-
Notifications
You must be signed in to change notification settings - Fork 9
fix(deps): update module github.com/hashicorp/vault/api to v1.22.0 #96
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open
renovate
wants to merge
1
commit into
main
Choose a base branch
from
renovate/github.com-hashicorp-vault-api-1.x
base: main
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
ℹ Artifact update noticeFile name: go.modIn order to perform the update(s) described in the table above, Renovate ran the
Details:
|
4a38dae
to
b4a246a
Compare
4c793af
to
b4a246a
Compare
b4a246a
to
bbe4ef6
Compare
bbe4ef6
to
6cd7824
Compare
86e72b7
to
e1fb305
Compare
e1fb305
to
a6eb1f3
Compare
a6eb1f3
to
0c91c67
Compare
0c91c67
to
261defe
Compare
261defe
to
f739ef5
Compare
f739ef5
to
eae0e41
Compare
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
None yet
0 participants
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
v1.14.0
->v1.22.0
Release Notes
hashicorp/vault (github.com/hashicorp/vault/api)
v1.20.0
Compare Source
1.20.0
June 25, 2025
SECURITY:
CHANGES:
start_time
andend_time
insys/internal/counters/activity
are aligned to the corresponding billing period.end_time
insys/internal/counters/activity
is now capped at the end of the last completed month. [GH-30164]Retry-After
header and, if it exists, wait for the specified duration before retrying the request. [GH-30887]resource_group_name
,vm_name
, andvmss_name
to match token claims [GH-30052]Retry-After
value to the nearest second when calculating the retry delay. [GH-30887]client count data by
namespace
,mount_path
,mount_type
or number of clients fora selected month. [GH-30678]
FormError
component (not used) [GH-34699]/vault/auth?with=
query parameter [GH-30500]/vault/auth?with=
query parameter now exclusively refers to the auth mount path and renders a simplified form [GH-30500]FEATURES:
remove_irrevocable_lease_after
. When set to a non-zero value, this will automatically delete irrevocable leases after the configured duration exceeds the lease's expire time. The minimum duration allowed for this field is two days. [GH-30703]development_cluster
as a field to Vault's utilization reports.The field is configurable via HCL and indicates whether the cluster is being used in a development environment, defaults to false if not set. [GH-30659]
group_by
field to the rate limit quota API to support different grouping modes.snapshot into Vault and read, list, and recover KV v1 and cubbyhole secrets from the snapshot. [GH-30739]
IMPROVEMENTS:
/sys/utilization-report
, giving a snapshot overview of Vault's utilization at a high level.vault.core.response_status_code
, with two labels,code
, andtype
, detailing the status codes of all responses to requests that Vault handles. [GH-30354]vault_index
to an event's metadata if the metadata containsmodified=true
, to support client consistency controls when reading from Vault in response to an event where storage was modified. [GH-30725]VAULT_MYSQL_USERNAME
andVAULT_MYSQL_PASSWORD
. [GH-30136]listing_visibility="unauth"
; all methods can be accessed via the "Sign in with other methods" link [GH-30500]DEPRECATIONS:
/sys/internal/counters/tokens
endpoint. Attempting to call this endpoint will return a 403 "unsupported path" exception. [GH-30561]BUG FIXES:
core/managed-keys (enterprise): fix RSA encryption/decryption with OAEP on managed keys.
conflicting local aliases. [GH-30390]
when it becomes active because standby nodes don't extract the artifact when the plugin
is registered. Remove extracting from Vault and require the operator to place
the extracted artifact in the plugin directory before registration.
plugin_tmpdir
config [GH-29978]plugin_tmpdir
configauto_join
configurations that include escape characters [GH-29874]NextVaultRotation
is nil.Fixes an issue where static roles were unexpectedly rotated after upgrade due to a missing
NextVaultRotation
value.Now sets it to either
LastVaultRotation + RotationPeriod
ornow + RotationPeriod
. [GH-30265]intermediate certificates. [GH-30034]
private_key
after generating [GH-30778]config
block [GH-30960]v1.16.0
Compare Source
1.16.0
March 26, 2024
SECURITY:
client certificates to prevent trusting certs with the same serial number
but not the same public/private key. [GH-25649]
CHANGES:
enterprise
parameter to the/sys/health
endpoint [GH-24270]vault plugin reload
with-plugin
in the root namespace will now reload the plugin across all namespaces instead of just the root namespace. [GH-24878]vault plugin info
andvault plugin deregister
now require 2 positional arguments instead of accepting either 1 or 2. [GH-24250]enable_multiseal
in configuration.vault://{vault node}
[GH-24201]/identity/entity/merge
endpointare now always forwarded from standbys to the active node. [GH-24325]
database/config/:name
will now return a computedrunning_plugin_version
field if a non-builtin version is running. [GH-25105]Use the environment variable
VAULT_PLUGIN_USE_LEGACY_ENV_LAYERING=true
to opt out and keep higher preference for system environmentvariables. When this flag is set, Vault will check during unseal for conflicts and print warnings for any plugins with environment
variables that conflict with system environment variables. [GH-25128]
/sys/plugins/runtimes/catalog
response will always include a list of "runtimes" in the response, even if empty. [GH-24864]This includes github.com/docker/docker to v24.0.7+incompatible,
google.golang.org/grpc to v1.57.2 and golang.org/x/net to v0.17.0. [GH-23913]
FEATURES:
new installs of Vault. [GH-24382]
utilization reporting, which allows users to create manual exports of product-license [metering
data] to report to Hashicorp.
be changed without shutting down vault [GH-23571]
write-based HTTP methods and special-case
pki/issue
requests to preventoverloading the Vault server. [GH-25093]
IMPROVEMENTS:
tls-server-name
arg for plugin registration [GH-23549]mount_type
, returning mount information (e.g.kv
for KVV1/KVV2) for mount when appropriate. [GH-23047]the last heartbeat took, and the estimated clock skew between standby and
active node based on that heartbeat duration. [GH-24343]
auth/ldap: deprecates
connection_timeout
in favor ofrequest_timeout
for timeoutssdk/ldaputil: deprecates Client in favor of cap/ldap.Client [GH-22185]
authenticate_from_environment
variable to "true" and "false" string literals, too. [GH-22996]either provided arguments or retrieved HCP token through browser login. [GH-23897]
vault plugin
sub-commands. [GH-24250]vault operator usage
command output [GH-25751]plugin_tmpdir
config option for containerized plugins, in addition to the existingVAULT_PLUGIN_TMPDIR
environment variable. [GH-24978]the seal when unsealed, as well as the type of the recovery seal if an
auto-seal. [GH-23022]
disable_request_limiter
to allowdisabling the request limiter per-listener. [GH-25098]
code_challenge_methods_supported
to OpenID Connect Metadata [GH-24979]sys/plugins/reload/:type/:name
available in the root namespace for reloading a specific plugin across all namespaces. [GH-24878]entries rather than being limited to 62 like Consul is. Performance testing
shows improvements in throughput and latency under some write-heavy workloads.
listener config.
deletion_allowed
param to transformations and includetokenization
as a type option [GH-25436]BUG FIXES:
from two to one auto seal due to persistence of the previous seal type being
"multiseal". [GH-23573]
on the request. [GH-23861]
on the request. [GH-24256]
/sys/config/auditing
)will now force invalidation and be reloaded from storage when data is replicated
to other nodes.
log_requests_level
. [[GH-24056](https://redConfiguration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.