changelog++
This commit is contained in:
parent
d67ed1fdc2
commit
84b0b97f6f
31
CHANGELOG.md
31
CHANGELOG.md
|
@ -1,3 +1,10 @@
|
|||
## Next
|
||||
|
||||
IMPROVEMENTS:
|
||||
|
||||
* secret/cassandra: Update Cassandra storage delete function to not use batch
|
||||
operations [GH-4054]
|
||||
|
||||
## 0.9.6 (March 20th, 2018)
|
||||
|
||||
DEPRECATIONS/CHANGES:
|
||||
|
@ -100,7 +107,7 @@ BUG FIXES:
|
|||
automatically connect to a performance primary after that performance
|
||||
primary has been promoted to a DR primary from a DR secondary
|
||||
* ui: Fix behavior when a value contains a `.`
|
||||
|
||||
|
||||
## 0.9.4 (February 20th, 2018)
|
||||
|
||||
SECURITY:
|
||||
|
@ -175,7 +182,7 @@ BUG FIXES:
|
|||
* command/status: Fix panic when status returns 500 from leadership lookup
|
||||
[GH-3998]
|
||||
* identity: Fix race when creating entities [GH-3932]
|
||||
* plugin/gRPC: Fixed an issue with list requests and raw responses coming from
|
||||
* plugin/gRPC: Fixed an issue with list requests and raw responses coming from
|
||||
plugins using gRPC transport [GH-3881]
|
||||
* plugin/gRPC: Fix panic when special paths are not set [GH-3946]
|
||||
* secret/pki: Verify a name is a valid hostname before adding to DNS SANs
|
||||
|
@ -234,24 +241,24 @@ DEPRECATIONS/CHANGES:
|
|||
disabled or the state is still being discovered. As a result, an LB check
|
||||
can positively verify that the node is both not `disabled` and is not a DR
|
||||
secondary, and avoid sending traffic to it if either is true.
|
||||
* PKI Secret Backend Roles parameter types: For `ou` and `organization`
|
||||
in role definitions in the PKI secret backend, input can now be a
|
||||
comma-separated string or an array of strings. Reading a role will
|
||||
* PKI Secret Backend Roles parameter types: For `ou` and `organization`
|
||||
in role definitions in the PKI secret backend, input can now be a
|
||||
comma-separated string or an array of strings. Reading a role will
|
||||
now return arrays for these parameters.
|
||||
* Plugin API Changes: The plugin API has been updated to utilize golang's
|
||||
context.Context package. Many function signatures now accept a context
|
||||
object as the first parameter. Existing plugins will need to pull in the
|
||||
latest Vault code and update their function signatures to begin using
|
||||
latest Vault code and update their function signatures to begin using
|
||||
context and the new gRPC transport.
|
||||
|
||||
FEATURES:
|
||||
|
||||
* **gRPC Backend Plugins**: Backend plugins now use gRPC for transport,
|
||||
* **gRPC Backend Plugins**: Backend plugins now use gRPC for transport,
|
||||
allowing them to be written in other languages.
|
||||
* **Brand New CLI**: Vault has a brand new CLI interface that is significantly
|
||||
streamlined, supports autocomplete, and is almost entirely backwards
|
||||
compatible.
|
||||
* **UI: PKI Secret Backend (Enterprise)**: Configure PKI secret backends,
|
||||
* **UI: PKI Secret Backend (Enterprise)**: Configure PKI secret backends,
|
||||
create and browse roles and certificates, and issue and sign certificates via
|
||||
the listed roles.
|
||||
|
||||
|
@ -260,7 +267,7 @@ IMPROVEMENTS:
|
|||
* auth/aws: Handle IAM headers produced by clients that formulate numbers as
|
||||
ints rather than strings [GH-3763]
|
||||
* auth/okta: Support JSON lists when specifying groups and policies [GH-3801]
|
||||
* autoseal/hsm: Attempt reconnecting to the HSM on certain kinds of issues,
|
||||
* autoseal/hsm: Attempt reconnecting to the HSM on certain kinds of issues,
|
||||
including HA scenarios for some Gemalto HSMs.
|
||||
(Enterprise)
|
||||
* cli: Output password prompts to stderr to make it easier to pipe an output
|
||||
|
@ -294,8 +301,8 @@ BUG FIXES:
|
|||
be capped by the local max TTL [GH-3814]
|
||||
* secret/database: Fix an issue where plugins were not closed properly if they
|
||||
failed to initialize [GH-3768]
|
||||
* ui: mounting a secret backend will now properly set `max_lease_ttl` and
|
||||
`default_lease_ttl` when specified - previously both fields set
|
||||
* ui: mounting a secret backend will now properly set `max_lease_ttl` and
|
||||
`default_lease_ttl` when specified - previously both fields set
|
||||
`default_lease_ttl`.
|
||||
|
||||
## 0.9.1 (December 21st, 2017)
|
||||
|
@ -452,7 +459,7 @@ DEPRECATIONS/CHANGES:
|
|||
optional and enables configuration of the seal type to use for additional
|
||||
data protection, such as using HSM or Cloud KMS solutions to encrypt and
|
||||
decrypt data.
|
||||
|
||||
|
||||
FEATURES:
|
||||
|
||||
* **RSA Support for Transit Backend**: Transit backend can now generate RSA
|
||||
|
|
Loading…
Reference in New Issue