|
2 | 2 | - [v1.0.0 - v1.9.10](CHANGELOG-pre-v1.10.md)
|
3 | 3 | - [v0.11.6 and earlier](CHANGELOG-v0.md)
|
4 | 4 |
|
| 5 | +## 1.18.2 |
| 6 | +### November 21, 2024 |
| 7 | + |
| 8 | +SECURITY: |
| 9 | + |
| 10 | +* raft/snapshotagent (enterprise): upgrade raft-snapshotagent to v0.0.0-20241115202008-166203013d8e |
| 11 | + |
| 12 | +CHANGES: |
| 13 | + |
| 14 | +* auth/azure: Update plugin to v0.19.2 [[GH-28848](https://github.com/hashicorp/vault/pull/28848)] |
| 15 | +* core/ha (enterprise): Failed attempts to become a performance standby node are now using an exponential backoff instead of a |
| 16 | +10 second delay in between retries. The backoff starts at 2s and increases by a factor of two until reaching |
| 17 | +the maximum of 16s. This should make unsealing of the node faster in some cases. |
| 18 | +* login (enterprise): Return a 500 error during logins when performance standby nodes make failed gRPC requests to the active node. [[GH-28807](https://github.com/hashicorp/vault/pull/28807)] |
| 19 | + |
| 20 | +FEATURES: |
| 21 | + |
| 22 | +* **Product Usage Reporting**: Added product usage reporting, which collects anonymous, numerical, non-sensitive data about Vault secrets usage, and adds it to the existing utilization reports. See the [[docs](https://developer.hashicorp.com/vault/docs/enterprise/license/product-usage-reporting)] for more info [[GH-28858](https://github.com/hashicorp/vault/pull/28858)] |
| 23 | + |
| 24 | +IMPROVEMENTS: |
| 25 | + |
| 26 | +* secret/pki: Introduce a new value `always_enforce_err` within `leaf_not_after_behavior` to force the error in all circumstances such as CA issuance and ACME requests if requested TTL values are beyond the issuer's NotAfter. [[GH-28907](https://github.com/hashicorp/vault/pull/28907)] |
| 27 | +* secrets-sync (enterprise): No longer attempt to unsync a random UUID secret name in GCP upon destination creation. |
| 28 | +* ui: Adds navigation for LDAP hierarchical roles [[GH-28824](https://github.com/hashicorp/vault/pull/28824)] |
| 29 | +* website/docs: changed outdated reference to consul-helm repository to consul-k8s repository. [[GH-28825](https://github.com/hashicorp/vault/pull/28825)] |
| 30 | + |
| 31 | +BUG FIXES: |
| 32 | + |
| 33 | +* auth/ldap: Fixed an issue where debug level logging was not emitted. [[GH-28881](https://github.com/hashicorp/vault/pull/28881)] |
| 34 | +* core: Improved an internal helper function that sanitizes paths by adding a check for leading backslashes |
| 35 | +in addition to the existing check for leading slashes. [[GH-28878](https://github.com/hashicorp/vault/pull/28878)] |
| 36 | +* secret/pki: Fix a bug that prevents PKI issuer field enable_aia_url_templating |
| 37 | +to be set to false. [[GH-28832](https://github.com/hashicorp/vault/pull/28832)] |
| 38 | +* secrets-sync (enterprise): Fixed issue where secret-key granularity destinations could sometimes cause a panic when loading a sync status. |
| 39 | +* secrets/aws: Fix issue with static credentials not rotating after restart or leadership change. [[GH-28775](https://github.com/hashicorp/vault/pull/28775)] |
| 40 | +* secrets/ssh: Return the flag `allow_empty_principals` in the read role api when key_type is "ca" [[GH-28901](https://github.com/hashicorp/vault/pull/28901)] |
| 41 | +* secrets/transform (enterprise): Fix nil panic when accessing a partially setup database store. |
| 42 | +* secrets/transit: Fix a race in which responses from the key update api could contain results from another subsequent update [[GH-28839](https://github.com/hashicorp/vault/pull/28839)] |
| 43 | +* ui: Fixes rendering issues of LDAP dynamic and static roles with the same name [[GH-28824](https://github.com/hashicorp/vault/pull/28824)] |
| 44 | + |
5 | 45 | ## 1.18.1
|
6 | 46 | ### October 30, 2024
|
7 | 47 |
|
@@ -248,6 +288,44 @@ use versioned plugins. [[GH-27881](https://github.com/hashicorp/vault/pull/27881
|
248 | 288 | * ui: fixes renew-self being called right after login for non-renewable tokens [[GH-28204](https://github.com/hashicorp/vault/pull/28204)]
|
249 | 289 | * ui: fixes toast (flash) alert message saying "created" when deleting a kv v2 secret [[GH-28093](https://github.com/hashicorp/vault/pull/28093)]
|
250 | 290 |
|
| 291 | +## 1.17.9 Enterprise |
| 292 | +### November 21, 2024 |
| 293 | + |
| 294 | +SECURITY: |
| 295 | + |
| 296 | +* raft/snapshotagent (enterprise): upgrade raft-snapshotagent to v0.0.0-20241115202008-166203013d8e |
| 297 | + |
| 298 | +CHANGES: |
| 299 | + |
| 300 | +* activity log: Deprecated the field "default_report_months". Instead, the billing start time will be used to determine the start time |
| 301 | +when querying the activity log endpoints. [[GH-27350](https://github.com/hashicorp/vault/pull/27350)] |
| 302 | +* core/ha (enterprise): Failed attempts to become a performance standby node are now using an exponential backoff instead of a |
| 303 | +10 second delay in between retries. The backoff starts at 2s and increases by a factor of two until reaching |
| 304 | +the maximum of 16s. This should make unsealing of the node faster in some cases. |
| 305 | +* login (enterprise): Return a 500 error during logins when performance standby nodes make failed gRPC requests to the active node. [[GH-28807](https://github.com/hashicorp/vault/pull/28807)] |
| 306 | + |
| 307 | +FEATURES: |
| 308 | + |
| 309 | +* **Product Usage Reporting**: Added product usage reporting, which collects anonymous, numerical, non-sensitive data about Vault secrets usage, and adds it to the existing utilization reports. See the [[docs](https://developer.hashicorp.com/vault/docs/enterprise/license/product-usage-reporting)] for more info [[GH-28858](https://github.com/hashicorp/vault/pull/28858)] |
| 310 | + |
| 311 | +IMPROVEMENTS: |
| 312 | + |
| 313 | +* secrets-sync (enterprise): No longer attempt to unsync a random UUID secret name in GCP upon destination creation. |
| 314 | +* ui: Adds navigation for LDAP hierarchical roles [[GH-28824](https://github.com/hashicorp/vault/pull/28824)] |
| 315 | + |
| 316 | +BUG FIXES: |
| 317 | + |
| 318 | +* core: Improved an internal helper function that sanitizes paths by adding a check for leading backslashes |
| 319 | +in addition to the existing check for leading slashes. [[GH-28878](https://github.com/hashicorp/vault/pull/28878)] |
| 320 | +* secret/pki: Fix a bug that prevents PKI issuer field enable_aia_url_templating |
| 321 | +to be set to false. [[GH-28832](https://github.com/hashicorp/vault/pull/28832)] |
| 322 | +* secrets-sync (enterprise): Fixed issue where secret-key granularity destinations could sometimes cause a panic when loading a sync status. |
| 323 | +* secrets/aws: Fix issue with static credentials not rotating after restart or leadership change. [[GH-28775](https://github.com/hashicorp/vault/pull/28775)] |
| 324 | +* secrets/ssh: Return the flag `allow_empty_principals` in the read role api when key_type is "ca" [[GH-28901](https://github.com/hashicorp/vault/pull/28901)] |
| 325 | +* secrets/transform (enterprise): Fix nil panic when accessing a partially setup database store. |
| 326 | +* secrets/transit: Fix a race in which responses from the key update api could contain results from another subsequent update [[GH-28839](https://github.com/hashicorp/vault/pull/28839)] |
| 327 | +* ui: Fixes rendering issues of LDAP dynamic and static roles with the same name [[GH-28824](https://github.com/hashicorp/vault/pull/28824)] |
| 328 | + |
251 | 329 | ## 1.17.8 Enterprise
|
252 | 330 | ### October 30, 2024
|
253 | 331 |
|
@@ -653,6 +731,46 @@ autopilot to fail to discover new server versions and so not trigger an upgrade.
|
653 | 731 | * ui: fixed a bug where the replication pages did not update display when navigating between DR and performance [[GH-26325](https://github.com/hashicorp/vault/pull/26325)]
|
654 | 732 | * ui: fixes undefined start time in filename for downloaded client count attribution csv [[GH-26485](https://github.com/hashicorp/vault/pull/26485)]
|
655 | 733 |
|
| 734 | +## 1.16.13 Enterprise |
| 735 | +### November 21, 2024 |
| 736 | + |
| 737 | +**Enterprise LTS:** Vault Enterprise 1.16 is a [Long-Term Support (LTS)](https://developer.hashicorp.com/vault/docs/enterprise/lts) release. |
| 738 | + |
| 739 | +SECURITY: |
| 740 | + |
| 741 | +* raft/snapshotagent (enterprise): upgrade raft-snapshotagent to v0.0.0-20241115202008-166203013d8e |
| 742 | + |
| 743 | +CHANGES: |
| 744 | + |
| 745 | +* activity log: Deprecated the field "default_report_months". Instead, the billing start time will be used to determine the start time |
| 746 | +when querying the activity log endpoints. [[GH-27350](https://github.com/hashicorp/vault/pull/27350)] |
| 747 | +* core/ha (enterprise): Failed attempts to become a performance standby node are now using an exponential backoff instead of a |
| 748 | +10 second delay in between retries. The backoff starts at 2s and increases by a factor of two until reaching |
| 749 | +the maximum of 16s. This should make unsealing of the node faster in some cases. |
| 750 | +* login (enterprise): Return a 500 error during logins when performance standby nodes make failed gRPC requests to the active node. [[GH-28807](https://github.com/hashicorp/vault/pull/28807)] |
| 751 | + |
| 752 | +FEATURES: |
| 753 | + |
| 754 | +* **Product Usage Reporting**: Added product usage reporting, which collects anonymous, numerical, non-sensitive data about Vault secrets usage, and adds it to the existing utilization reports. See the [[docs](https://developer.hashicorp.com/vault/docs/enterprise/license/product-usage-reporting)] for more info [[GH-28858](https://github.com/hashicorp/vault/pull/28858)] |
| 755 | + |
| 756 | +IMPROVEMENTS: |
| 757 | + |
| 758 | +* raft-snapshot (enterprise): add support for managed identity credentials for azure snapshots |
| 759 | +* secrets-sync (enterprise): No longer attempt to unsync a random UUID secret name in GCP upon destination creation. |
| 760 | + |
| 761 | +BUG FIXES: |
| 762 | + |
| 763 | +* auth/ldap: Fixed an issue where debug level logging was not emitted. [[GH-28881](https://github.com/hashicorp/vault/pull/28881)] |
| 764 | +* core: Improved an internal helper function that sanitizes paths by adding a check for leading backslashes |
| 765 | +in addition to the existing check for leading slashes. [[GH-28878](https://github.com/hashicorp/vault/pull/28878)] |
| 766 | +* secret/pki: Fix a bug that prevents PKI issuer field enable_aia_url_templating |
| 767 | +to be set to false. [[GH-28832](https://github.com/hashicorp/vault/pull/28832)] |
| 768 | +* secrets-sync (enterprise): Fixed issue where secret-key granularity destinations could sometimes cause a panic when loading a sync status. |
| 769 | +* secrets/aws: Fix issue with static credentials not rotating after restart or leadership change. [[GH-28775](https://github.com/hashicorp/vault/pull/28775)] |
| 770 | +* secrets/ssh: Return the flag `allow_empty_principals` in the read role api when key_type is "ca" [[GH-28901](https://github.com/hashicorp/vault/pull/28901)] |
| 771 | +* secrets/transform (enterprise): Fix nil panic when accessing a partially setup database store. |
| 772 | +* secrets/transit: Fix a race in which responses from the key update api could contain results from another subsequent update [[GH-28839](https://github.com/hashicorp/vault/pull/28839)] |
| 773 | + |
656 | 774 | ## 1.16.12 Enterprise
|
657 | 775 | ### October 30, 2024
|
658 | 776 |
|
|
0 commit comments