updated KI for upgrade guides (#15202)

This commit is contained in:
Loann Le 2022-04-27 13:26:45 -07:00 committed by GitHub
parent 7713b67c15
commit 48a4c01b97
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
3 changed files with 26 additions and 19 deletions

View File

@ -77,10 +77,10 @@ naming collisions could result unexpected default behavior. Additionally, we rec
the corresponding details in the OIDC provider [concepts](/docs/concepts/oidc-provider) document
to understand how the built-in resources are used in the system.
@include 'raft-panic-old-tls-key.mdx'
## Known Issues
@include 'raft-panic-old-tls-key.mdx'
### Single Vault follower restart causes election even with established quorum
We now support Server Side Consistent Tokens (See [Replication](/docs/configuration/replication) and [Vault Eventual Consistency](/docs/enterprise/consistency)), which introduces a new token format that can only be used on nodes of 1.10 or higher version. This new format is enabled by default upon upgrading to the new version. Old format tokens can be read by Vault 1.10, but the new format Vault 1.10 tokens cannot be read by older Vault versions.
@ -109,4 +109,3 @@ set to `unauth`.
There is a workaround for this error that will allow you to sign in to Vault using the OIDC
auth method. Select the "Other" tab instead of selecting the specific OIDC auth mount tab.
From there, select "OIDC" from the "Method" select box and proceed to sign in to Vault.

View File

@ -49,19 +49,26 @@ Notes](https://golang.org/doc/go1.16) for full details. Of particular note:
## Known Issues
- MSSQL integrations (storage and secrets engine) will crash with a "panic: not implemented" error
([#12830](https://github.com/hashicorp/vault/issues/12830)). This affects Vault versions
@include 'raft-panic-old-tls-key.mdx'
### MSSQL integrations
MSSQL integrations (storage and secrets engine) will crash with a "panic: not implemented" error ([#12830](https://github.com/hashicorp/vault/issues/12830)). This affects Vault versions
1.8.0 and up. It will be fixed in the next minor update.
- Vault Enterprise binaries for `arm64` architectures will crash immediately when using production-ready storage backends. This issue is addressed in Vault 1.8.1.
- AWS Auth using the [EC2 method](https://www.vaultproject.io/docs/auth/aws#ec2-auth-method)
fails with the error `failed to verify the signature`. This effects 1.8.0 and 1.8.1 and there
is not a workaround. The issue was fixed in Vault 1.8.2.
- Configuration files in RedHat packages for Vault were not properly flagged as
config files for `fpm`, causing user-edited files on disk to be replaced with
the defaults when a new package was installed. This
[issue](https://github.com/hashicorp/vault/issues/12275) affects RedHat
packages for Vault 1.8.0 and the 1.8.1-0 package, and is fixed in 1.8.1-1 and up.
- The introduction of `/gcp/roleset/:roleset/token` and `/gcp/roleset/:roleset/key` could inadvertently give
users the ability to generate tokens and key if globs are used in policies. To avoid issues like this,
globs should be avoided in policies to help adhere to the principle of least privilege. See the
[roleset documentation](/docs/secrets/gcp#rolesets) for more information.
### Vault Enterprise binaries
Vault Enterprise binaries for `arm64` architectures will crash immediately when using production-ready storage backends. This issue is addressed in Vault 1.8.1.
### AWS auth
AWS Auth using the [EC2 method](https://www.vaultproject.io/docs/auth/aws#ec2-auth-method) fails with the error `failed to verify the signature`. This effects 1.8.0 and 1.8.1 and there is not a workaround. The issue was fixed in Vault 1.8.2.
### Configuration files in RedHat packages
Configuration files in RedHat packages for Vault were not properly flagged as config files for `fpm`, causing user-edited files on disk to be replaced with
the defaults when a new package was installed. This [issue](https://github.com/hashicorp/vault/issues/12275) affects RedHat packages for Vault 1.8.0 and the 1.8.1-0 package, and is fixed in 1.8.1-1 and up.
### Introduction of rolesets
The introduction of `/gcp/roleset/:roleset/token` and `/gcp/roleset/:roleset/key` could inadvertently give users the ability to generate tokens and key if globs are used in policies. To avoid issues like this, globs should be avoided in policies to help adhere to the principle of least privilege. See the [roleset documentation](/docs/secrets/gcp#rolesets) for more information.

View File

@ -97,10 +97,11 @@ See [this blog post](https://go.dev/blog/tls-cipher-suites) for more information
@include 'pki-forwarding-bug.mdx'
@include 'raft-panic-old-tls-key.mdx'
## Known Issues
@include 'raft-panic-old-tls-key.mdx'
### Identity Token Backend Key Rotations
Existing Vault installations that use the [Identity Token