File vault.changes of Package vault
-------------------------------------------------------------------
Fri Apr 05 12:11:26 UTC 2024 - opensuse_buildservice@ojkastl.de
- Update to version 1.16.0:
* SECURITY:
- auth/cert: compare public keys of trusted non-CA certificates
with incoming
- client certificates to prevent trusting certs with the same
serial number
- but not the same public/private key. [GH-25649]
- auth/cert: validate OCSP response was signed by the expected
issuer and serial number matched request [GH-26091]
- secrets/transit: fix a regression that was honoring nonces
provided in non-convergent modes during encryption.
[GH-22852]
* CHANGES:
- Upgrade grpc to v1.58.3 [GH-23703]
- Upgrade x/net to v0.17.0 [GH-23703]
- api: add the enterprise parameter to the /sys/health endpoint
[GH-24270]
- auth/alicloud: Update plugin to v0.16.1 [GH-25014]
- auth/alicloud: Update plugin to v0.17.0 [GH-25217]
- auth/approle: Normalized error response messages when invalid
credentials are provided [GH-23786]
- auth/azure: Update plugin to v0.16.1 [GH-22795]
- auth/azure: Update plugin to v0.17.0 [GH-25258]
- auth/cf: Update plugin to v0.16.0 [GH-25196]
- auth/gcp: Update plugin to v0.16.2 [GH-25233]
- auth/jwt: Update plugin to v0.19.0 [GH-24972]
- auth/jwt: Update plugin to v0.20.0 [GH-25326]
- auth/jwt: Update plugin to v0.20.1 [GH-25937]
- auth/kerberos: Update plugin to v0.10.1 [GH-22797]
- auth/kerberos: Update plugin to v0.11.0 [GH-25232]
- auth/kubernetes: Update plugin to v0.18.0 [GH-25207]
- auth/oci: Update plugin to v0.14.1 [GH-22774]
- auth/oci: Update plugin to v0.15.1 [GH-25245]
- cli: Using vault plugin reload with -plugin in the root
namespace will now reload the plugin across all namespaces
instead of just the root namespace. [GH-24878]
- cli: vault plugin info and vault plugin deregister now
require 2 positional arguments instead of accepting either 1
or 2. [GH-24250]
- core (enterprise): Seal High Availability (HA) must be
enabled by enable_multiseal in configuration.
- core: Bump Go version to 1.21.8.
- database/couchbase: Update plugin to v0.10.1 [GH-25275]
- database/elasticsearch: Update plugin to v0.14.0 [GH-25263]
- database/mongodbatlas: Update plugin to v0.11.0 [GH-25264]
- database/redis-elasticache: Update plugin to v0.3.0
[GH-25296]
- database/redis: Update plugin to v0.2.3 [GH-25289]
- database/snowflake: Update plugin to v0.10.0 [GH-25143]
- database/snowflake: Update plugin to v0.9.1 [GH-25020]
- events: Remove event noficiations websocket endpoint in
non-Enterprise [GH-25640]
- events: Source URL is now vault://{vault node} [GH-24201]
- identity (enterprise): POST requests to the
/identity/entity/merge endpoint
- are now always forwarded from standbys to the active node.
[GH-24325]
- plugins/database: Reading connection config at
database/config/:name will now return a computed
running_plugin_version field if a non-builtin version is
running. [GH-25105]
- plugins: Add a warning to the response from
sys/plugins/reload/backend if no plugins were reloaded.
[GH-24512]
- plugins: By default, environment variables provided during
plugin registration will now take precedence over system
environment variables.
- Use the environment variable
VAULT_PLUGIN_USE_LEGACY_ENV_LAYERING=true to opt out and keep
higher preference for system environment
- variables. When this flag is set, Vault will check during
unseal for conflicts and print warnings for any plugins with
environment
- variables that conflict with system environment variables.
[GH-25128]
- plugins: /sys/plugins/runtimes/catalog response will always
include a list of "runtimes" in the response, even if empty.
[GH-24864]
- sdk: Upgrade dependent packages by sdk.
- This includes github.com/docker/docker to
v24.0.7+incompatible,
- google.golang.org/grpc to v1.57.2 and golang.org/x/net to
v0.17.0. [GH-23913]
- secrets/ad: Update plugin to v0.16.2 [GH-25058]
- secrets/ad: Update plugin to v0.17.0 [GH-25187]
- secrets/alicloud: Update plugin to v0.16.0 [GH-25257]
- secrets/azure: Update plugin to v0.17.0 [GH-25189]
- secrets/gcp: Update plugin to v0.18.0 [GH-25173]
- secrets/gcpkms: Update plugin to v0.16.0 [GH-25231]
- secrets/keymgmt: Update plugin to v0.10.0
- secrets/kubernetes: Update plugin to v0.7.0 [GH-25204]
- secrets/kv: Update plugin to v0.16.2 [GH-22790]
- secrets/kv: Update plugin to v0.17.0 [GH-25277]
- secrets/mongodbatlas: Update plugin to v0.10.2 [GH-23849]
- secrets/mongodbatlas: Update plugin to v0.11.0 [GH-25253]
- secrets/openldap: Update plugin to v0.11.3 [GH-25040]
- secrets/openldap: Update plugin to v0.12.0 [GH-25251]
- secrets/openldap: Update plugin to v0.12.1 [GH-25524]
- secrets/terraform: Update plugin to v0.7.5 [GH-25288]
- telemetry: Seal wrap encrypt/decrypt metrics now
differentiate between seals using a metrics label of seal
name rather than separate metric names. [GH-23837]
- ui: Update icons to use Flight icons where available.
[GH-24823]
- ui: add subnav for replication items [GH-24283]
* FEATURES:
- Add Snapshot Inspector Tool: Add CLI tool to inspect Vault
snapshots [GH-23457]
- Audit Filtering: Audit devices support expression-based
filter rules (powered by go-bexpr) to determine which entries
are written to the audit log. [GH-24558]
- Controlled Access to Unauthenticated Endpoints (enterprise):
Gives admins more control over how unauthenticated endpoints
in Vault can be accessed and in some cases what information
they return. [GH-23547] [GH-23534] [GH-23740]
- Custom messages (enterprise): Introduces custom messages
settings, allowing users to view, and operators to configure
system-wide messages.
- Database Event Notifications: The database plugin now emits
event notifications. [GH-24718]
- Default Lease Count Quota (enterprise): Apply a new global
default lease count quota of 300k leases for all
- new installs of Vault. [GH-24382]
- Experimental Raft-WAL Option: Reduces risk of infinite
snapshot loops for follower nodes in large-scale Integrated
Storage deployments. [GH-21460]
- Manual License Utilization Reporting: Added manual license
- utilization reporting, which allows users to create manual
exports of product-license [metering
- data] to report to Hashicorp.
- Plugin Identity Tokens: Adds secret-less configuration of AWS
secret engine using web identity federation. [GH-24987]
- Plugin Workload Identity (enterprise): Vault can generate
identity tokens for plugins to use in workload identity
federation auth flows.
- Quotas in Privileged Namespaces: Enable
creation/update/deletion of quotas from the privileged
namespace
- Reload seal configuration on SIGHUP: Seal configuration is
reloaded on SIGHUP so that seal configuration can
- be changed without shutting down vault [GH-23571]
- Request Limiter (enterprise): Add adaptive concurrency lim...
-------------------------------------------------------------------
Fri Apr 05 11:33:00 UTC 2024 - opensuse_buildservice@ojkastl.de
- Update to version 1.15.6:
* SECURITY:
- auth/cert: compare public keys of trusted non-CA certificates
with incoming
- client certificates to prevent trusting certs with the same
serial number
- but not the same public/private key. [GH-25649]
* CHANGES:
- core: Bump Go version to 1.21.7.
- secrets/openldap: Update plugin to v0.12.1 [GH-25524]
* FEATURES:
- Manual License Utilization Reporting: Added manual license
- utilization reporting, which allows users to create manual
exports of product-license [metering
- data] to report to Hashicorp.
* IMPROVEMENTS:
- auth/cert: Cache trusted certs to reduce memory usage and
improve performance of logins. [GH-25421]
- ui: Add deletion_allowed param to transformations and include
tokenization as a type option [GH-25436]
- ui: redirect back to current route after reauthentication
when token expires [GH-25335]
- ui: remove unnecessary OpenAPI calls for unmanaged auth
methods [GH-25364]
* BUG FIXES:
- agent: Fix issue where Vault Agent was unable to render KVv2
secrets with delete_version_after set. [GH-25387]
- audit: Handle a potential panic while formatting audit
entries for an audit log [GH-25605]
- core (enterprise): Fix a deadlock that can occur on
performance secondary clusters when there are many mounts and
a mount is deleted or filtered [GH-25448]
- core (enterprise): Fix a panic that can occur if only one
seal exists but is unhealthy on the non-first restart of
Vault.
- core/quotas: Deleting a namespace that contains a rate limit
quota no longer breaks replication [GH-25439]
- openapi: Fixing response fields for rekey operations
[GH-25509]
- secrets/transit: When provided an invalid input with
hash_algorithm=none, a lock was not released properly before
reporting an error leading to deadlocks on a subsequent key
configuration update. [GH-25336]
- storage/file: Fixing spuriously deleting storage keys ending
with .temp [GH-25395]
- transform (enterprise): guard against a panic looking up a
token in exportable mode with barrier storage.
- ui: Do not disable JSON display toggle for KV version 2
secrets [GH-25235]
- ui: Do not show resultant-acl banner on namespaces a user has
access to [GH-25256]
- ui: Fix copy button not working on masked input when value is
not a string [GH-25269]
- ui: Update the KV secret data when you change the version
you're viewing of a nested secret. [GH-25152]
-------------------------------------------------------------------
Sun Feb 4 09:15:38 UTC 2024 - Johannes Kastl <opensuse_buildservice@ojkastl.de>
- new package vault (Hashicorp vault): A tool for secrets
management, encryption as a service, and privileged access
management