gcp-vault
gcp-vault copied to clipboard
Bump github.com/hashicorp/vault/api from 1.12.0 to 1.12.1
Bumps github.com/hashicorp/vault/api from 1.12.0 to 1.12.1.
Release notes
Sourced from github.com/hashicorp/vault/api's releases.
v1.12.1
1.12.1
November 2, 2022
IMPROVEMENTS:
- api: Support VAULT_DISABLE_REDIRECTS environment variable (and --disable-redirects flag) to disable default client behavior and prevent the client following any redirection responses. [GH-17352]
- database/snowflake: Allow parallel requests to Snowflake [GH-17593]
- plugins: Add plugin version information to key plugin lifecycle log lines. [GH-17430]
- sdk/ldap: Added support for paging when searching for groups using group filters [GH-17640]
BUG FIXES:
- cli: Remove empty table heading for
vault secrets list -detailed
output. [GH-17577]- core/managed-keys (enterprise): Return better error messages when encountering key creation failures
- core/managed-keys (enterprise): Switch to using hash length as PSS Salt length within the test/sign api for better PKCS#11 compatibility
- core: Fix panic caused in Vault Agent when rendering certificate templates [GH-17419]
- core: Fixes spurious warnings being emitted relating to "unknown or unsupported fields" for JSON config [GH-17660]
- core: prevent memory leak when using control group factors in a policy [GH-17532]
- core: prevent panic during mfa after enforcement's namespace is deleted [GH-17562]
- kmip (enterprise): Fix a problem in the handling of attributes that caused Import operations to fail.
- kmip (enterprise): Fix selection of Cryptographic Parameters for Encrypt/Decrypt operations.
- login: Store token in tokenhelper for interactive login MFA [GH-17040]
- secrets/pki: Respond to tidy-status, tidy-cancel on PR Secondary clusters. [GH-17497]
- ui: Fixes oidc/jwt login issue with alternate mount path and jwt login via mount path tab [GH-17661]
Changelog
Sourced from github.com/hashicorp/vault/api's changelog.
1.12.11
September 13, 2023
SECURITY:
- secrets/transit: fix a regression that was honoring nonces provided in non-convergent modes during encryption. [GH-22852]
IMPROVEMENTS:
- auth/ldap: improved login speed by adding concurrency to LDAP token group searches [GH-22659]
- kmip (enterprise): reduce latency of KMIP operation handling
BUG FIXES:
- cli: Fix the CLI failing to return wrapping information for KV PUT and PATCH operations when format is set to
table
. [GH-22818]- core/quotas: Reduce overhead for role calculation when using cloud auth methods. [GH-22583]
- core/seal: add a workaround for potential connection [hangs] in Azure autoseals. [GH-22760]
- raft/autopilot: Add dr-token flag for raft autopilot cli commands [GH-21165]
- replication (enterprise): Fix discovery of bad primary cluster addresses to be more reliable
1.12.10
August 30, 2023
CHANGES:
- core: Bump Go version to 1.19.12.
IMPROVEMENTS:
- core: Log rollback manager failures during unmount, remount to prevent replication failures on secondary clusters. [GH-22235]
- replication (enterprise): Make reindex less disruptive by allowing writes during the flush phase.
- storage/raft: Cap the minimum dead_server_last_contact_threshold to 1m. [GH-22040]
- ui: enables create and update KV secret workflow when control group present [GH-22471]
BUG FIXES:
- api: Fix breakage with UNIX domain socket addresses introduced by newest Go versions as a security fix. [GH-22523]
- core (enterprise): Remove MFA Configuration for namespace when deleting namespace
- core/quotas (enterprise): Fix a case where we were applying login roles to lease count quotas in a non-login context. Also fix a related potential deadlock. [GH-21110]
- core: Remove "expiration manager is nil on tokenstore" error log for unauth requests on DR secondary as they do not have expiration manager. [GH-22137]
- core: Fix readonly errors that could occur while loading mounts/auths during unseal [GH-22362]
- core: Fixed an instance where incorrect route entries would get tainted. We now pre-calculate namespace specific paths to avoid this. [GH-21470]
- expiration: Fix a deadlock that could occur when a revocation failure happens while restoring leases on startup. [GH-22374]
- license: Add autoloaded license path to the cache exempt list. This is to ensure the license changes on the active node is observed on the perfStandby node. [GH-22363]
- replication (enterprise): Fix bug sync invalidate CoreReplicatedClusterInfoPath
- replication (enterprise): Fixing a bug by which the atomicity of a merkle diff result could be affected. This means it could be a source of a merkle-diff & sync process failing to switch into stream-wal mode afterwards.
- sdk/ldaputil: Properly escape user filters when using UPN domains sdk/ldaputil: use EscapeLDAPValue implementation from cap/ldap [GH-22249]
- secrets/ldap: Fix bug causing schema and password_policy to be overwritten in config. [GH-22332]
... (truncated)
Commits
e34f8a1
backport of commit 28f091abe4f2aba343f00e3d04e32409c705588d (#17710)2a57e58
OIDC Alternate Path Bug (#17661) (#17688)45b3486
backport of commit eff53c2a64735170623a08dc19e4e5fe6ef70c99 (#17706)fe26867
backport of commit 184a4e4ff167ff18d96ea787055be8c4c9d29478 (#17702)ed69142
backport of commit 50a2bb5c2db9fe6b01a5764619a37e5d33ef4174 (#17698)c85aed2
backport of commit 1075ac42d482111cdd092f971f3b3c00515fab74 (#17697)dfc1a30
backport of commit 1a2ee3ab33b2176fafbbc6d49e7cb4a9d4f73d0e (#17681)214667a
backport of commit cc570c11bbc63bd3810a56d8b2ec9e09902ca654 (#17674)e170e3b
backport of commit a5e019e0200a51523e434cfc156ccd6f8d864a72 (#17670)3b47cc7
backport of commit 8647c4b20b69e009c97e75f2e63524bab8bf6e15 (#17667)- Additional commits viewable in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase
.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
-
@dependabot rebase
will rebase this PR -
@dependabot recreate
will recreate this PR, overwriting any edits that have been made to it -
@dependabot merge
will merge this PR after your CI passes on it -
@dependabot squash and merge
will squash and merge this PR after your CI passes on it -
@dependabot cancel merge
will cancel a previously requested merge and block automerging -
@dependabot reopen
will reopen this PR if it is closed -
@dependabot close
will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually -
@dependabot show <dependency name> ignore conditions
will show all of the ignore conditions of the specified dependency -
@dependabot ignore this major version
will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) -
@dependabot ignore this minor version
will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) -
@dependabot ignore this dependency
will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)