Bump the all group with 2 updates by dependabot[bot] · Pull Request #1571 · lingrino/vaku
Bumps the all group with 2 updates: github.com/hashicorp/vault/api and github.com/hashicorp/vault/sdk.
Updates github.com/hashicorp/vault/api from 1.13.0 to 1.14.0
Release notes
Sourced from github.com/hashicorp/vault/api's releases.
v1.14.0
1.14.0
June 21, 2023
BREAKING CHANGES:
- secrets/pki: Maintaining running count of certificates will be turned off by default. To re-enable keeping these metrics available on the tidy status endpoint, enable maintain_stored_certificate_counts on tidy-config, to also publish them to the metrics consumer, enable publish_stored_certificate_count_metrics . [GH-18186]
CHANGES:
- auth/alicloud: Updated plugin from v0.14.0 to v0.15.0 [GH-20758]
- auth/azure: Updated plugin from v0.13.0 to v0.15.0 [GH-20816]
- auth/centrify: Updated plugin from v0.14.0 to v0.15.1 [GH-20745]
- auth/gcp: Updated plugin from v0.15.0 to v0.16.0 [GH-20725]
- auth/jwt: Updated plugin from v0.15.0 to v0.16.0 [GH-20799]
- auth/kubernetes: Update plugin to v0.16.0 [GH-20802]
- core: Bump Go version to 1.20.5.
- core: Remove feature toggle for SSCTs, i.e. the env var VAULT_DISABLE_SERVER_SIDE_CONSISTENT_TOKENS. [GH-20834]
- core: Revert #19676 (VAULT_GRPC_MIN_CONNECT_TIMEOUT env var) as we decided it was unnecessary. [GH-20826]
- database/couchbase: Updated plugin from v0.9.0 to v0.9.2 [GH-20764]
- database/redis-elasticache: Updated plugin from v0.2.0 to v0.2.1 [GH-20751]
- replication (enterprise): Add a new parameter for the update-primary API call that allows for setting of the primary cluster addresses directly, instead of via a token.
- secrets/ad: Updated plugin from v0.10.1-0.20230329210417-0b2cdb26cf5d to v0.16.0 [GH-20750]
- secrets/alicloud: Updated plugin from v0.5.4-beta1.0.20230330124709-3fcfc5914a22 to v0.15.0 [GH-20787]
- secrets/aure: Updated plugin from v0.15.0 to v0.16.0 [GH-20777]
- secrets/database/mongodbatlas: Updated plugin from v0.9.0 to v0.10.0 [GH-20882]
- secrets/database/snowflake: Updated plugin from v0.7.0 to v0.8.0 [GH-20807]
- secrets/gcp: Updated plugin from v0.15.0 to v0.16.0 [GH-20818]
- secrets/keymgmt: Updated plugin to v0.9.1
- secrets/kubernetes: Update plugin to v0.5.0 [GH-20802]
- secrets/mongodbatlas: Updated plugin from v0.9.1 to v0.10.0 [GH-20742]
- secrets/pki: Allow issuance of root CAs without AIA, when templated AIA information includes issuer_id. [GH-21209]
- secrets/pki: Warning when issuing leafs from CSRs with basic constraints. In the future, issuance of non-CA leaf certs from CSRs with asserted IsCA Basic Constraints will be prohibited. [GH-20654]
FEATURES:
- AWS Static Roles: The AWS Secrets Engine can manage static roles configured by users. [GH-20536]
- Automated License Utilization Reporting: Added automated license utilization reporting, which sends minimal product-license metering data to HashiCorp without requiring you to manually collect and report them.
- Environment Variables through Vault Agent: Introducing a new process-supervisor mode for Vault Agent which allows injecting secrets as environment variables into a child process using a new
env_templateconfiguration stanza. The process-supervisor configuration can be generated with a newvault agent generate-confighelper tool. [GH-20530]- MongoDB Atlas Database Secrets: Adds support for client certificate credentials [GH-20425]
- MongoDB Atlas Database Secrets: Adds support for generating X.509 certificates on dynamic roles for user authentication [GH-20882]
- NEW PKI Workflow in UI: Completes generally available rollout of new PKI UI that provides smoother mount configuration and a more guided user experience [GH-pki-ui-improvements]
... (truncated)
Changelog
Sourced from github.com/hashicorp/vault/api's changelog.
1.14.0
June 21, 2023
SECURITY:
- ui: key-value v2 (kv-v2) diff viewer allowed HTML injection into the Vault web UI through key values. This vulnerability, CVE-2023-2121, is fixed in Vault 1.14.0, 1.13.3, 1.12.7, and 1.11.11. [HSEC-2023-17]
BREAKING CHANGES:
- secrets/pki: Maintaining running count of certificates will be turned off by default. To re-enable keeping these metrics available on the tidy status endpoint, enable maintain_stored_certificate_counts on tidy-config, to also publish them to the metrics consumer, enable publish_stored_certificate_count_metrics . [GH-18186]
CHANGES:
- auth/alicloud: Updated plugin from v0.14.0 to v0.15.0 [GH-20758]
- auth/azure: Updated plugin from v0.13.0 to v0.15.0 [GH-20816]
- auth/centrify: Updated plugin from v0.14.0 to v0.15.1 [GH-20745]
- auth/gcp: Updated plugin from v0.15.0 to v0.16.0 [GH-20725]
- auth/jwt: Updated plugin from v0.15.0 to v0.16.0 [GH-20799]
- auth/kubernetes: Update plugin to v0.16.0 [GH-20802]
- core: Bump Go version to 1.20.5.
- core: Remove feature toggle for SSCTs, i.e. the env var VAULT_DISABLE_SERVER_SIDE_CONSISTENT_TOKENS. [GH-20834]
- core: Revert #19676 (VAULT_GRPC_MIN_CONNECT_TIMEOUT env var) as we decided it was unnecessary. [GH-20826]
- database/couchbase: Updated plugin from v0.9.0 to v0.9.2 [GH-20764]
- database/redis-elasticache: Updated plugin from v0.2.0 to v0.2.1 [GH-20751]
- replication (enterprise): Add a new parameter for the update-primary API call that allows for setting of the primary cluster addresses directly, instead of via a token.
- secrets/ad: Updated plugin from v0.10.1-0.20230329210417-0b2cdb26cf5d to v0.16.0 [GH-20750]
- secrets/alicloud: Updated plugin from v0.5.4-beta1.0.20230330124709-3fcfc5914a22 to v0.15.0 [GH-20787]
- secrets/aure: Updated plugin from v0.15.0 to v0.16.0 [GH-20777]
- secrets/database/mongodbatlas: Updated plugin from v0.9.0 to v0.10.0 [GH-20882]
- secrets/database/snowflake: Updated plugin from v0.7.0 to v0.8.0 [GH-20807]
- secrets/gcp: Updated plugin from v0.15.0 to v0.16.0 [GH-20818]
- secrets/keymgmt: Updated plugin to v0.9.1
- secrets/kubernetes: Update plugin to v0.5.0 [GH-20802]
- secrets/mongodbatlas: Updated plugin from v0.9.1 to v0.10.0 [GH-20742]
- secrets/pki: Allow issuance of root CAs without AIA, when templated AIA information includes issuer_id. [GH-21209]
- secrets/pki: Warning when issuing leafs from CSRs with basic constraints. In the future, issuance of non-CA leaf certs from CSRs with asserted IsCA Basic Constraints will be prohibited. [GH-20654]
FEATURES:
- AWS Static Roles: The AWS Secrets Engine can manage static roles configured by users. [GH-20536]
- Automated License Utilization Reporting: Added automated license utilization reporting, which sends minimal product-license metering data to HashiCorp without requiring you to manually collect and report them.
- Environment Variables through Vault Agent: Introducing a new process-supervisor mode for Vault Agent which allows injecting secrets as environment variables into a child process using a new
env_templateconfiguration stanza. The process-supervisor configuration can be generated with a newvault agent generate-confighelper tool. [GH-20530]
... (truncated)
Commits
13a649fbackport of commit f12c1285599a1519273bfa68472c598b1fd635bf (#21348)dd62be3backport of commit 3908ec9dc44352548e08f4c86f9ad76c255ce493 (#21331)0fc55a2backport of commit d76424cb53c730da5410ec55bff3274a01212843 (#21328)7733b6abackport of commit 3347e5d56b363e58e7be556cfd0875a210c2a2ec (#21326)1990a8cbackport of commit 30aac443d0037852b0a5e4b50d59a9bedc5e4445 (#21324)15631d2backport of commit a1fdf105b3cc2e88483f3fca27729fa06bfbfa7f (#21312)a14ff6ebackport of commit 41f392c43ff4c9077deb1d1640349b8ba867d139 (#21307)0610df0backport of commit 042dd57811c900c9f6e2c85b5460d50560f79105 (#21295)2fd24b1backport of commit 8cc7be234ac34ff0f703ab092a7314ba9e65b277 (#21293)9e85fefbackport of commit c5549cdac681676ae52ea173d737ee1c5d1949a2 (#21272)- Additional commits viewable in compare view
Updates github.com/hashicorp/vault/sdk from 0.12.0 to 0.13.0
Changelog
Sourced from github.com/hashicorp/vault/sdk's changelog.
Previous versions
1.16.2
April 24, 2024
Enterprise LTS: Vault Enterprise 1.16 is a Long-Term Support (LTS) release.
CHANGES:
- auth/jwt: Update plugin to v0.20.2 [GH-26291]
- core: Bump Go version to 1.21.9.
- secrets/azure: Update plugin to v0.17.1 [GH-26528]
- ui: Update dependencies including D3 libraries [GH-26346]
IMPROVEMENTS:
- activity (enterprise): Change minimum retention window in activity log to 48 months
- audit: timestamps across multiple audit devices for an audit entry will now match. [GH-26088]
- license utilization reporting (enterprise): Add retention months to license utilization reports.
- sdk/decompression: DecompressWithCanary will now chunk the decompression in memory to prevent loading it all at once. [GH-26464]
- ui: fixes cases where inputs did not have associated labels [GH-26263]
- ui: show banner instead of permission denied error when batch token is expired [GH-26396]
BUG FIXES:
- agent:
vault.namespaceno longer gets incorrectly overridden byauto_auth.namespace, if set [GH-26427]- api: fixed a bug where LifetimeWatcher routines weren't respecting exponential backoff in the presence of unexpected errors [GH-26383]
- core (enterprise): fix bug where raft followers disagree with the seal type after returning to one seal from two. [GH-26523]
- core/seal: During a seal reload through SIGHUP, only write updated seal barrier on an active node [GH-26381]
- core/seal: allow overriding of VAULT_GCPCKMS_SEAL_KEY_RING and VAULT_GCPCKMS_SEAL_CRYPTO_KEY environment keys in seal-ha
- events (enterprise): Terminate WebSocket connection when token is revoked.
- secrets/pki: fixed validation bug which rejected ldap schemed URLs in crl_distribution_points. [GH-26477]
- storage/raft (enterprise): Fix a bug where autopilot automated upgrades could fail due to using the wrong upgrade version
- ui: fixed a bug where the replication pages did not update display when navigating between DR and performance [GH-26325]
- ui: fixes undefined start time in filename for downloaded client count attribution csv [GH-26485]
1.16.1
April 04, 2024
Please note that Vault 1.16.1 is the first Enterprise release of the Vault Enterprise 1.16 series.
BUG FIXES:
- auth/ldap: Fix login error for group search anonymous bind. [GH-26200]
- auth/ldap: Fix login error missing entity alias attribute value. [GH-26200]
- cli: fixed a bug where the Vault CLI would error out if HOME was not set. [GH-26243]
- core: Only reload seal configuration when enable_multiseal is set to true. [GH-26166]
- secret/database: Fixed race condition where database mounts may leak connections [GH-26147]
... (truncated)
Commits
545064cupdate vault auth submodules to api/v1.14.0 (#27190)4ba40e4Update vault-plugin-auth-kubernetes to v0.19.0 (#27186)f3bf67fUpdate vault-plugin-secrets-kubernetes to v0.8.0 (#27187)c4eb7f7Update vault-plugin-database-elasticsearch to v0.15.0 (#27136)ea47d24remove setconfig from setDefaultRetentionMonthsInConfig (#27169)7794593Update vault-plugin-auth-kerberos to v0.12.0 (#27177)0b02c5dFix ed25519 key type in ca_util (#27093)20d4427Update vault-plugin-secrets-ad to v0.18.0 (#27172)27f39ffAdd license file to Dockerfile as per legal requirement (#27154)c5a0040[Secrets Sync] split activation modal into separate component (#26822)- Additional commits viewable in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot mergewill merge this PR after your CI passes on it@dependabot squash and mergewill squash and merge this PR after your CI passes on it@dependabot cancel mergewill cancel a previously requested merge and block automerging@dependabot reopenwill reopen this PR if it is closed@dependabot closewill close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency@dependabot ignore <dependency name> major versionwill close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)@dependabot ignore <dependency name> minor versionwill close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)@dependabot ignore <dependency name>will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)@dependabot unignore <dependency name>will remove all of the ignore conditions of the specified dependency@dependabot unignore <dependency name> <ignore condition>will remove the ignore condition of the specified dependency and ignore conditions