From a90b29754e855493ec87d0ed11a02241f2da6bda Mon Sep 17 00:00:00 2001 From: Steven Clark Date: Mon, 23 May 2022 11:53:49 -0400 Subject: [PATCH] Add various missing PKI related changelog entries (#15500) * Add various missing PKI related changelog entries * Fix typo --- CHANGELOG.md | 13 ++++--------- changelog/14975.txt | 5 +++++ changelog/15004.txt | 4 ++++ changelog/15100.txt | 4 ++++ changelog/15152.txt | 4 ++++ changelog/15155.txt | 5 +++++ changelog/15179.txt | 4 ++++ changelog/15211.txt | 6 ++++++ changelog/15277.txt | 13 ++++--------- 9 files changed, 40 insertions(+), 18 deletions(-) create mode 100644 changelog/14975.txt create mode 100644 changelog/15004.txt create mode 100644 changelog/15100.txt create mode 100644 changelog/15152.txt create mode 100644 changelog/15155.txt create mode 100644 changelog/15179.txt create mode 100644 changelog/15211.txt diff --git a/CHANGELOG.md b/CHANGELOG.md index 4d0c61648..607b82400 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -16,15 +16,10 @@ endpoints in favor of [autoloaded licenses](https://www.vaultproject.io/docs/ent FEATURES: -* **Allows Multiple Issuer Certificates to enable Non-Disruptive -Intermediate/Root Certificate Rotation**: This introduces /keys and /issuers -endpoints to allow import, generation and configuration of any number of keys -or issuers that can be used to issue and revoke certificates. Keys and Issuers -can be referred to by (a) a unique UUID; (b) a name; (c) “default”. If an -issuer existed prior to this feature, that issuer will be tagged by a migration -as “default” to allow backwards compatible calls which don’t specify an issuer. -Creation of new roles will assume an issuer of “default” unless otherwise -specified. This default can be configured at /config/issuers and /config/keys. [[GH-15277](https://github.com/hashicorp/vault/pull/15277)] +* **Non-Disruptive Intermediate/Root Certificate Rotation**: This allows +import, generation and configuration of any number of keys and/or issuers +within a PKI mount, providing operators the ability to rotate certificates +in place without affecting existing client configurations. [[GH-15277](https://github.com/hashicorp/vault/pull/15277)] * api/command: Global -output-policy flag to determine minimum required policy HCL for a given operation [[GH-14899](https://github.com/hashicorp/vault/pull/14899)] * nomad: Bootstrap Nomad ACL system if no token is provided [[GH-12451](https://github.com/hashicorp/vault/pull/12451)] * storage/dynamodb: Added `AWS_DYNAMODB_REGION` environment variable. [[GH-15054](https://github.com/hashicorp/vault/pull/15054)] diff --git a/changelog/14975.txt b/changelog/14975.txt new file mode 100644 index 000000000..34de9a7b6 --- /dev/null +++ b/changelog/14975.txt @@ -0,0 +1,5 @@ +```release-note:change +secrets/pki: existing Generate Root (pki/root/generate/:type), +Set Signed Intermediate (/pki/intermediate/set-signed) APIs will +add new issuers/keys to a mount instead of warning that an existing CA exists +``` \ No newline at end of file diff --git a/changelog/15004.txt b/changelog/15004.txt new file mode 100644 index 000000000..dc1fc2d08 --- /dev/null +++ b/changelog/15004.txt @@ -0,0 +1,4 @@ +```release-note:change +secrets/pki: existing Delete Root API (pki/root) will now delete all issuers +and keys within the mount path. +``` \ No newline at end of file diff --git a/changelog/15100.txt b/changelog/15100.txt new file mode 100644 index 000000000..0b4a71606 --- /dev/null +++ b/changelog/15100.txt @@ -0,0 +1,4 @@ +```release-note:change +secrets/pki: Existing CRL API (/pki/crl) now returns an X.509 v2 CRL instead +of a v1 CRL. +``` \ No newline at end of file diff --git a/changelog/15152.txt b/changelog/15152.txt new file mode 100644 index 000000000..e2e3c0314 --- /dev/null +++ b/changelog/15152.txt @@ -0,0 +1,4 @@ +```release-note:improvement +secrets/pki: Allow operators to control the issuing certificate behavior when +the requested TTL is beyond the NotAfter value of the signing certificate +``` \ No newline at end of file diff --git a/changelog/15155.txt b/changelog/15155.txt new file mode 100644 index 000000000..c65e1c052 --- /dev/null +++ b/changelog/15155.txt @@ -0,0 +1,5 @@ +```release-note:change +secrets/pki: The `ca_chain` response field within issuing (/pki/issue/:role) +and signing APIs will now include the root CA certificate if the mount is +aware of it. +``` \ No newline at end of file diff --git a/changelog/15179.txt b/changelog/15179.txt new file mode 100644 index 000000000..00944f67f --- /dev/null +++ b/changelog/15179.txt @@ -0,0 +1,4 @@ +```release-note:bug +secrets/pki: CRLs on performance secondary clusters are now automatically +rebuilt upon changes to the list of issuers. +``` \ No newline at end of file diff --git a/changelog/15211.txt b/changelog/15211.txt new file mode 100644 index 000000000..da7faa9d2 --- /dev/null +++ b/changelog/15211.txt @@ -0,0 +1,6 @@ +```release-note:change +secrets/pki: A new aliased api path (/pki/issuer/:issuer_ref/sign-self-issued) +providing the same functionality as the existing API(/pki/root/sign-self-issued) +does not require sudo capabilities but the latter still requires it in an +effort to maintain backwards compatibility. +``` \ No newline at end of file diff --git a/changelog/15277.txt b/changelog/15277.txt index 3b23d0e44..91a375459 100644 --- a/changelog/15277.txt +++ b/changelog/15277.txt @@ -1,11 +1,6 @@ ```release-note:feature -**Allows Multiple Issuer Certificates to enable Non-Disruptive -Intermediate/Root Certificate Rotation**: This introduces /keys and /issuers -endpoints to allow import, generation and configuration of any number of keys -or issuers that can be used to issue and revoke certificates. Keys and Issuers -can be referred to by (a) a unique UUID; (b) a name; (c) “default”. If an -issuer existed prior to this feature, that issuer will be tagged by a migration -as “default” to allow backwards compatible calls which don’t specify an issuer. -Creation of new roles will assume an issuer of “default” unless otherwise -specified. This default can be configured at /config/issuers and /config/keys. +**Non-Disruptive Intermediate/Root Certificate Rotation**: This allows +import, generation and configuration of any number of keys and/or issuers +within a PKI mount, providing operators the ability to rotate certificates +in place without affecting existing client configurations. ```