Vault 1.13.0 Release Notes (#19360)
* Adding Vault 1.13.0 Release Notes * Add OpenAPI Go and .NET client libraries to the list * Add the 'UI wizard removal' to the release note
This commit is contained in:
parent
4fd467a53b
commit
cd7f7cc131
|
@ -0,0 +1,113 @@
|
|||
---
|
||||
layout: docs
|
||||
page_title: 1.13.0
|
||||
description: |-
|
||||
This page contains release notes for Vault 1.13.0
|
||||
---
|
||||
|
||||
# Vault 1.13.0 Release Notes
|
||||
|
||||
**Software Release date:** March 1, 2023
|
||||
|
||||
**Summary:** Vault Release 1.13.0 offers features and enhancements that improve
|
||||
the user experience while solving critical issues previously encountered by our
|
||||
customers. We are providing an overview of improvements in this set of release
|
||||
notes.
|
||||
|
||||
We encourage you to [upgrade](/vault/docs/upgrading) to the latest release of
|
||||
Vault to take advantage of the new benefits provided. With this latest release,
|
||||
we offer solutions to critical feature gaps that were identified previously.
|
||||
Please refer to the
|
||||
[Changelog](https://github.com/hashicorp/vault/blob/main/CHANGELOG.md#1130-rc1)
|
||||
within the Vault release for further information on product improvements,
|
||||
including a comprehensive list of bug fixes.
|
||||
|
||||
Some of these enhancements and changes in this release include the following:
|
||||
|
||||
- **PKI improvements:**
|
||||
- **Cross Cluster PKI Certificate Revocation:** Introducing a new unified
|
||||
OCSP responder and CRL builder that enables a certificate revocations and
|
||||
CRL view across clusters for a given PKI mount.
|
||||
- **PKI UI Beta:** New UI introducing cross-signing flow, overview page,
|
||||
roles and keys view.
|
||||
- **Health Checks:** Provide a health overview of PKI mounts for proactive
|
||||
actions and troubleshooting.
|
||||
- **Command Line:** Simplified CLI to discover, rotate issuers and related
|
||||
commands for PKI mounts
|
||||
|
||||
- **Azure Auth Improvements:**
|
||||
- **Rotate-root support:** Add the ability to rotate the root account's
|
||||
client secret defined in the auth method's configuration via the new
|
||||
`rotate-root` endpoint.
|
||||
- **Managed Identities authentication:** The auth method now allows any Azure
|
||||
resource that supports managed identities to authenticate with Vault.
|
||||
- **VMSS Flex authentication:** Add support for Virtual Machine Scale Set
|
||||
(VMSS) Flex authentication.
|
||||
|
||||
- **GCP Secrets Impersonated Account Support:** Add support for GCP service
|
||||
account impersonation, allowing callers to generate a GCP access token without
|
||||
requiring Vault to store or retrieve a GCP service account key for each role.
|
||||
- **Managed Keys in Transit Engine:** Support for offloading Transit Key
|
||||
operations to HSMs/external KMS.
|
||||
- **KMIP Secret Engine Enhancements:** Implemented Asymmetric Key Lifecycle
|
||||
Server and Advanced Cryptographic Server profiles. Added support for RSA keys
|
||||
and operations such as: MAC, MAC Verify, Sign, Sign Verify, RNG Seed and RNG
|
||||
Retrieve.
|
||||
- **Vault as a SSM:** Support is planned for an upcoming Vault PKCS#11 Provider
|
||||
version to include mechanisms for encryption, decryption, signing and
|
||||
signature verification for AES and RSA keys.
|
||||
- **Replication (enterprise):** We fixed a bug that could cause a cluster to
|
||||
wind up in a permanent merkle-diff/merkle-sync loop and never enter
|
||||
stream-wals, particularly in cases of high write loads on the primary cluster.
|
||||
- **Share Secrets in Independent Namespaces (enterprise):** You can now add
|
||||
users from namespaces outside a namespace hierarchy to a group in a given
|
||||
namespace hierarchy. For Vault Agent, you can now grant it access to secrets
|
||||
outside the namespace where it authenticated, and reduce the number of Agents
|
||||
you need to run.
|
||||
- **User Lockout:** Vault now supports configuration to lock out users when they
|
||||
have consecutive failed login attempts.
|
||||
- **Event System (Alpha):** Vault has a new experimental event system. Events
|
||||
are currently only generated on writes to the KV secrets engine, but external
|
||||
plugins can also be updated to start generating events.
|
||||
- **Kubernetes authentication plugin bug fix:** Ensures a consistent TLS
|
||||
configuration for all k8s API requests. This fixes a bug where it was possible
|
||||
for the http.Client's Transport to be missing the necessary root CAs to ensure
|
||||
that all TLS connections between the auth engine and the Kubernetes API were
|
||||
validated against the configured set of CA certificates.
|
||||
- **Kubernetes Secretes Engine on Vault UI:** Introducing Kubernetes secret
|
||||
engine support on the UI
|
||||
- **Client Count UI improvements:** Combining current month and previous history
|
||||
into one dashboard
|
||||
- **OCSP Support in the TLS Certificate Auth Method:** The auth method now can
|
||||
check for revoked certificates using the OCSP protocol.
|
||||
- **UI Wizard removal:** The UI Wizard has been removed from the UI since the
|
||||
information was occasionally out-of-date and did not align with the latest
|
||||
changes. A new and enhanced UI experience is planned in a future release.
|
||||
|
||||
- **Vault Agent improvements:**
|
||||
- Auto-auth introduced `token_file` method which reads an existing token from
|
||||
a file. The token file method is designed for development and testing. It
|
||||
is not suitable for production deployment.
|
||||
- Listeners for the Vault Agent can define a role set to `metrics_only` so
|
||||
that a service can be configured to listen on a particular port to collect
|
||||
metrics.
|
||||
- Vault Agent can read configurations from multiple files.
|
||||
- Users can specify the log file path using the `-log-file` command flag or
|
||||
`VAULT_LOG_FILE` environment variable. This is particularly useful when
|
||||
Vault Agent is running as a Windows service.
|
||||
|
||||
- **OpenAPI-based Go & .NET Client Libraries (Public Beta):** Use the new Go &
|
||||
.NET client libraries to interact with the Vault API from your applications.
|
||||
- [OpenAPI-based Go client library](https://github.com/hashicorp/vault-client-go/)
|
||||
- [OpenAPI-based .NET client library](https://github.com/hashicorp/vault-client-dotnet/)
|
||||
|
||||
## Known issues
|
||||
|
||||
There are no known issues documented for this release.
|
||||
|
||||
## Feature Deprecations and EOL
|
||||
|
||||
Please refer to the [Deprecation Plans and Notice](/vault/docs/deprecation) page
|
||||
for up-to-date information on feature deprecations and plans. A [Feature
|
||||
Deprecation FAQ](/vault/docs/deprecation/faq) page addresses questions about
|
||||
decisions made about Vault feature deprecations.
|
|
@ -2001,6 +2001,10 @@
|
|||
"title": "Overview",
|
||||
"path": "release-notes"
|
||||
},
|
||||
{
|
||||
"title": "1.13.0",
|
||||
"path": "release-notes/1.13.0"
|
||||
},
|
||||
{
|
||||
"title": "1.12.0",
|
||||
"path": "release-notes/1.12.0"
|
||||
|
|
Loading…
Reference in New Issue