Skip to content

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Apr 25, 2025

Bumps github.com/hashicorp/vault/api from 1.15.0 to 1.16.0.

Release notes

Sourced from github.com/hashicorp/vault/api's releases.

v1.16.0

1.16.0

March 26, 2024

SECURITY:

  • auth/cert: compare public keys of trusted non-CA certificates with incoming client certificates to prevent trusting certs with the same serial number but not the same public/private key. [GH-25649]
  • auth/cert: validate OCSP response was signed by the expected issuer and serial number matched request [GH-26091]
  • secrets/transit: fix a regression that was honoring nonces provided in non-convergent modes during encryption. [GH-22852]

CHANGES:

  • Upgrade grpc to v1.58.3 [GH-23703]
  • Upgrade x/net to v0.17.0 [GH-23703]
  • api: add the enterprise parameter to the /sys/health endpoint [GH-24270]
  • auth/alicloud: Update plugin to v0.16.1 [GH-25014]
  • auth/alicloud: Update plugin to v0.17.0 [GH-25217]
  • auth/approle: Normalized error response messages when invalid credentials are provided [GH-23786]
  • auth/azure: Update plugin to v0.16.1 [GH-22795]
  • auth/azure: Update plugin to v0.17.0 [GH-25258]
  • auth/cf: Update plugin to v0.16.0 [GH-25196]
  • auth/gcp: Update plugin to v0.16.2 [GH-25233]
  • auth/jwt: Update plugin to v0.19.0 [GH-24972]
  • auth/jwt: Update plugin to v0.20.0 [GH-25326]
  • auth/jwt: Update plugin to v0.20.1 [GH-25937]
  • auth/kerberos: Update plugin to v0.10.1 [GH-22797]
  • auth/kerberos: Update plugin to v0.11.0 [GH-25232]
  • auth/kubernetes: Update plugin to v0.18.0 [GH-25207]
  • auth/oci: Update plugin to v0.14.1 [GH-22774]
  • auth/oci: Update plugin to v0.15.1 [GH-25245]
  • cli: Using vault plugin reload with -plugin in the root namespace will now reload the plugin across all namespaces instead of just the root namespace. [GH-24878]
  • cli: vault plugin info and vault plugin deregister now require 2 positional arguments instead of accepting either 1 or 2. [GH-24250]
  • core (enterprise): Seal High Availability (HA) must be enabled by enable_multiseal in configuration.
  • core: Bump Go version to 1.21.8.
  • database/couchbase: Update plugin to v0.10.1 [GH-25275]
  • database/elasticsearch: Update plugin to v0.14.0 [GH-25263]
  • database/mongodbatlas: Update plugin to v0.11.0 [GH-25264]
  • database/redis-elasticache: Update plugin to v0.3.0 [GH-25296]
  • database/redis: Update plugin to v0.2.3 [GH-25289]
  • database/snowflake: Update plugin to v0.10.0 [GH-25143]
  • database/snowflake: Update plugin to v0.9.1 [GH-25020]
  • events: Remove event noficiations websocket endpoint in non-Enterprise [GH-25640]
  • events: Source URL is now vault://{vault node} [GH-24201]
  • identity (enterprise): POST requests to the /identity/entity/merge endpoint are now always forwarded from standbys to the active node. [GH-24325]
  • plugins/database: Reading connection config at database/config/:name will now return a computed running_plugin_version field if a non-builtin version is running. [GH-25105]
  • plugins: Add a warning to the response from sys/plugins/reload/backend if no plugins were reloaded. [GH-24512]
  • plugins: By default, environment variables provided during plugin registration will now take precedence over system environment variables.

... (truncated)

Changelog

Sourced from github.com/hashicorp/vault/api's changelog.

1.15.16 Enterprise

October 09, 2024

SECURITY:

  • secrets/identity: A privileged Vault operator with write permissions to the root namespace's identity endpoint could escalate their privileges to Vault's root policy (CVE-2024-9180) HCSEC-2024-21

IMPROVEMENTS:

  • core: log at level ERROR rather than INFO when all seals are unhealthy. [GH-28564]

BUG FIXES:

  • auth/cert: When using ocsp_ca_certificates, an error was produced though extra certs validation succeeded. [GH-28597]
  • auth/token: Fix token TTL calculation so that it uses max_lease_ttl tune value for tokens created via auth/token/create. [GH-28498]

1.15.15 Enterprise

September 25, 2024

SECURITY:

CHANGES:

  • core: Bump Go version to 1.22.7.
  • secrets/ssh: Add a flag, allow_empty_principals to allow keys or certs to apply to any user/principal. [GH-28466]

BUG FIXES:

  • secret/aws: Fixed potential panic after step-down and the queue has not repopulated. [GH-28330]
  • auth/cert: During certificate validation, OCSP requests are debug logged even if Vault's log level is above DEBUG. [GH-28450]
  • auth/cert: ocsp_ca_certificates field was not honored when validating OCSP responses signed by a CA that did not issue the certificate. [GH-28309]
  • auth: Updated error handling for missing login credentials in AppRole and UserPass auth methods to return a 400 error instead of a 500 error. [GH-28441]
  • core: Fixed an issue where maximum request duration timeout was not being added to all requests containing strings sys/monitor and sys/events. With this change, timeout is now added to all requests except monitor and events endpoint. [GH-28230]

1.15.14 Enterprise

August 29, 2024

CHANGES:

  • activity (enterprise): filter all fields in client count responses by the request namespace [GH-27790]
  • core: Bump Go version to 1.22.6

IMPROVEMENTS:

  • activity log: Changes how new client counts in the current month are estimated, in order to return more visibly sensible totals. [GH-27547]
  • activity: /sys/internal/counters/activity will now include a warning if the specified usage period contains estimated client counts. [GH-28068]
  • cli: vault operator usage will now include a warning if the specified usage period contains estimated client counts. [GH-28068]
  • core/activity: Ensure client count queries that include the current month return consistent results by sorting the clients before performing estimation [GH-28062]

... (truncated)

Commits
  • c20eae3 [VAULT-25372] This is an automated pull request to build all artifacts for a ...
  • 6f4631e backport of commit 792eb3b8c314fc82b46883fcf61227687026829d (#26132)
  • 314b34d Backport of doc: Add kault library reference into release/1.16.x (#26130)
  • 6ff205f Backport of Clarify wrapping token language into release/1.16.x (#26126)
  • 5875218 backport of commit de7c905477d53391bed6a404d43f8ce3789d0a8e (#26128)
  • d623bce backport of commit f661f4354ceb36bc9208f5474a19355d3a1016fe (#26124)
  • 4bfb027 backport of commit fa469f8bdc469570b8edaa72517433305ce2e26d (#26122)
  • bc9c844 backport of commit 3df09357b25b5180b2147f35dd669d83f37ac547 (#26121)
  • 6a694d0 Backport of Docs/vault 23837/sync doc update into release/1.16.x (#26058)
  • 84bc41c backport of commit 7b939bdbfd628b3870473f840a9ef5aee228927f (#26117)
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Bumps [github.com/hashicorp/vault/api](https://github.com/hashicorp/vault) from 1.15.0 to 1.16.0.
- [Release notes](https://github.com/hashicorp/vault/releases)
- [Changelog](https://github.com/hashicorp/vault/blob/main/CHANGELOG-v1.10-v1.15.md)
- [Commits](hashicorp/vault@v1.15.0...v1.16.0)

---
updated-dependencies:
- dependency-name: github.com/hashicorp/vault/api
  dependency-version: 1.16.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file go Pull requests that update Go code labels Apr 25, 2025
@dependabot dependabot bot requested a review from fin09pcap as a code owner April 25, 2025 04:12
@fin09pcap fin09pcap merged commit 2009ed8 into main Apr 26, 2025
3 checks passed
@dependabot dependabot bot deleted the dependabot/go_modules/github.com/hashicorp/vault/api-1.16.0 branch April 26, 2025 00:02
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file go Pull requests that update Go code
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant