CL and plugin updates
This commit is contained in:
parent
149e14f8fa
commit
9066bba70a
170
CHANGELOG.md
170
CHANGELOG.md
|
@ -1,21 +1,12 @@
|
||||||
## 1.0.0
|
## 1.0.0
|
||||||
|
|
||||||
IMPROVEMENTS:
|
|
||||||
|
|
||||||
* ui: Allow editing of KV V2 data when a token doesn't have capabilities to
|
|
||||||
read secret metadata [GH-5879]
|
|
||||||
|
|
||||||
BUG FIXES:
|
|
||||||
|
|
||||||
* ui: Update DR Secondary Token generation command [GH-5857]
|
|
||||||
* ui: Fix pagination bug where controls would be rendered once for each
|
|
||||||
item when viewing policies [GH-5866]
|
|
||||||
|
|
||||||
|
|
||||||
## 1.0.0-rc1 (Nov 20th, 2018)
|
|
||||||
|
|
||||||
CHANGES:
|
CHANGES:
|
||||||
|
|
||||||
|
* Tokens are now prefixed by a designation to indicate what type of token they
|
||||||
|
are. Service tokens start with `s.` and batch tokens start with `b.`.
|
||||||
|
Existing tokens will still work (they are all of service type and will be
|
||||||
|
considered as such). Prefixing allows us to be more efficient when consuming
|
||||||
|
a token, which keeps the critical path of requests faster.
|
||||||
* Paths within `auth/token` that allow specifying a token or accessor in the
|
* Paths within `auth/token` that allow specifying a token or accessor in the
|
||||||
URL have been removed. These have been deprecated since March 2016 and
|
URL have been removed. These have been deprecated since March 2016 and
|
||||||
undocumented, but were retained for backwards compatibility. They shouldn't
|
undocumented, but were retained for backwards compatibility. They shouldn't
|
||||||
|
@ -28,35 +19,6 @@ CHANGES:
|
||||||
options map itself cannot be unset once it's set, but the keypairs within the
|
options map itself cannot be unset once it's set, but the keypairs within the
|
||||||
map can be unset if an empty value is provided, with the exception of the
|
map can be unset if an empty value is provided, with the exception of the
|
||||||
`version` keypair which is handled differently for KVv2 purposes.
|
`version` keypair which is handled differently for KVv2 purposes.
|
||||||
|
|
||||||
IMPROVEMENTS:
|
|
||||||
|
|
||||||
* agent: Support for configuring the location of the kubernetes service account
|
|
||||||
[GH-5725]
|
|
||||||
* ui: Empty states have updated styling and link to relevant actions and
|
|
||||||
documentation [GH-5758]
|
|
||||||
|
|
||||||
BUG FIXES:
|
|
||||||
|
|
||||||
* identity: Update group memberships when entity is deleted [GH-5786]
|
|
||||||
* storage/gcs: Send md5 of values to GCS to avoid potential corruption
|
|
||||||
[GH-5804]
|
|
||||||
* ui: Fix the PKI context menu so that items load [GH-5824]
|
|
||||||
* ui: Fix dr secondary operation token generation via the ui [GH-5818]
|
|
||||||
* ui: Allow for secret creation in kv v2 when cas_required=true [GH-5823]
|
|
||||||
* agent: Fix auth when multiple redirects [GH-5814]
|
|
||||||
* secrets/kv: Fix issue where storage version would get incorrectly downgraded
|
|
||||||
[GH-5809]
|
|
||||||
* performance standby: Fix audit table upgrade on standbys [GH-5811]
|
|
||||||
* performance standby: Fix redirect on approle update [GH-5820]
|
|
||||||
* cli: Restore the `-policy-override` flag [GH-5826]
|
|
||||||
* core: Fix rekey progress reset which did not happen under certain
|
|
||||||
circumstances. [GH-5743]
|
|
||||||
|
|
||||||
## 1.0.0-beta2 (November 13th, 2018)
|
|
||||||
|
|
||||||
CHANGES:
|
|
||||||
|
|
||||||
* Agent no longer automatically reauthenticates when new credentials are
|
* Agent no longer automatically reauthenticates when new credentials are
|
||||||
detected. It's not strictly necessary and in some cases was causing
|
detected. It's not strictly necessary and in some cases was causing
|
||||||
reauthentication much more often than intended.
|
reauthentication much more often than intended.
|
||||||
|
@ -76,25 +38,32 @@ CHANGES:
|
||||||
writing custom clients using the Go API library. As before, this can be
|
writing custom clients using the Go API library. As before, this can be
|
||||||
changed to any custom HTTP client by the caller.
|
changed to any custom HTTP client by the caller.
|
||||||
|
|
||||||
CHANGES FROM BETA 1:
|
|
||||||
(Note: these items will be removed from the final 1.0 changelog as they are
|
|
||||||
only breaking changes from beta1)
|
|
||||||
|
|
||||||
* Token Store Roles and Batch Tokens: Roles now default to `default-service`
|
|
||||||
token type, issuing service tokens by default but allowing overriding by the
|
|
||||||
client. They now also support `default-batch` in addition to `service` and
|
|
||||||
`batch`.
|
|
||||||
|
|
||||||
FEATURES:
|
FEATURES:
|
||||||
|
|
||||||
* AppRole support in Vault Agent Auto-Auth: You can now use AppRole
|
* **Auto-Unseal in Open Source**: Cloud-based auto-unseal has been migrated
|
||||||
credentials when having Agent automatically authenticate to Vault.
|
from Enterprise to Open Source. We've created a migrator to allow migrating
|
||||||
* OpenAPI descriptions of mounted backends can be served directly from Vault.
|
between Shamir seals and auto unseal methods.
|
||||||
* Support for Kubernetes Projected Service Account Tokens in Kubernetes auth
|
* Batch Tokens: Batch tokens trade off some features of service tokens for no
|
||||||
* Added ability to wrap secrets and easily copy the wrap token or secret JSON in the UI.
|
storage overhead, and in most cases can be used across performance
|
||||||
|
replication clusters.
|
||||||
|
* Replication Speed Improvements: We've worked hard to speed up a lot of
|
||||||
|
operations when using Vault Enterprise Replication.
|
||||||
|
* **GCP KMS Secrets Engine**: This new secrets engine provides a Transit-like
|
||||||
|
pattern to keys stored within GCP Cloud KMS.
|
||||||
|
* **AppRole support in Vault Agent Auto-Auth**: You can now use AppRole
|
||||||
|
credentials when having Agent automatically authenticate to Vault
|
||||||
|
* **OpenAPI Support**: Descriptions of mounted backends can be served directly
|
||||||
|
from Vault
|
||||||
|
* **Kubernetes Projected Service Account Tokens**: Projected Service Account
|
||||||
|
Tokens are now supported in Kubernetes auth
|
||||||
|
* **Response Wrapping in UI**: Added ability to wrap secrets and easily copy
|
||||||
|
the wrap token or secret JSON in the UI
|
||||||
|
|
||||||
IMPROVEMENTS:
|
IMPROVEMENTS:
|
||||||
|
|
||||||
|
* agent: Support for configuring the location of the kubernetes service account
|
||||||
|
[GH-5725]
|
||||||
|
* auth/token: New tokens are indexed in storage HMAC-SHA256 instead of SHA1
|
||||||
* secret/totp: Allow @ character to be part of key name [GH-5652]
|
* secret/totp: Allow @ character to be part of key name [GH-5652]
|
||||||
* secret/consul: Add support for new policy based tokens added in Consul 1.4
|
* secret/consul: Add support for new policy based tokens added in Consul 1.4
|
||||||
[GH-5586]
|
[GH-5586]
|
||||||
|
@ -104,16 +73,37 @@ IMPROVEMENTS:
|
||||||
* ui: Improved banner and popup design [GH-5672]
|
* ui: Improved banner and popup design [GH-5672]
|
||||||
* ui: Added token type to auth method mount config [GH-5723]
|
* ui: Added token type to auth method mount config [GH-5723]
|
||||||
* ui: Display additonal wrap info when unwrapping. [GH-5664]
|
* ui: Display additonal wrap info when unwrapping. [GH-5664]
|
||||||
|
* ui: Empty states have updated styling and link to relevant actions and
|
||||||
|
documentation [GH-5758]
|
||||||
|
* ui: Allow editing of KV V2 data when a token doesn't have capabilities to
|
||||||
|
read secret metadata [GH-5879]
|
||||||
|
|
||||||
BUG FIXES:
|
BUG FIXES:
|
||||||
|
|
||||||
|
* agent: Fix auth when multiple redirects [GH-5814]
|
||||||
|
* cli: Restore the `-policy-override` flag [GH-5826]
|
||||||
|
* core: Fix rekey progress reset which did not happen under certain
|
||||||
|
circumstances. [GH-5743]
|
||||||
* core: Migration from autounseal to shamir will clean up old keys [GH-5671]
|
* core: Migration from autounseal to shamir will clean up old keys [GH-5671]
|
||||||
|
* identity: Update group memberships when entity is deleted [GH-5786]
|
||||||
|
* replication/perfstandby: Fix audit table upgrade on standbys [GH-5811]
|
||||||
|
* replication/perfstandby: Fix redirect on approle update [GH-5820]
|
||||||
* secrets/azure: Fix valid roles being rejected for duplicate ids despite
|
* secrets/azure: Fix valid roles being rejected for duplicate ids despite
|
||||||
having distinct scopes
|
having distinct scopes
|
||||||
[[GH-16]](https://github.com/hashicorp/vault-plugin-secrets-azure/pull/16)
|
[[GH-16]](https://github.com/hashicorp/vault-plugin-secrets-azure/pull/16)
|
||||||
|
* storage/gcs: Send md5 of values to GCS to avoid potential corruption
|
||||||
|
[GH-5804]
|
||||||
|
* secrets/kv: Fix issue where storage version would get incorrectly downgraded
|
||||||
|
[GH-5809]
|
||||||
* secrets/kv: Disallow empty paths on a `kv put` while accepting empty paths
|
* secrets/kv: Disallow empty paths on a `kv put` while accepting empty paths
|
||||||
for all other operations for backwards compatibility
|
for all other operations for backwards compatibility
|
||||||
[[GH-19]](https://github.com/hashicorp/vault-plugin-secrets-kv/pull/19)
|
[[GH-19]](https://github.com/hashicorp/vault-plugin-secrets-kv/pull/19)
|
||||||
|
* ui: Allow for secret creation in kv v2 when cas_required=true [GH-5823]
|
||||||
|
* ui: Fix dr secondary operation token generation via the ui [GH-5818]
|
||||||
|
* ui: Fix the PKI context menu so that items load [GH-5824]
|
||||||
|
* ui: Update DR Secondary Token generation command [GH-5857]
|
||||||
|
* ui: Fix pagination bug where controls would be rendered once for each
|
||||||
|
item when viewing policies [GH-5866]
|
||||||
* ui: Fix bug where `sys/leases/revoke` required 'sudo' capability to show
|
* ui: Fix bug where `sys/leases/revoke` required 'sudo' capability to show
|
||||||
the revoke button in the UI [GH-5647]
|
the revoke button in the UI [GH-5647]
|
||||||
* ui: Fix issue where certain pages wouldn't render in a namespace [GH-5692]
|
* ui: Fix issue where certain pages wouldn't render in a namespace [GH-5692]
|
||||||
|
@ -122,52 +112,20 @@ BUG FIXES:
|
||||||
|
|
||||||
BUG FIXES:
|
BUG FIXES:
|
||||||
|
|
||||||
|
* agent: Fix issue when specifying two file sinks [GH-5610]
|
||||||
* auth/userpass: Fix minor timing issue that could leak the presence of a
|
* auth/userpass: Fix minor timing issue that could leak the presence of a
|
||||||
username [GH-5614]
|
username [GH-5614]
|
||||||
|
* autounseal/alicloud: Fix issue interacting with the API (Enterprise)
|
||||||
|
* autounseal/azure: Fix key version tracking (Enterprise)
|
||||||
* cli: Fix panic that could occur if parameters were not provided [GH-5603]
|
* cli: Fix panic that could occur if parameters were not provided [GH-5603]
|
||||||
* core: Fix buggy behavior if trying to remount into a namespace
|
* core: Fix buggy behavior if trying to remount into a namespace
|
||||||
* identity: Fix duplication of entity alias entity during alias transfer
|
* identity: Fix duplication of entity alias entity during alias transfer
|
||||||
between entities [GH-5733]
|
between entities [GH-5733]
|
||||||
|
* namespaces: Fix tuning of auth mounts in a namespace
|
||||||
* ui: Fix bug where editing secrets as JSON doesn't save properly [GH-5660]
|
* ui: Fix bug where editing secrets as JSON doesn't save properly [GH-5660]
|
||||||
* ui: Fix issue where IE 11 didn't render the UI and also had a broken form
|
* ui: Fix issue where IE 11 didn't render the UI and also had a broken form
|
||||||
when trying to use tool/hash [GH-5714]
|
when trying to use tool/hash [GH-5714]
|
||||||
* agent: Fix issue when specifying two file sinks [GH-5610]
|
|
||||||
* autounseal/alicloud: Fix issue interacting with the API (Enterprise)
|
|
||||||
* autounseal/azure: Fix key version tracking (Enterprise)
|
|
||||||
* namespaces: Fix tuning of auth mounts in a namespace
|
|
||||||
|
|
||||||
## 1.0.0-beta1 (October 23rd, 2018)
|
|
||||||
|
|
||||||
NOTE:
|
|
||||||
|
|
||||||
A few items didn't make it into beta1; this entry will be updated for beta2
|
|
||||||
and the final release.
|
|
||||||
|
|
||||||
CHANGES:
|
|
||||||
|
|
||||||
* core: Tokens are now prefixed by a designation to indicate what type of
|
|
||||||
token they are. Service tokens start with `s.` and batch tokens start with
|
|
||||||
`b.`. Existing tokens will still work (they are all of service type and will
|
|
||||||
be considered as such). Prefixing allows us to be more efficient when
|
|
||||||
consuming a token, which keeps the critical path of requests faster.
|
|
||||||
|
|
||||||
FEATURES:
|
|
||||||
|
|
||||||
* **Auto-Unseal in Open Source**: Cloud-based auto-unseal is migrating from
|
|
||||||
Enterprise to Open Source. We've created a migrator to allow migrating
|
|
||||||
between Shamir seals and auto unseal methods.
|
|
||||||
* Batch Tokens: Batch tokens trade off some features of service tokens for no
|
|
||||||
storage overhead, and in most cases can be used across performance
|
|
||||||
replication clusters.
|
|
||||||
* Replication Speed Improvements: We've worked hard to speed up a lot of
|
|
||||||
operations when using Vault Enterprise Replication.
|
|
||||||
* **GCP KMS Secrets Engine**: This new secrets engine provides a Transit-like
|
|
||||||
pattern to keys stored within GCP Cloud KMS.
|
|
||||||
|
|
||||||
IMPROVEMENTS:
|
|
||||||
|
|
||||||
* auth/token: New tokens are indexed in storage HMAC-SHA256 instead of SHA1
|
|
||||||
|
|
||||||
## 0.11.4 (October 23rd, 2018)
|
## 0.11.4 (October 23rd, 2018)
|
||||||
|
|
||||||
CHANGES:
|
CHANGES:
|
||||||
|
@ -178,12 +136,12 @@ CHANGES:
|
||||||
|
|
||||||
FEATURES:
|
FEATURES:
|
||||||
|
|
||||||
* Transit Key Trimming: Keys in transit secret engine can now be trimmed to
|
* **Transit Key Trimming**: Keys in transit secret engine can now be trimmed to
|
||||||
remove older unused key versions.
|
remove older unused key versions
|
||||||
* Web UI support for KV Version 2. Browse, delete, undelete and destroy
|
* **Web UI support for KV Version 2**: Browse, delete, undelete and destroy
|
||||||
individual secret versions in the UI.
|
individual secret versions in the UI
|
||||||
* Azure Existing Service Principal Support: Credentials can now be generated
|
* **Azure Existing Service Principal Support**: Credentials can now be generated
|
||||||
against an existing service principal.
|
against an existing service principal
|
||||||
|
|
||||||
IMPROVEMENTS:
|
IMPROVEMENTS:
|
||||||
|
|
||||||
|
@ -254,13 +212,13 @@ CHANGES:
|
||||||
|
|
||||||
FEATURES:
|
FEATURES:
|
||||||
|
|
||||||
* AWS Secret Engine Root Credential Rotation: The credential used by the AWS
|
* **AWS Secret Engine Root Credential Rotation**: The credential used by the AWS
|
||||||
secret engine can now be rotated, to ensure that only Vault knows the
|
secret engine can now be rotated, to ensure that only Vault knows the
|
||||||
credentials it is using. [GH-5140]
|
credentials it is using [GH-5140]
|
||||||
* Storage Backend Migrator: A new `operator migrate` command allows offline
|
* **Storage Backend Migrator**: A new `operator migrate` command allows offline
|
||||||
migration of data between two storage backends.
|
migration of data between two storage backends
|
||||||
* AliCloud KMS Auto Unseal and Seal Wrap Support (Enterprise): AliCloud KMS can now be used a support seal for
|
* **AliCloud KMS Auto Unseal and Seal Wrap Support (Enterprise)**: AliCloud KMS can now be used a support seal for
|
||||||
Auto Unseal and Seal Wrapping.
|
Auto Unseal and Seal Wrapping
|
||||||
|
|
||||||
BUG FIXES:
|
BUG FIXES:
|
||||||
|
|
||||||
|
|
|
@ -109,6 +109,12 @@ func (b *kubeAuthBackend) pathLogin() framework.OperationFunc {
|
||||||
Period: role.Period,
|
Period: role.Period,
|
||||||
Alias: &logical.Alias{
|
Alias: &logical.Alias{
|
||||||
Name: serviceAccount.uid(),
|
Name: serviceAccount.uid(),
|
||||||
|
Metadata: map[string]string{
|
||||||
|
"service_account_uid": serviceAccount.uid(),
|
||||||
|
"service_account_name": serviceAccount.name(),
|
||||||
|
"service_account_namespace": serviceAccount.namespace(),
|
||||||
|
"service_account_secret_name": serviceAccount.SecretName,
|
||||||
|
},
|
||||||
},
|
},
|
||||||
InternalData: map[string]interface{}{
|
InternalData: map[string]interface{}{
|
||||||
"role": roleName,
|
"role": roleName,
|
||||||
|
|
|
@ -1437,10 +1437,10 @@
|
||||||
"revisionTime": "2018-10-31T19:59:42Z"
|
"revisionTime": "2018-10-31T19:59:42Z"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"checksumSHA1": "8J4z30a2oTqSPQYOaT4j/jiZuNE=",
|
"checksumSHA1": "Ldg2jQeyPrpAupyQq4lRVN+jfFY=",
|
||||||
"path": "github.com/hashicorp/vault-plugin-auth-kubernetes",
|
"path": "github.com/hashicorp/vault-plugin-auth-kubernetes",
|
||||||
"revision": "5328b889a921243d6e19cda38fb2c31a48cba2b2",
|
"revision": "091d9e5d5fabce920533eff31ad778778992a671",
|
||||||
"revisionTime": "2018-11-01T19:05:09Z"
|
"revisionTime": "2018-11-30T16:25:33Z"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"checksumSHA1": "PmhyvCKVlEMEP6JO31ozW+CBIiE=",
|
"checksumSHA1": "PmhyvCKVlEMEP6JO31ozW+CBIiE=",
|
||||||
|
|
Loading…
Reference in New Issue