github hashicorp/vault v1.8.0

latest releases: v1.18.1, v1.18.0, v1.17.6...
3 years ago

1.8.0

July 28th, 2021

CHANGES:

  • agent: Errors in the template engine will no longer cause agent to exit unless
    explicitly defined to do so. A new configuration parameter,
    exit_on_retry_failure, within the new top-level stanza, template_config, can
    be set to true in order to cause agent to exit. Note that for agent to exit if
    template.error_on_missing_key is set to true, exit_on_retry_failure must
    be also set to true. Otherwise, the template engine will log an error but then
    restart its internal runner. [GH-11775]
  • agent: Update to use IAM Service Account Credentials endpoint for signing JWTs
    when using GCP Auto-Auth method [GH-11473]
  • core (enterprise): License/EULA changes that ensure the presence of a valid HashiCorp license to
    start Vault. More information is available in the Vault License FAQ

FEATURES:

  • GCP Secrets Engine Static Accounts: Adds ability to use existing service accounts for generation
    of service account keys and access tokens. [GH-12023]
  • Key Management Secrets Engine (Enterprise): Adds general availability for distributing and managing keys in AWS KMS. [GH-11958]
  • License Autoloading (Enterprise): Licenses may now be automatically loaded from the environment or disk.
  • MySQL Database UI: The UI now supports adding and editing MySQL connections in the database secret engine [GH-11532]
  • Vault Diagnose: A new vault operator command to detect common issues with vault server setups.

IMPROVEMENTS:

  • agent/template: Added static_secret_render_interval to specify how often to fetch non-leased secrets [GH-11934]
  • agent: Allow Agent auto auth to read symlinked JWT files [GH-11502]
  • api: Allow a leveled logger to be provided to api.Client through SetLogger. [GH-11696]
  • auth/aws: Underlying error included in validation failure message. [GH-11638]
  • cli/api: Add lease lookup command [GH-11129]
  • core: Add prefix_filter to telemetry config [GH-12025]
  • core: Add a darwin/arm64 binary release supporting the Apple M1 CPU [GH-12071]
  • core: Add a small (<1s) exponential backoff to failed TCP listener Accept failures. [GH-11588]
  • core (enterprise): Add controlled capabilities to control group policy stanza
  • core: Add metrics for standby node forwarding. [GH-11366]
  • core: Add metrics to report if a node is a perf standby, if a node is a dr secondary or primary, and if a node is a perf secondary or primary. [GH-11472]
  • core: Send notifications to systemd on start, stop, and configuration reload. [GH-11517]
  • core: add irrevocable lease list and count apis [GH-11607]
  • core: allow arbitrary length stack traces upon receiving SIGUSR2 (was 32MB) [GH-11364]
  • db/cassandra: Added tls_server_name to specify server name for TLS validation [GH-11820]
  • go: Update to Go 1.16.5 [GH-11802]
  • raft: Improve raft batch size selection [GH-11907]
  • raft: change freelist type to map and set nofreelistsync to true [GH-11895]
  • replication: Delay evaluation of X-Vault-Index headers until merkle sync completes.
  • secrets/rabbitmq: Add ability to customize dynamic usernames [GH-11899]
  • secrets/ad: Add rotate-role endpoint to allow rotations of service accounts. [GH-11942]
  • secrets/aws: add IAM tagging support for iam_user roles [GH-10953]
  • secrets/aws: add ability to provide a role session name when generating STS credentials [GH-11345]
  • secrets/database/elasticsearch: Add ability to customize dynamic usernames [GH-11957]
  • secrets/database/influxdb: Add ability to customize dynamic usernames [GH-11796]
  • secrets/database/mongodb: Add ability to customize SocketTimeout, ConnectTimeout, and ServerSelectionTimeout [GH-11600]
  • secrets/database/mongodb: Increased throughput by allowing for multiple request threads to simultaneously update users in MongoDB [GH-11600]
  • secrets/database/mongodbatlas: Adds the ability to customize username generation for dynamic users in MongoDB Atlas. [GH-11956]
  • secrets/database/redshift: Add ability to customize dynamic usernames [GH-12016]
  • secrets/database/snowflake: Add ability to customize dynamic usernames [GH-11997]
  • ssh: add support for templated values in SSH CA DefaultExtensions [GH-11495]
  • storage/raft/autopilot (enterprise): Enable Autopilot on DR secondary clusters
  • storage/raft: Support autopilot for HA only raft storage. [GH-11260]
  • ui: Add Validation to KV secret engine [GH-11785]
  • ui: Add database secret engine support for MSSQL [GH-11231]
  • ui: Add push notification message when selecting okta auth. [GH-11442]
  • ui: Add regex validation to Transform Template pattern input [GH-11586]
  • ui: Add specific error message if unseal fails due to license [GH-11705]
  • ui: Add validation support for open api form fields [GH-11963]
  • ui: Added auth method descriptions to UI login page [GH-11795]
  • ui: JSON fields on database can be cleared on edit [GH-11708]
  • ui: Obscure secret values on input and displayOnly fields like certificates. [GH-11284]
  • ui: Redesign of KV 2 Delete toolbar. [GH-11530]
  • ui: Replace tool partials with components. [GH-11672]
  • ui: Show description on secret engine list [GH-11995]
  • ui: Update ember to latest LTS and upgrade UI dependencies [GH-11447]
  • ui: Update partials to components [GH-11680]
  • ui: Updated ivy code mirror component for consistency [GH-11500]
  • ui: Updated node to v14, latest stable build [GH-12049]
  • ui: Updated search select component styling [GH-11360]
  • ui: add transform secrets engine to features list [GH-12003]
  • ui: add validations for duplicate path kv engine [GH-11878]
  • ui: show site-wide banners for license warnings if applicable [GH-11759]
  • ui: update license page with relevant autoload info [GH-11778]

DEPRECATIONS:

  • secrets/gcp: Deprecated the /gcp/token/:roleset and /gcp/key/:roleset paths for generating
    secrets for rolesets. Use /gcp/roleset/:roleset/token and /gcp/roleset/:roleset/key instead. [GH-12023]

BUG FIXES:

  • activity: Omit wrapping tokens and control groups from client counts [GH-11826]
  • agent/cert: Fix issue where the API client on agent was not honoring certificate
    information from the auto-auth config map on renewals or retries. [GH-11576]
  • agent/template: fix command shell quoting issue [GH-11838]
  • agent: Fixed agent templating to use configured tls servername values [GH-11288]
  • agent: fix timestamp format in log messages from the templating engine [GH-11838]
  • auth/approle: fixing dereference of nil pointer [GH-11864]
  • auth/jwt: Updates the hashicorp/cap library to v0.1.0 to
    bring in a verification key caching fix. [GH-11784]
  • auth/kubernetes: Fix AliasLookahead to correctly extract ServiceAccount UID when using ephemeral JWTs [GH-12073]
  • auth/ldap: Fix a bug where the LDAP auth method does not return the request_timeout configuration parameter on config read. [GH-11975]
  • cli: Add support for response wrapping in vault list and vault kv list with output format other than table. [GH-12031]
  • cli: vault delete and vault kv delete should support the same output options (e.g. -format) as vault write. [GH-11992]
  • core (enterprise): Fix orphan return value from auth methods executed on performance standby nodes.
  • core (enterprise): Fix plugins mounted in namespaces being unable to use password policies [GH-11596]
  • core (enterprise): serialize access to HSM entropy generation to avoid errors in concurrent key generation.
  • core/metrics: Add generic KV mount support for vault.kv.secret.count telemetry metric [GH-12020]
  • core: Fix cleanup of storage entries from cubbyholes within namespaces. [GH-11408]
  • core: Fix edge cases in the configuration endpoint for barrier key autorotation. [GH-11541]
  • core: Fix goroutine leak when updating rate limit quota [GH-11371]
  • core: Fix race that allowed remounting on path used by another mount [GH-11453]
  • core: Fix storage entry leak when revoking leases created with non-orphan batch tokens. [GH-11377]
  • core: Fixed double counting of http requests after operator stepdown [GH-11970]
  • core: correct logic for renewal of leases nearing their expiration time. [GH-11650]
  • identity: Use correct mount accessor when refreshing external group memberships. [GH-11506]
  • mongo-db: default username template now strips invalid '.' characters [GH-11872]
  • pki: Only remove revoked entry for certificates during tidy if they are past their NotAfter value [GH-11367]
  • replication: Fix panic trying to update walState during identity group invalidation.
  • replication: Fix: mounts created within a namespace that was part of an Allow
    filtering rule would not appear on performance secondary if created after rule
    was defined.
  • secret/pki: use case insensitive domain name comparison as per RFC1035 section 2.3.3
  • secret: fix the bug where transit encrypt batch doesn't work with key_version [GH-11628]
  • secrets/ad: Forward all creds requests to active node [GH-76] [GH-11836]
  • secrets/database/cassandra: Fixed issue where hostnames were not being validated when using TLS [GH-11365]
  • secrets/database/cassandra: Fixed issue where the PEM parsing logic of pem_bundle and pem_json didn't work for CA-only configurations [GH-11861]
  • secrets/database/cassandra: Updated default statement for password rotation to allow for special characters. This applies to root and static credentials. [GH-11262]
  • secrets/database: Fix marshalling to allow providing numeric arguments to external database plugins. [GH-11451]
  • secrets/database: Fixed an issue that prevented external database plugin processes from restarting after a shutdown. [GH-12087]
  • secrets/database: Fixed minor race condition when rotate-root is called [GH-11600]
  • secrets/database: Fixes issue for V4 database interface where SetCredentials wasn't falling back to using RotateRootCredentials if SetCredentials is Unimplemented [GH-11585]
  • secrets/openldap: Fix bug where schema was not compatible with rotate-root #24 [GH-12019]
  • storage/dynamodb: Handle throttled batch write requests by retrying, without which writes could be lost. [GH-10181]
  • storage/raft: Support cluster address change for nodes in a cluster managed by autopilot [GH-11247]
  • storage/raft: Tweak creation of vault.db file [GH-12034]
  • storage/raft: leader_tls_servername wasn't used unless leader_ca_cert_file and/or mTLS were configured. [GH-11252]
  • tokenutil: Perform the num uses check before token type. [GH-11647]
  • transform (enterprise): Fix an issue with malformed transform configuration
    storage when upgrading from 1.5 to 1.6. See Upgrade Notes for 1.6.x.
  • ui: Add role from database connection automatically populates the database for new role [GH-11119]
  • ui: Add root rotation statements support to appropriate database secret engine plugins [GH-11404]
  • ui: Automatically refresh the page when user logs out [GH-12035]
  • ui: Fix Version History queryParams on LinkedBlock [GH-12079]
  • ui: Fix bug where database secret engines with custom names cannot delete connections [GH-11127]
  • ui: Fix bug where the UI does not recognize version 2 KV until refresh, and fix [object Object] error message [GH-11258]
  • ui: Fix database role CG access [GH-12111]
  • ui: Fix date display on expired token notice [GH-11142]
  • ui: Fix entity group membership and metadata not showing [GH-11641]
  • ui: Fix error message caused by control group [GH-11143]
  • ui: Fix footer URL linking to the correct version changelog. [GH-11283]
  • ui: Fix issue where logging in without namespace input causes error [GH-11094]
  • ui: Fix namespace-bug on login [GH-11182]
  • ui: Fix status menu no showing on login [GH-11213]
  • ui: Fix text link URL on database roles list [GH-11597]
  • ui: Fixed and updated lease renewal picker [GH-11256]
  • ui: fix control group access for database credential [GH-12024]
  • ui: fix issue where select-one option was not showing in secrets database role creation [GH-11294]
  • ui: fix oidc login with Safari [GH-11884]

Don't miss a new vault release

NewReleases is sending notifications on new releases.