Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Renovate: Update module github.com/hashicorp/vault/api to v1.12.2 #117

Merged
merged 1 commit into from
Mar 21, 2024

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Mar 21, 2024

Mend Renovate

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
github.com/hashicorp/vault/api v1.12.1 -> v1.12.2 age adoption passing confidence

Release Notes

hashicorp/vault (github.com/hashicorp/vault/api)

v1.12.2

Compare Source

1.12.2

November 30, 2022

CHANGES:

  • core: Bump Go version to 1.19.3.
  • plugins: Mounts can no longer be pinned to a specific builtin version. Mounts previously pinned to a specific builtin version will now automatically upgrade to the latest builtin version, and may now be overridden if an unversioned plugin of the same name and type is registered. Mounts using plugin versions without builtin in their metadata remain unaffected. [GH-18051]

IMPROVEMENTS:

  • secrets/pki: Allow issuer creation, import to change default issuer via default_follows_latest_issuer. [GH-17824]
  • storage/raft: Add retry_join_as_non_voter config option. [GH-18030]

BUG FIXES:

  • auth/okta: fix a panic for AuthRenew in Okta [GH-18011]
  • auth: Deduplicate policies prior to ACL generation [GH-17914]
  • cli: Fix issue preventing kv commands from executing properly when the mount path provided by -mount flag and secret key path are the same. [GH-17679]
  • core (enterprise): Supported storage check in vault server command will no longer prevent startup. Instead, a warning will be logged if configured to use storage backend other than raft or consul.
  • core/quotas (enterprise): Fix a lock contention issue that could occur and cause Vault to become unresponsive when creating, changing, or deleting lease count quotas.
  • core: Fix potential deadlock if barrier ciphertext is less than 4 bytes. [GH-17944]
  • core: fix a start up race condition where performance standbys could go into a
    mount loop if default policies are not yet synced from the active node. [GH-17801]
  • plugins: Only report deprecation status for builtin plugins. [GH-17816]
  • plugins: Vault upgrades will no longer fail if a mount has been created using an explicit builtin plugin version. [GH-18051]
  • secret/pki: fix bug with initial legacy bundle migration (from < 1.11 into 1.11+) and missing issuers from ca_chain [GH-17772]
  • secrets/azure: add WAL to clean up role assignments if errors occur [GH-18086]
  • secrets/gcp: Fixes duplicate service account key for rotate root on standby or secondary [GH-18111]
  • secrets/pki: Fix upgrade of missing expiry, delta_rebuild_interval by setting them to the default. [GH-17693]
  • ui: Fixes issue with not being able to download raft snapshot via service worker [GH-17769]
  • ui: fix entity policies list link to policy show page [GH-17950]

Configuration

📅 Schedule: Branch creation - "before 8am on Thursday" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Mend Renovate. View repository job log here.

@SuperSandro2000 SuperSandro2000 merged commit 27adf7c into master Mar 21, 2024
5 of 6 checks passed
@SuperSandro2000 SuperSandro2000 deleted the renovate/external-dependencies branch March 21, 2024 09:34
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants