changelog++

This commit is contained in:
Michael Gaffney 2019-07-02 10:59:14 -04:00
parent 02120cfe5e
commit 395e10957d
No known key found for this signature in database
GPG key ID: 21FE4844A1193A56

View file

@ -22,6 +22,9 @@ IMPROVEMENTS:
via token roles [GH-6267] via token roles [GH-6267]
* cli: `path-help` now allows `-format=json` to be specified, which will * cli: `path-help` now allows `-format=json` to be specified, which will
output OpenAPI [GH-7006] output OpenAPI [GH-7006]
* secrets/kv: Add optional `delete_version_after` parameter, which takes a
duration and can be set on the mount and/or the metadata for a specific key
[GH-7005]
## 1.2-beta1 (June 25th, 2019) ## 1.2-beta1 (June 25th, 2019)
@ -79,9 +82,9 @@ FEATURES:
* **HA support for Postgres**: PostgreSQL versions >= 9.5 may now but used as * **HA support for Postgres**: PostgreSQL versions >= 9.5 may now but used as
and HA storage backend. and HA storage backend.
* **KMIP secrets engine (Enterprise)**: Allows Vault to operate as a KMIP Server, * **KMIP secrets engine (Enterprise)**: Allows Vault to operate as a KMIP Server,
seamlessly brokering cryptographic operations for traditional infrastructure. seamlessly brokering cryptographic operations for traditional infrastructure.
IMPROVEMENTS: IMPROVEMENTS:
* auth/jwt: A JWKS endpoint may now be configured for signature verification [JWT-43] * auth/jwt: A JWKS endpoint may now be configured for signature verification [JWT-43]
* auth/jwt: `bound_claims` will now match received claims that are lists if any element * auth/jwt: `bound_claims` will now match received claims that are lists if any element
@ -103,15 +106,15 @@ IMPROVEMENTS:
* ui: KV v1 and v2 will now gracefully degrade allowing a write without read * ui: KV v1 and v2 will now gracefully degrade allowing a write without read
workflow in the UI [GH-6570] workflow in the UI [GH-6570]
* ui: Many visual improvements with the addition of Toolbars [GH-6626], the restyling * ui: Many visual improvements with the addition of Toolbars [GH-6626], the restyling
of the Confirm Action component [GH-6741], and using a new set of glyphs for our of the Confirm Action component [GH-6741], and using a new set of glyphs for our
Icon component [GH-6736] Icon component [GH-6736]
* ui: Lazy loading parts of the application so that the total initial payload is * ui: Lazy loading parts of the application so that the total initial payload is
smaller [GH-6718] smaller [GH-6718]
* ui: Tabbing to auto-complete in filters will first complete a common prefix if there * ui: Tabbing to auto-complete in filters will first complete a common prefix if there
is one [GH-6759] is one [GH-6759]
* ui: Removing jQuery from the application makes the initial JS payload smaller [GH-6768] * ui: Removing jQuery from the application makes the initial JS payload smaller [GH-6768]
BUG FIXES: BUG FIXES:
* auth/aws: Fix a case where a panic could stem from a malformed assumed-role ARN * auth/aws: Fix a case where a panic could stem from a malformed assumed-role ARN
when parsing this value [GH-6917] when parsing this value [GH-6917]
@ -131,12 +134,12 @@ BUG FIXES:
## 1.1.3 (June 5th, 2019) ## 1.1.3 (June 5th, 2019)
IMPROVEMENTS: IMPROVEMENTS:
* agent: Now supports proxying request query parameters [GH-6772] * agent: Now supports proxying request query parameters [GH-6772]
* core: Mount table output now includes a UUID indicating the storage path [GH-6633] * core: Mount table output now includes a UUID indicating the storage path [GH-6633]
* core: HTTP server timeout values are now configurable [GH-6666] * core: HTTP server timeout values are now configurable [GH-6666]
* replication: Improve performance of the reindex operation on secondary clusters * replication: Improve performance of the reindex operation on secondary clusters
when mount filters are in use when mount filters are in use
* replication: Replication status API now returns the state and progress of a reindex * replication: Replication status API now returns the state and progress of a reindex
@ -148,7 +151,7 @@ BUG FIXES:
* auth/okta: Fix handling of group names containing slashes [GH-6665] * auth/okta: Fix handling of group names containing slashes [GH-6665]
* cli: Add deprecated stored-shares flag back to the init command [GH-6677] * cli: Add deprecated stored-shares flag back to the init command [GH-6677]
* cli: Fix a panic when the KV command would return no data [GH-6675] * cli: Fix a panic when the KV command would return no data [GH-6675]
* cli: Fix issue causing CLI list operations to not return proper format when * cli: Fix issue causing CLI list operations to not return proper format when
there is an empty response [GH-6776] there is an empty response [GH-6776]
* core: Correctly honor non-HMAC request keys when auditing requests [GH-6653] * core: Correctly honor non-HMAC request keys when auditing requests [GH-6653]
* core: Fix the `x-vault-unauthenticated` value in OpenAPI for a number of * core: Fix the `x-vault-unauthenticated` value in OpenAPI for a number of
@ -223,7 +226,7 @@ SECURITY:
CHANGES: CHANGES:
* auth/jwt: Disallow logins of role_type "oidc" via the `/login` path [JWT-38] * auth/jwt: Disallow logins of role_type "oidc" via the `/login` path [JWT-38]
* core/acl: New ordering defines which policy wins when there are multiple * core/acl: New ordering defines which policy wins when there are multiple
inexact matches and at least one path contains `+`. `+*` is now illegal in inexact matches and at least one path contains `+`. `+*` is now illegal in
policy paths. The previous behavior simply selected any matching policy paths. The previous behavior simply selected any matching
segment-wildcard path that matched. [GH-6532] segment-wildcard path that matched. [GH-6532]
@ -231,21 +234,21 @@ CHANGES:
previously possible from a performance secondary. These have been resolved, previously possible from a performance secondary. These have been resolved,
and these operations may now be run from a performance secondary. and these operations may now be run from a performance secondary.
IMPROVEMENTS: IMPROVEMENTS:
* agent: Allow AppRole auto-auth without a secret-id [GH-6324] * agent: Allow AppRole auto-auth without a secret-id [GH-6324]
* auth/gcp: Cache clients to improve performance and reduce open file usage * auth/gcp: Cache clients to improve performance and reduce open file usage
* auth/jwt: Bounds claims validiation will now allow matching the received * auth/jwt: Bounds claims validiation will now allow matching the received
claims against a list of expected values [JWT-41] claims against a list of expected values [JWT-41]
* secret/gcp: Cache clients to improve performance and reduce open file usage * secret/gcp: Cache clients to improve performance and reduce open file usage
* replication: Mounting/unmounting/remounting/mount-tuning is now supported * replication: Mounting/unmounting/remounting/mount-tuning is now supported
from a performance secondary cluster from a performance secondary cluster
* ui: Suport for authentication via the RADIUS auth method [GH-6488] * ui: Suport for authentication via the RADIUS auth method [GH-6488]
* ui: Navigating away from secret list view will clear any page-specific * ui: Navigating away from secret list view will clear any page-specific
filter that was applied [GH-6511] filter that was applied [GH-6511]
* ui: Improved the display when OIDC auth errors [GH-6553] * ui: Improved the display when OIDC auth errors [GH-6553]
BUG FIXES: BUG FIXES:
* agent: Allow auto-auth to be used with caching without having to define any * agent: Allow auto-auth to be used with caching without having to define any
sinks [GH-6468] sinks [GH-6468]
@ -284,7 +287,7 @@ BUG FIXES:
* ui: add polyfill to load UI in IE11 [GH-6567] * ui: add polyfill to load UI in IE11 [GH-6567]
* ui: Fix issue where some elements would fail to work properly if using ACLs * ui: Fix issue where some elements would fail to work properly if using ACLs
with segment-wildcard paths (`/+/` segments) [GH-6525] with segment-wildcard paths (`/+/` segments) [GH-6525]
## 1.1.0 (March 18th, 2019) ## 1.1.0 (March 18th, 2019)
CHANGES: CHANGES:
@ -339,7 +342,7 @@ IMPROVEMENTS:
all running goroutines' stack traces for debugging purposes [GH-6240] all running goroutines' stack traces for debugging purposes [GH-6240]
* replication: The initial replication indexing process on newly initialized or upgraded * replication: The initial replication indexing process on newly initialized or upgraded
clusters now runs asynchronously clusters now runs asynchronously
* sentinel: Add token namespace id and path, available in rules as * sentinel: Add token namespace id and path, available in rules as
token.namespace.id and token.namespace.path token.namespace.id and token.namespace.path
* ui: The UI is now leveraging OpenAPI definitions to pull in fields for various forms. * ui: The UI is now leveraging OpenAPI definitions to pull in fields for various forms.
This means, it will not be necessary to add fields on the go and JS sides in the future. This means, it will not be necessary to add fields on the go and JS sides in the future.
@ -387,7 +390,7 @@ SECURITY:
be read. Upgrading to this version or 1.1 will fix this issue and cause the be read. Upgrading to this version or 1.1 will fix this issue and cause the
replicated data to be deleted from filtered secondaries. More information replicated data to be deleted from filtered secondaries. More information
was sent to customer contacts on file. was sent to customer contacts on file.
## 1.0.3 (February 12th, 2019) ## 1.0.3 (February 12th, 2019)
CHANGES: CHANGES:
@ -400,10 +403,10 @@ CHANGES:
entity either by name or by id [GH-6105] entity either by name or by id [GH-6105]
* The Vault UI's navigation and onboarding wizard now only displays items that * The Vault UI's navigation and onboarding wizard now only displays items that
are permitted in a users' policy [GH-5980, GH-6094] are permitted in a users' policy [GH-5980, GH-6094]
* An issue was fixed that caused recovery keys to not work on secondary * An issue was fixed that caused recovery keys to not work on secondary
clusters when using a different unseal mechanism/key than the primary. This clusters when using a different unseal mechanism/key than the primary. This
would be hit if the cluster was rekeyed or initialized after 1.0. We recommend would be hit if the cluster was rekeyed or initialized after 1.0. We recommend
rekeying the recovery keys on the primary cluster if you meet the above rekeying the recovery keys on the primary cluster if you meet the above
requirements. requirements.
FEATURES: FEATURES:
@ -443,7 +446,7 @@ BUG FIXES:
a performance standby very quickly, before an associated entity has been a performance standby very quickly, before an associated entity has been
replicated. If the entity is not found in this scenario, the request will replicated. If the entity is not found in this scenario, the request will
forward to the active node. forward to the active node.
* replication: Fix issue where recovery keys would not work on secondary * replication: Fix issue where recovery keys would not work on secondary
clusters if using a different unseal mechanism than the primary. clusters if using a different unseal mechanism than the primary.
* replication: Fix a "failed to register lease" error when using performance * replication: Fix a "failed to register lease" error when using performance
standbys standbys
@ -484,9 +487,9 @@ IMPROVEMENTS:
* auth/aws: AWS EC2 authentication can optionally create entity aliases by * auth/aws: AWS EC2 authentication can optionally create entity aliases by
image ID [GH-5846] image ID [GH-5846]
* autoseal/gcpckms: Reduce the required permissions for the GCPCKMS autounseal * autoseal/gcpckms: Reduce the required permissions for the GCPCKMS autounseal
[GH-5999] [GH-5999]
* physical/foundationdb: TLS support added. [GH-5800] * physical/foundationdb: TLS support added. [GH-5800]
BUG FIXES: BUG FIXES:
@ -510,7 +513,7 @@ BUG FIXES:
* ui (enterprise): properly display perf-standby count on the license page [GH-5971] * ui (enterprise): properly display perf-standby count on the license page [GH-5971]
* ui: fix disappearing nested secrets and go to the nearest parent when deleting * ui: fix disappearing nested secrets and go to the nearest parent when deleting
a secret - [GH-5976] a secret - [GH-5976]
* ui: fix error where deleting an item via the context menu would fail if the * ui: fix error where deleting an item via the context menu would fail if the
item name contained dots [GH-6018] item name contained dots [GH-6018]
* ui: allow saving of kv secret after an errored save attempt [GH-6022] * ui: allow saving of kv secret after an errored save attempt [GH-6022]
* ui: fix display of kv-v1 secret containing a key named "keys" [GH-6023] * ui: fix display of kv-v1 secret containing a key named "keys" [GH-6023]
@ -613,7 +616,7 @@ CHANGES:
undocumented, but were retained for backwards compatibility. They shouldn't undocumented, but were retained for backwards compatibility. They shouldn't
be used due to the possibility of those paths being logged, so at this point be used due to the possibility of those paths being logged, so at this point
they are simply being removed. they are simply being removed.
* Vault will no longer accept updates when the storage key has invalid UTF-8 * Vault will no longer accept updates when the storage key has invalid UTF-8
character encoding [GH-5819] character encoding [GH-5819]
* Mount/Auth tuning the `options` map on backends will now upsert any provided * Mount/Auth tuning the `options` map on backends will now upsert any provided
values, and keep any of the existing values in place if not provided. The values, and keep any of the existing values in place if not provided. The
@ -679,7 +682,7 @@ IMPROVEMENTS:
* ui: Improved banner and popup design [GH-5672] * ui: Improved banner and popup design [GH-5672]
* ui: Added token type to auth method mount config [GH-5723] * ui: Added token type to auth method mount config [GH-5723]
* ui: Display additonal wrap info when unwrapping. [GH-5664] * ui: Display additonal wrap info when unwrapping. [GH-5664]
* ui: Empty states have updated styling and link to relevant actions and * ui: Empty states have updated styling and link to relevant actions and
documentation [GH-5758] documentation [GH-5758]
* ui: Allow editing of KV V2 data when a token doesn't have capabilities to * ui: Allow editing of KV V2 data when a token doesn't have capabilities to
read secret metadata [GH-5879] read secret metadata [GH-5879]
@ -699,7 +702,7 @@ BUG FIXES:
[[GH-16]](https://github.com/hashicorp/vault-plugin-secrets-azure/pull/16) [[GH-16]](https://github.com/hashicorp/vault-plugin-secrets-azure/pull/16)
* storage/gcs: Send md5 of values to GCS to avoid potential corruption * storage/gcs: Send md5 of values to GCS to avoid potential corruption
[GH-5804] [GH-5804]
* secrets/kv: Fix issue where storage version would get incorrectly downgraded * secrets/kv: Fix issue where storage version would get incorrectly downgraded
[GH-5809] [GH-5809]
* secrets/kv: Disallow empty paths on a `kv put` while accepting empty paths * secrets/kv: Disallow empty paths on a `kv put` while accepting empty paths
for all other operations for backwards compatibility for all other operations for backwards compatibility
@ -731,7 +734,7 @@ BUG FIXES:
* ui: Fix bug where editing secrets as JSON doesn't save properly [GH-5660] * ui: Fix bug where editing secrets as JSON doesn't save properly [GH-5660]
* ui: Fix issue where IE 11 didn't render the UI and also had a broken form * ui: Fix issue where IE 11 didn't render the UI and also had a broken form
when trying to use tool/hash [GH-5714] when trying to use tool/hash [GH-5714]
## 0.11.4 (October 23rd, 2018) ## 0.11.4 (October 23rd, 2018)
CHANGES: CHANGES:
@ -744,7 +747,7 @@ FEATURES:
* **Transit Key Trimming**: Keys in transit secret engine can now be trimmed to * **Transit Key Trimming**: Keys in transit secret engine can now be trimmed to
remove older unused key versions remove older unused key versions
* **Web UI support for KV Version 2**: Browse, delete, undelete and destroy * **Web UI support for KV Version 2**: Browse, delete, undelete and destroy
individual secret versions in the UI individual secret versions in the UI
* **Azure Existing Service Principal Support**: Credentials can now be generated * **Azure Existing Service Principal Support**: Credentials can now be generated
against an existing service principal against an existing service principal
@ -798,7 +801,7 @@ IMPROVEMENTS:
BUG FIXES: BUG FIXES:
* auth/ldap: Fix panic if specific values were given to be escaped [GH-5471] * auth/ldap: Fix panic if specific values were given to be escaped [GH-5471]
* cli/auth: Fix panic if `vault auth` was given no parameters [GH-5473] * cli/auth: Fix panic if `vault auth` was given no parameters [GH-5473]
* secret/database/mongodb: Fix panic that could occur at high load [GH-5463] * secret/database/mongodb: Fix panic that could occur at high load [GH-5463]
* secret/pki: Fix CA generation not allowing OID SANs [GH-5459] * secret/pki: Fix CA generation not allowing OID SANs [GH-5459]
@ -823,7 +826,7 @@ FEATURES:
credentials it is using [GH-5140] credentials it is using [GH-5140]
* **Storage Backend Migrator**: A new `operator migrate` command allows offline * **Storage Backend Migrator**: A new `operator migrate` command allows offline
migration of data between two storage backends migration of data between two storage backends
* **AliCloud KMS Auto Unseal and Seal Wrap Support (Enterprise)**: AliCloud KMS can now be used a support seal for * **AliCloud KMS Auto Unseal and Seal Wrap Support (Enterprise)**: AliCloud KMS can now be used a support seal for
Auto Unseal and Seal Wrapping Auto Unseal and Seal Wrapping
BUG FIXES: BUG FIXES:
@ -836,16 +839,16 @@ BUG FIXES:
* replication: Fix DR API when using a token [GH-5398] * replication: Fix DR API when using a token [GH-5398]
* identity: Ensure old group alias is removed when a new one is written [GH-5350] * identity: Ensure old group alias is removed when a new one is written [GH-5350]
* storage/alicloud: Don't call uname on package init [GH-5358] * storage/alicloud: Don't call uname on package init [GH-5358]
* secrets/jwt: Fix issue where request context would be canceled too early * secrets/jwt: Fix issue where request context would be canceled too early
* ui: fix need to have update for aws iam creds generation [GF-5294] * ui: fix need to have update for aws iam creds generation [GF-5294]
* ui: fix calculation of token expiry [GH-5435] * ui: fix calculation of token expiry [GH-5435]
IMPROVEMENTS: IMPROVEMENTS:
* auth/aws: The identity alias name can now configured to be either IAM unique * auth/aws: The identity alias name can now configured to be either IAM unique
ID of the IAM Principal, or ARN of the caller identity [GH-5247] ID of the IAM Principal, or ARN of the caller identity [GH-5247]
* auth/cert: Add allowed_organizational_units support [GH-5252] * auth/cert: Add allowed_organizational_units support [GH-5252]
* cli: Format TTLs for non-secret responses [GH-5367] * cli: Format TTLs for non-secret responses [GH-5367]
* identity: Support operating on entities and groups by their names [GH-5355] * identity: Support operating on entities and groups by their names [GH-5355]
* plugins: Add `env` parameter when registering plugins to the catalog to allow * plugins: Add `env` parameter when registering plugins to the catalog to allow
operators to include environment variables during plugin execution. [GH-5359] operators to include environment variables during plugin execution. [GH-5359]
@ -853,13 +856,13 @@ IMPROVEMENTS:
* secrets/aws: Allow specifying STS role-default TTLs [GH-5138] * secrets/aws: Allow specifying STS role-default TTLs [GH-5138]
* secrets/pki: Add configuration support for setting NotBefore [GH-5325] * secrets/pki: Add configuration support for setting NotBefore [GH-5325]
* core: Support for passing the Vault token via an Authorization Bearer header [GH-5397] * core: Support for passing the Vault token via an Authorization Bearer header [GH-5397]
* replication: Reindex process now runs in the background and does not block other * replication: Reindex process now runs in the background and does not block other
vault operations vault operations
* storage/zookeeper: Enable TLS based communication with Zookeeper [GH-4856] * storage/zookeeper: Enable TLS based communication with Zookeeper [GH-4856]
* ui: you can now init a cluster with a seal config [GH-5428] * ui: you can now init a cluster with a seal config [GH-5428]
* ui: added the option to force promote replication clusters [GH-5438] * ui: added the option to force promote replication clusters [GH-5438]
* replication: Allow promotion of a secondary when data is syncing with a "force" flag * replication: Allow promotion of a secondary when data is syncing with a "force" flag
## 0.11.1.1 (September 17th, 2018) (Enterprise Only) ## 0.11.1.1 (September 17th, 2018) (Enterprise Only)
BUG FIXES: BUG FIXES:
@ -918,11 +921,11 @@ BUG FIXES:
* secrets/pki: Fix sign-verbatim losing extra Subject attributes [GH-5245] * secrets/pki: Fix sign-verbatim losing extra Subject attributes [GH-5245]
* secrets/pki: Remove certificates from store when tidying revoked * secrets/pki: Remove certificates from store when tidying revoked
certificates and simplify API [GH-5231] certificates and simplify API [GH-5231]
* ui: JSON editor will not coerce input to an object, and will now show an * ui: JSON editor will not coerce input to an object, and will now show an
error about Vault expecting an object [GH-5271] error about Vault expecting an object [GH-5271]
* ui: authentication form will now default to any methods that have been tuned * ui: authentication form will now default to any methods that have been tuned
to show up for unauthenticated users [GH-5281] to show up for unauthenticated users [GH-5281]
## 0.11.0 (August 28th, 2018) ## 0.11.0 (August 28th, 2018)
@ -973,7 +976,7 @@ FEATURES:
single Vault Enterprise infrastructure. Through namespaces, Vault single Vault Enterprise infrastructure. Through namespaces, Vault
administrators can support tenant isolation for teams and individuals as administrators can support tenant isolation for teams and individuals as
well as empower those individuals to self-manage their own tenant well as empower those individuals to self-manage their own tenant
environment. environment.
* **Performance Standbys (Enterprise)**: Standby nodes can now service * **Performance Standbys (Enterprise)**: Standby nodes can now service
requests that do not modify storage. This provides near-horizontal scaling requests that do not modify storage. This provides near-horizontal scaling
of a cluster in some workloads, and is the intra-cluster analogue of of a cluster in some workloads, and is the intra-cluster analogue of
@ -984,14 +987,14 @@ FEATURES:
grant access to Vault. See the [plugin grant access to Vault. See the [plugin
repository](https://github.com/hashicorp/vault-plugin-auth-alicloud) for repository](https://github.com/hashicorp/vault-plugin-auth-alicloud) for
more information. more information.
* **Azure Secrets Plugin**: There is now a plugin (pulled in to Vault) that * **Azure Secrets Plugin**: There is now a plugin (pulled in to Vault) that
allows generating credentials to allow access to Azure. See the [plugin allows generating credentials to allow access to Azure. See the [plugin
repository](https://github.com/hashicorp/vault-plugin-secrets-azure) for repository](https://github.com/hashicorp/vault-plugin-secrets-azure) for
more information. more information.
* **HA Support for MySQL Storage**: MySQL storage now supports HA. * **HA Support for MySQL Storage**: MySQL storage now supports HA.
* **ACL Templating**: ACL policies can now be templated using identity Entity, * **ACL Templating**: ACL policies can now be templated using identity Entity,
Groups, and Metadata. Groups, and Metadata.
* **UI Onboarding wizards**: The Vault UI can provide contextual help and * **UI Onboarding wizards**: The Vault UI can provide contextual help and
guidance, linking out to relevant links or guides on vaultproject.io for guidance, linking out to relevant links or guides on vaultproject.io for
various workflows in Vault. various workflows in Vault.
@ -1063,7 +1066,7 @@ FEATURES:
* **FoundationDB Storage**: You can now use FoundationDB for storing Vault * **FoundationDB Storage**: You can now use FoundationDB for storing Vault
data. data.
* **UI Control Group Workflow (enterprise)**: The UI will now detect control * **UI Control Group Workflow (enterprise)**: The UI will now detect control
group responses and provides a workflow to view the status of the request group responses and provides a workflow to view the status of the request
and to authorize requests. and to authorize requests.
* **Vault Agent (Beta)**: Vault Agent is a daemon that can automatically * **Vault Agent (Beta)**: Vault Agent is a daemon that can automatically
authenticate for you across a variety of authentication methods, provide authenticate for you across a variety of authentication methods, provide
@ -1092,7 +1095,7 @@ IMPROVEMENTS:
* secrets/ssh: Allow Vault to work with single-argument SSH flags [GH-4825] * secrets/ssh: Allow Vault to work with single-argument SSH flags [GH-4825]
* secrets/ssh: SSH executable path can now be configured in the CLI [GH-4937] * secrets/ssh: SSH executable path can now be configured in the CLI [GH-4937]
* storage/swift: Add additional configuration options [GH-4901] * storage/swift: Add additional configuration options [GH-4901]
* ui: Choose which auth methods to show to unauthenticated users via * ui: Choose which auth methods to show to unauthenticated users via
`listing_visibility` in the auth method edit forms [GH-4854] `listing_visibility` in the auth method edit forms [GH-4854]
* ui: Authenticate users automatically by passing a wrapped token to the UI via * ui: Authenticate users automatically by passing a wrapped token to the UI via
the new `wrapped_token` query parameter [GH-4854] the new `wrapped_token` query parameter [GH-4854]
@ -1110,22 +1113,22 @@ BUG FIXES:
* core: Fix issue releasing the leader lock in some circumstances [GH-4915] * core: Fix issue releasing the leader lock in some circumstances [GH-4915]
* core: Fix a panic that could happen if the server was shut down while still * core: Fix a panic that could happen if the server was shut down while still
starting up starting up
* core: Fix deadlock that would occur if a leadership loss occurs at the same * core: Fix deadlock that would occur if a leadership loss occurs at the same
time as a seal operation [GH-4932] time as a seal operation [GH-4932]
* core: Fix issue with auth mounts failing to renew tokens due to policies * core: Fix issue with auth mounts failing to renew tokens due to policies
changing [GH-4960] changing [GH-4960]
* auth/radius: Fix issue where some radius logins were being canceled too early * auth/radius: Fix issue where some radius logins were being canceled too early
[GH-4941] [GH-4941]
* core: Fix accidental seal of vault of we lose leadership during startup * core: Fix accidental seal of vault of we lose leadership during startup
[GH-4924] [GH-4924]
* core: Fix standby not being able to forward requests larger than 4MB * core: Fix standby not being able to forward requests larger than 4MB
[GH-4844] [GH-4844]
* core: Avoid panic while processing group memberships [GH-4841] * core: Avoid panic while processing group memberships [GH-4841]
* identity: Fix a race condition creating aliases [GH-4965] * identity: Fix a race condition creating aliases [GH-4965]
* plugins: Fix being unable to send very large payloads to or from plugins * plugins: Fix being unable to send very large payloads to or from plugins
[GH-4958] [GH-4958]
* physical/azure: Long list responses would sometimes be truncated [GH-4983] * physical/azure: Long list responses would sometimes be truncated [GH-4983]
* replication: Allow replication status requests to be processed while in * replication: Allow replication status requests to be processed while in
merkle sync merkle sync
* replication: Ensure merkle reindex flushes all changes to storage immediately * replication: Ensure merkle reindex flushes all changes to storage immediately
* replication: Fix a case where a network interruption could cause a secondary * replication: Fix a case where a network interruption could cause a secondary
@ -1135,7 +1138,7 @@ BUG FIXES:
* secrets/database: Fix panic during DB creds revocation [GH-4846] * secrets/database: Fix panic during DB creds revocation [GH-4846]
* ui: Fix usage of cubbyhole backend in the UI [GH-4851] * ui: Fix usage of cubbyhole backend in the UI [GH-4851]
* ui: Fix toggle state when a secret is JSON-formatted [GH-4913] * ui: Fix toggle state when a secret is JSON-formatted [GH-4913]
* ui: Fix coercion of falsey values to empty string when editing secrets as * ui: Fix coercion of falsey values to empty string when editing secrets as
JSON [GH-4977] JSON [GH-4977]
## 0.10.3 (June 20th, 2018) ## 0.10.3 (June 20th, 2018)
@ -1276,7 +1279,7 @@ IMPROVEMENTS:
* auth/ldap: Obfuscate error messages pre-bind for greater security [GH-4700] * auth/ldap: Obfuscate error messages pre-bind for greater security [GH-4700]
* cli: `vault login` now supports a `-no-print` flag to suppress printing * cli: `vault login` now supports a `-no-print` flag to suppress printing
token information but still allow storing into the token helper [GH-4454] token information but still allow storing into the token helper [GH-4454]
* core/pkcs11 (enterprise): Add support for CKM_AES_CBC_PAD, CKM_RSA_PKCS, and * core/pkcs11 (enterprise): Add support for CKM_AES_CBC_PAD, CKM_RSA_PKCS, and
CKM_RSA_PKCS_OAEP mechanisms CKM_RSA_PKCS_OAEP mechanisms
* core/pkcs11 (enterprise): HSM slots can now be selected by token label * core/pkcs11 (enterprise): HSM slots can now be selected by token label
instead of just slot number instead of just slot number
@ -1304,7 +1307,7 @@ IMPROVEMENTS:
* ui: Identity interface now lists groups by name [GH-4655] * ui: Identity interface now lists groups by name [GH-4655]
* ui: Permission denied errors still render the sidebar in the Access section * ui: Permission denied errors still render the sidebar in the Access section
[GH-4658] [GH-4658]
* replication: Improve performance of index page flushes and WAL garbage * replication: Improve performance of index page flushes and WAL garbage
collecting collecting
BUG FIXES: BUG FIXES:
@ -1415,7 +1418,7 @@ IMPROVEMENTS:
the rate of writes committed the rate of writes committed
* secret/ssh: Update dynamic key install script to use shell locking to avoid * secret/ssh: Update dynamic key install script to use shell locking to avoid
concurrent modifications [GH-4358] concurrent modifications [GH-4358]
* ui: Access to `sys/mounts` is no longer needed to use the UI - the list of * ui: Access to `sys/mounts` is no longer needed to use the UI - the list of
engines will show you the ones you implicitly have access to (because you have engines will show you the ones you implicitly have access to (because you have
access to to secrets in those engines) [GH-4439] access to to secrets in those engines) [GH-4439]
@ -1440,16 +1443,16 @@ BUG FIXES:
interface properly [GH-4398] interface properly [GH-4398]
* ui: Corrected the saving of mount tune ttls for auth methods [GH-4431] * ui: Corrected the saving of mount tune ttls for auth methods [GH-4431]
* ui: Credentials generation no longer checks capabilities before making * ui: Credentials generation no longer checks capabilities before making
api calls. This should fix needing "update" capabilites to read IAM api calls. This should fix needing "update" capabilites to read IAM
credentials in the AWS secrets engine [GH-4446] credentials in the AWS secrets engine [GH-4446]
## 0.10.0 (April 10th, 2018) ## 0.10.0 (April 10th, 2018)
SECURITY: SECURITY:
* Log sanitization for Combined Database Secret Engine: In certain failure * Log sanitization for Combined Database Secret Engine: In certain failure
scenarios with incorrectly formatted connection urls, the raw connection scenarios with incorrectly formatted connection urls, the raw connection
errors were being returned to the user with the configured database errors were being returned to the user with the configured database
credentials. Errors are now sanitized before being returned to the user. credentials. Errors are now sanitized before being returned to the user.
DEPRECATIONS/CHANGES: DEPRECATIONS/CHANGES:
@ -1524,7 +1527,7 @@ FEATURES:
* HA for Google Cloud Storage: The GCS storage type now supports HA. * HA for Google Cloud Storage: The GCS storage type now supports HA.
* UI support for identity: Add and edit entities, groups, and their associated * UI support for identity: Add and edit entities, groups, and their associated
aliases. aliases.
* UI auth method support: Enable, disable, and configure all of the built-in * UI auth method support: Enable, disable, and configure all of the built-in
authentication methods. authentication methods.
* UI (Enterprise): View and edit Sentinel policies. * UI (Enterprise): View and edit Sentinel policies.
@ -1557,17 +1560,17 @@ BUG FIXES:
* secret/pki: When tidying if a value is unexpectedly nil, delete it and move * secret/pki: When tidying if a value is unexpectedly nil, delete it and move
on [GH-4214] on [GH-4214]
* storage/s3: Fix panic if S3 returns no Content-Length header [GH-4222] * storage/s3: Fix panic if S3 returns no Content-Length header [GH-4222]
* ui: Fixed an issue where the UI was checking incorrect paths when operating * ui: Fixed an issue where the UI was checking incorrect paths when operating
on transit keys. Capabilities are now checked when attempting to encrypt / on transit keys. Capabilities are now checked when attempting to encrypt /
decrypt, etc. decrypt, etc.
* ui: Fixed IE 11 layout issues and JS errors that would stop the application * ui: Fixed IE 11 layout issues and JS errors that would stop the application
from running. from running.
* ui: Fixed the link that gets rendered when a user doesn't have permissions * ui: Fixed the link that gets rendered when a user doesn't have permissions
to view the root of a secret engine. The link now sends them back to the list to view the root of a secret engine. The link now sends them back to the list
of secret engines. of secret engines.
* replication: Fix issue with DR secondaries when using mount specified local * replication: Fix issue with DR secondaries when using mount specified local
paths. paths.
* cli: Fix an issue where generating a dr operation token would not output the * cli: Fix an issue where generating a dr operation token would not output the
token [GH-4328] token [GH-4328]
## 0.9.6 (March 20th, 2018) ## 0.9.6 (March 20th, 2018)