new major release
This commit is contained in:
parent
dacd4ca67e
commit
acff1c7add
55
CHANGELOG.md
55
CHANGELOG.md
@ -1,5 +1,41 @@
|
||||
## Next
|
||||
|
||||
IMPROVEMENTS:
|
||||
|
||||
* auth/jwt: Add support for fetching groups and user information from G Suite during authentication. [[GH-123](https://github.com/hashicorp/vault-plugin-auth-jwt/pull/123)]
|
||||
* secrets/openldap: Add "ad" schema that allows the engine to correctly rotate AD passwords. [[GH-16](https://github.com/hashicorp/vault-plugin-secrets-openldap/pull/16)]
|
||||
|
||||
BUG FIXES:
|
||||
|
||||
* core: Handle a trailing slash in the API address used for enabling replication
|
||||
* core: Fix resource leak in plugin API (plugin-dependent, not all plugins impacted) [[GH-9557](https://github.com/hashicorp/vault/pull/9557)]
|
||||
* core: Fix race involved in enabling certain features via a license change
|
||||
* secrets/aws: Fix possible issue creating access keys when using Performance Standbys [[GH-9606](https://github.com/hashicorp/vault/pull/9606)]
|
||||
* secrets/database: Fix handling of TLS options in mongodb connection strings [[GH-9519](https://github.com/hashicorp/vault/pull/9519)]
|
||||
* secrets/gcp: Ensure that the IAM policy version is appropriately set after a roleset's bindings have changed. [[GH-93](https://github.com/hashicorp/vault-plugin-secrets-gcp/pull/93)]
|
||||
|
||||
## 1.5.1
|
||||
### TBD
|
||||
|
||||
CHANGES:
|
||||
|
||||
* pki: The tidy operation will now remove revoked certificates if the parameter `tidy_revoked_certs` is set to `true`. This will result in certificate entries being immediately removed, as opposed to awaiting until its NotAfter time. Note that this only affects certificates that have been already revoked. [[GH-9609](https://github.com/hashicorp/vault/pull/9609)]
|
||||
|
||||
IMPROVEMENTS:
|
||||
|
||||
* auth/jwt: Add support for fetching groups and user information from G Suite during authentication. [[GH-9574](https://github.com/hashicorp/vault/pull/9574)]
|
||||
* secrets/openldap: Add "ad" schema that allows the engine to correctly rotate AD passwords. [[GH-9740](https://github.com/hashicorp/vault/pull/9740)]
|
||||
* ui: Wrap TTL option on transit engine export action is updated to a new component. [[GH-9632](https://github.com/hashicorp/vault/pull/9632)]
|
||||
|
||||
BUG FIXES:
|
||||
|
||||
* secrets/gcp: Ensure that the IAM policy version is appropriately set after a roleset's bindings have changed. [[GH-9603](https://github.com/hashicorp/vault/pull/9603)]
|
||||
* replication (enterprise): Fix status API output incorrectly stating replication is in `idle` state.
|
||||
* core: Fix panic when printing over-long info fields at startup [[GH-9681](https://github.com/hashicorp/vault/pull/9681)]
|
||||
|
||||
## 1.5.0
|
||||
### July 21st, 2020
|
||||
|
||||
CHANGES:
|
||||
|
||||
* storage/raft: The storage configuration now accepts a new `max_entry_size` config that will limit
|
||||
@ -15,13 +51,16 @@ CHANGES:
|
||||
IMPROVEMENTS:
|
||||
|
||||
* audit: Replication status requests are no longer audited. [[GH-8877](https://github.com/hashicorp/vault/pull/8877)]
|
||||
* audit: Added mount_type field to requests and responses. [[GH-9167](https://github.com/hashicorp/vault/pull/9167)]
|
||||
* auth/aws: Add support for Web Identity credentials [[GH-7738](https://github.com/hashicorp/vault/pull/7738)]
|
||||
* auth/jwt: Support users that are members of more than 200 groups on Azure [[GH-120](https://github.com/hashicorp/vault-plugin-auth-jwt/pull/120)]
|
||||
* auth/kubernetes: Allow disabling `iss` validation [[GH-91](https://github.com/hashicorp/vault-plugin-auth-kubernetes/pull/91)]
|
||||
* core: Add the Go version used to build a Vault binary to the server message output. [[GH-9078](https://github.com/hashicorp/vault/pull/9078)]
|
||||
* core: Added Password Policies for user-configurable password generation [[GH-8637](https://github.com/hashicorp/vault/pull/8637)]
|
||||
* core: New telemetry metrics covering token counts, token creation, KV secret counts, lease creation. [[GH-9239](https://github.com/hashicorp/vault/pull/9239)] [[GH-9250](https://github.com/hashicorp/vault/pull/9250)] [[GH-9244](https://github.com/hashicorp/vault/pull/9244)] [[GH-9052](https://github.com/hashicorp/vault/pull/9052)]
|
||||
* cli: Support reading TLS parameters from file for the `vault operator raft join` command. [[GH-9060](https://github.com/hashicorp/vault/pull/9060)]
|
||||
* plugin: Add SDK method, `Sys.ReloadPlugin`, and CLI command, `vault plugin reload`,
|
||||
for reloading plugins. [[GH-8777](https://github.com/hashicorp/vault/pull/8777)]
|
||||
* plugin: Add SDK method, `Sys.ReloadPlugin`, and CLI command, `vault plugin reload`, for reloading plugins. [[GH-8777](https://github.com/hashicorp/vault/pull/8777)]
|
||||
* plugin (enterprise): Add a scope field to plugin reload, which when global, reloads the plugin anywhere in a cluster. [[GH-9347](https://github.com/hashicorp/vault/pull/9347)]
|
||||
* sdk/framework: Support accepting TypeFloat parameters over the API [[GH-8923](https://github.com/hashicorp/vault/pull/8923)]
|
||||
* secrets/aws: Add iam_groups parameter to role create/update [[GH-8811](https://github.com/hashicorp/vault/pull/8811)]
|
||||
* secrets/database: Add static role rotation for MongoDB Atlas database plugin [[GH-11](https://github.com/hashicorp/vault-plugin-database-mongodbatlas/pull/11)]
|
||||
@ -54,7 +93,19 @@ BUG FIXES:
|
||||
## 1.4.3 (TBD)
|
||||
|
||||
IMPROVEMENTS:
|
||||
|
||||
* auth/aws: Add support for Web Identity credentials [[GH-9251](https://github.com/hashicorp/vault/pull/9251)]
|
||||
* core: Add the Go version used to build a Vault binary to the server message output. [[GH-9078](https://github.com/hashicorp/vault/pull/9078)]
|
||||
* secrets/database: Add static role rotation for MongoDB Atlas database plugin [[GH-9311](https://github.com/hashicorp/vault/pull/9311)]
|
||||
* ui: Link to the Vault Changelog in the UI footer [[GH-9216](https://github.com/hashicorp/vault/pull/9216)]
|
||||
|
||||
BUG FIXES:
|
||||
|
||||
* auth/oci: Fix issue where users of the Oracle Cloud Infrastructure (OCI) auth method could not authenticate when the plugin backend was mounted at a non-default path. [[GH-9278](https://github.com/hashicorp/vault/pull/9278)]
|
||||
* replication: The issue causing cubbyholes in namespaces on performance secondaries to not work, which was fixed in 1.4.0, was still an issue when the primary was both a performance primary and DR primary.
|
||||
* secrets/aws: Fix issue where performance standbys weren't able to generate STS credentials after an IAM access key rotation in AWS and root IAM credential update in Vault [[GH-9207](https://github.com/hashicorp/vault/pull/9207)]
|
||||
* secrets/database: Fix issue that prevents performance standbys from connecting to databases after a root credential rotation [[GH-9208](https://github.com/hashicorp/vault/pull/9208)]
|
||||
* secrets/gcp: Fix issue were updates were not being applied to the `token_scopes` of a roleset. [[GH-9277](https://github.com/hashicorp/vault/pull/9277)]
|
||||
|
||||
## 1.4.2 (May 21st, 2020)
|
||||
|
||||
|
6
PKGBUILD
6
PKGBUILD
@ -4,8 +4,8 @@
|
||||
|
||||
pkgname='vault'
|
||||
pkgdesc='A tool for managing secrets'
|
||||
pkgver='1.4.2'
|
||||
pkgrel='2'
|
||||
pkgver='1.5.3'
|
||||
pkgrel='1'
|
||||
url="https://vaultproject.io/"
|
||||
license=('MPL')
|
||||
arch=('x86_64')
|
||||
@ -14,7 +14,7 @@ makedepends=('go' 'git' 'yarn' 'bower' 'nodejs-lts-dubnium' 'npm' 'zip'
|
||||
depends=('glibc')
|
||||
install='vault.install'
|
||||
backup=('etc/vault.hcl')
|
||||
_vault_commit='18f1c494be8b06788c2fdda1a4296eb3c4b174ce'
|
||||
_vault_commit='9fcd81405feb320390b9d71e15a691c3bc1daeef'
|
||||
source=("git+https://github.com/hashicorp/vault#commit=${_vault_commit}"
|
||||
'vault.service'
|
||||
'vault.sysusers'
|
||||
|
Loading…
Reference in New Issue
Block a user