Prep for 0.6.3
This commit is contained in:
parent
dc0f751994
commit
f5891b6677
|
@ -1,4 +1,4 @@
|
|||
## Next (Unreleased)
|
||||
## 0.6.3 (December 6, 2016)
|
||||
|
||||
DEPRECATIONS/CHANGES:
|
||||
|
||||
|
|
|
@ -10,7 +10,7 @@ RUN apt-get update -y && apt-get install --no-install-recommends -y -q \
|
|||
git mercurial bzr \
|
||||
&& rm -rf /var/lib/apt/lists/*
|
||||
|
||||
ENV GOVERSION 1.7.3
|
||||
ENV GOVERSION 1.7.4
|
||||
RUN mkdir /goroot && mkdir /gopath
|
||||
RUN curl https://storage.googleapis.com/golang/go${GOVERSION}.linux-amd64.tar.gz \
|
||||
| tar xvzf - -C /goroot --strip-components=1
|
||||
|
|
|
@ -9,5 +9,5 @@ func init() {
|
|||
// A pre-release marker for the version. If this is "" (empty string)
|
||||
// then it means that it is a final release. Otherwise, this is a pre-release
|
||||
// such as "dev" (in development), "beta", "rc1", etc.
|
||||
VersionPrerelease = "dev"
|
||||
VersionPrerelease = ""
|
||||
}
|
||||
|
|
|
@ -2,7 +2,7 @@ set :base_url, "https://www.vaultproject.io/"
|
|||
|
||||
activate :hashicorp do |h|
|
||||
h.name = "vault"
|
||||
h.version = "0.6.2"
|
||||
h.version = "0.6.3"
|
||||
h.github_slug = "hashicorp/vault"
|
||||
h.website_root = "website"
|
||||
end
|
||||
|
|
|
@ -19,3 +19,17 @@ is provided. If you utilize passwordless LDAP binds, `deny_null_bind` must
|
|||
be set to `false`. Upgrades will keep previous behavior until the LDAP
|
||||
configuration information is rewritten, at which point the new behavior
|
||||
will be utilized.
|
||||
|
||||
## Request Size Limitation
|
||||
|
||||
A maximum request size of 32MB is imposed to prevent a denial of service attack
|
||||
with arbitrarily large requests.
|
||||
|
||||
## Any Audit Backend Successfully Activated Allows Active Duty
|
||||
|
||||
Previously, when a new Vault node was taking over service in an HA cluster, all
|
||||
audit backends were required to be active successfully to take over active
|
||||
duty. This behavior now matches the behavior of the audit logging system
|
||||
itself: at least one audit backend must successfully be activated. The server
|
||||
log contains an error when this occurs. This helps keep a Vault HA cluster
|
||||
working when there is a misconfiguration on a standby node.
|
||||
|
|
Loading…
Reference in New Issue