Prep for 0.6.3

This commit is contained in:
Jeff Mitchell 2016-12-06 11:26:29 -05:00
parent dc0f751994
commit f5891b6677
5 changed files with 18 additions and 4 deletions

View File

@ -1,4 +1,4 @@
## Next (Unreleased)
## 0.6.3 (December 6, 2016)
DEPRECATIONS/CHANGES:

View File

@ -10,7 +10,7 @@ RUN apt-get update -y && apt-get install --no-install-recommends -y -q \
git mercurial bzr \
&& rm -rf /var/lib/apt/lists/*
ENV GOVERSION 1.7.3
ENV GOVERSION 1.7.4
RUN mkdir /goroot && mkdir /gopath
RUN curl https://storage.googleapis.com/golang/go${GOVERSION}.linux-amd64.tar.gz \
| tar xvzf - -C /goroot --strip-components=1

View File

@ -9,5 +9,5 @@ func init() {
// A pre-release marker for the version. If this is "" (empty string)
// then it means that it is a final release. Otherwise, this is a pre-release
// such as "dev" (in development), "beta", "rc1", etc.
VersionPrerelease = "dev"
VersionPrerelease = ""
}

View File

@ -2,7 +2,7 @@ set :base_url, "https://www.vaultproject.io/"
activate :hashicorp do |h|
h.name = "vault"
h.version = "0.6.2"
h.version = "0.6.3"
h.github_slug = "hashicorp/vault"
h.website_root = "website"
end

View File

@ -19,3 +19,17 @@ is provided. If you utilize passwordless LDAP binds, `deny_null_bind` must
be set to `false`. Upgrades will keep previous behavior until the LDAP
configuration information is rewritten, at which point the new behavior
will be utilized.
## Request Size Limitation
A maximum request size of 32MB is imposed to prevent a denial of service attack
with arbitrarily large requests.
## Any Audit Backend Successfully Activated Allows Active Duty
Previously, when a new Vault node was taking over service in an HA cluster, all
audit backends were required to be active successfully to take over active
duty. This behavior now matches the behavior of the audit logging system
itself: at least one audit backend must successfully be activated. The server
log contains an error when this occurs. This helps keep a Vault HA cluster
working when there is a misconfiguration on a standby node.