28441]
- cli: Fixed an erroneous warning appearing about
-addressnot being set when it is. [GH-27265] - cli: Fixed issue with
vault hcp connectwhere HCP resources with uppercase letters were inaccessible when entering the correct project name. [GH-27694] - command: The
vault secrets moveandvault auth movecommand will no longer attempt to write to storage on performance standby nodes. [GH-28059] - config: Vault TCP listener config now correctly supports the documented proxy_protocol_behavior setting of 'deny_unauthorized' [GH-27459]
- core (enterprise): Fix 500 errors that occurred querying
sys/internal/ui/mountsfor a mount prefixed by a namespace path when path filters are configured. [GH-27939] - core (enterprise): Fix HTTP redirects in namespaces to use the correct path and (in the case of event subscriptions) the correct URI scheme. [GH-27660]
- core (enterprise): Fix deletion of MFA login-enforcement configurations on standby nodes
- core/audit: Audit logging a Vault request/response checks if the existing context is cancelled and will now use a new context with a 5 second timeout. If the existing context is cancelled a new context, will be used. [GH-27531]
- core/config: fix issue when using
proxy_protocol_behaviorwithdeny_unauthorized, which causes the Vault TCP listener to close after receiving an untrusted upstream proxy connection. [GH-27589] - core/identity: Fixed an issue where deleted/reassigned entity-aliases were not removed from in-memory database. [GH-27750]
- core/seal (enterprise): Fix bug that caused seal generation information to be replicated, which prevented disaster recovery and performance replication clusters from using their own seal high-availability configuration.
- core: Fixed an issue where maximum request duration timeout was not being added to all requests containing strings sys/monitor and sys/events. With this change, timeout is now added to all requests except monitor and events endpoint. [GH-28230]
- core: Fixed an issue with performance standbys not being able to handle rotate root requests. [GH-27631]
- database/postgresql: Fix potential error revoking privileges in postgresql database secrets engine when a schema contains special characters [GH-28519]
- databases: fix issue where local timezone was getting lost when using a rotation schedule cron [GH-28509]
- helper/pkcs7: Fix parsing certain messages containing only certificates [GH-27435]
- identity/oidc: prevent JWKS from being generated by multiple concurrent requests [GH-27929]
- licensing (enterprise): fixed issue where billing start date might not be correctly updated on performance standbys
- proxy/cache (enterprise): Fixed a data race that could occur while tracking capabilities in Proxy's static secret cache. [GH-28494]
- proxy/cache (enterprise): Fixed an issue where Proxy with static secret caching enabled would not correctly handle requests to older secret versions for KVv2 secrets. Proxy's static secret cache now properly handles all requests relating to older versions for KVv2 secrets. [GH-28207]
- proxy/cache (enterprise): Fixed an issue where Proxy would not correctly update KV secrets when talking to a perf standby. Proxy will now attempt to forward requests to update secrets triggered by events to the active node. Note that this requires
allow_forwarding_via_headerto be configured on the cluster. [GH-27891] - proxy/cache (enterprise): Fixed an issue where cached static secrets could fail to update if the secrets belonged to a non-root namespace. [GH-27730]
- proxy: Fixed an issue causing excessive CPU usage during normal operation [GH-27518]
- raft/autopilot: Fixed panic that may occur during shutdown [GH-27726]
- replication (enterprise): fix cache invalidation issue leading to namespace custom metadata not being shown correctly on performance secondaries
- secrets-sync (enterprise): Destination set/remove operations will no longer be blocked as "purge in progress" after a purge job ended in failure.
- secrets-sync (enterprise): Fix KV secret access sometimes being denied, due to a double forward-slash (
//) in the mount path, when the token should otherwise have access. - secrets-sync (enterprise): Normalize custom_tag keys and values for recoverable invalid characters.
- secrets-sync (enterprise): Normalize secret key names before storing the external_name in a secret association.
- secrets-sync (enterprise): Patching github sync destination credentials will properly update and save the new credentials.
- secrets-sync (enterprise): Properly remove tags from secrets in AWS when they are removed from the source association
- secrets-sync (enterprise): Return an error immediately on destination creation when providing invalid custom_tags based on destination type.
- secrets-sync (enterprise): Return more accurate error code for invalid connection details
- secrets-sync (enterprise): Secondary nodes in a cluster now properly check activation-flags values.
- secrets-sync (enterprise): Skip invalid GitHub repository names when creating destinations
- secrets-sync (enterprise): Validate corresponding GitHub app parameters
app_nameandinstallation_idare set - secrets/database: Skip connection verification on reading existing DB connection configuration [GH-28139]
- secrets/identity (enterprise): Fix a bug that can cause DR promotion to fail in rare cases where a MR secondary has inconsistent alias information in storage.
- secrets/pki: fix lack of serial number to a certificate read resulting in a server side error. [GH-27681]
- secrets/transit (enterprise): Fix an issue that caused input data be returned as part of generated CMAC values.
- storage/azure: Fix invalid account name initialization bug [GH-27563]
- storage/raft (enterprise): Fix issue with namespace cache not getting cleared on snapshot restore, resulting in namespaces not found in the snapshot being inaccurately represented by API responses. [GH-27474]
- storage/raft: Fix auto_join not working with mDNS provider. [GH-25080]
- sys: Fix a bug where mounts of external plugins that were registered before Vault v1.0.0 could not be tuned to use versioned plugins. [GH-27881]
- ui: Allow creation of session_token type roles for AWS secret backend [GH-27424]
- ui: Display an error and force a timeout when TOTP passcode is incorrect [GH-27574]
- ui: Ensure token expired banner displays when batch token expires [GH-27479]
- ui: Fix UI improperly checking capabilities for enabling performance and dr replication [GH-28371]
- ui: Fix cursor jump on KVv2 json editor that would occur after pressing ENTER. [GH-27569]
- ui: fix
default_roleinput missing from oidc auth method configuration form [GH-28539] - ui: fix issue where enabling then disabling "Tidy ACME" in PKI results in failed API call. [GH-27742]
- ui: fix namespace picker not working when in small screen where the sidebar is collapsed by default. [GH-27728]
- ui: fixes renew-self being called right after login for non-renewable tokens [GH-28204]
- ui: fixes toast (flash) alert message saying "created" when deleting a kv v2 secret [GH-28093]
Configuration
-
If you want to rebase/retry this MR, check this box
This MR has been generated by Renovate Bot.