changelog++

This commit is contained in:
Jeff Mitchell 2018-10-23 13:49:27 -04:00
parent 675fd8fa3e
commit b2ca033bfe
1 changed files with 26 additions and 5 deletions

View File

@ -1,4 +1,9 @@
## 1.0.0 (Unreleased)
## 1.0.0-beta1 (October 23rd, 2018)
NOTE:
A few items didn't make it into beta1; this entry will be updated for beta2
and the final release.
CHANGES:
@ -8,6 +13,17 @@ CHANGES:
be considered as such). Prefixing allows us to be more efficient when
consuming a token, which keeps the critical path of requests faster.
FEATURES:
* **Auto-Unseal in Open Source**: Cloud-based auto-unseal is migrating from
Enterprise to Open Source. We've created a migrator to allow migrating
between Shamir seals and auto unseal methods.
* Batch Tokens: Batch tokens trade off some features of service tokens for no
storage overhead, and in most cases can be used across performance
replication clusters.
* **GCP KMS Secrets Engine**: This new secrets engine provides a Transit-like
pattern to keys stored within GCP Cloud KMS.
IMPROVEMENTS:
* auth/token: New tokens are indexed in storage HMAC-SHA256 instead of SHA1
@ -16,14 +32,18 @@ IMPROVEMENTS:
CHANGES:
* core: HA lock file is no longer copied during `operator migrate` [GH-5503]
* core: HA lock file is no longer copied during `operator migrate` [GH-5503].
We've categorized this as a change, but generally this can be considered
just a bug fix, and no action is needed.
FEATURES:
* Transit Key Trimming: Keys in transit secret engine can now be trimmed to
remove older unused key versions [GH-5388]
remove older unused key versions.
* Web UI support for KV Version 2. Browse, delete, undelete and destroy
individual secret versions in the UI. [GH-5547], [GH-5563]
individual secret versions in the UI.
* Azure Existing Service Principal Support: Credentials can now be generated
against an existing service principal.
IMPROVEMENTS:
@ -32,12 +52,13 @@ IMPROVEMENTS:
This includes names of entities, aliases and groups [GH-5404]
* secrets/aws: Added role-option max_sts_ttl to cap TTL for AWS STS
credentials [GH-5500]
* secret/azure: Credentials can now be generated against an existing service principal.
* secret/database: Allow Cassandra user to be non-superuser so long as it has
role creation permissions [GH-5402]
* secret/radius: Allow setting the NAS Identifier value in the generated
packet [GH-5465]
* secret/ssh: Allow usage of JSON arrays when setting zero addresses [GH-5528]
* secret/transit: Allow trimming unused keys [GH-5388]
* ui: Support KVv2 [GH-5547], [GH-5563]
* ui: Allow viewing and updating Vault license via the UI
* ui: Onboarding will now display your progress through the chosen tutorials
* ui: Dynamic secret backends obfuscate sensitive data by default and