Skip to content

Commit d217d80

Browse files
authored
Changelog for 1.18.2, 1.17.9, 1.16.13 (#28986)
* Changelog for 1.18.2, 1.17.9, 1.16.13 * Fix stuff that got mangled between 1.16.12 and 1.16.13
1 parent b9d0b7a commit d217d80

File tree

1 file changed

+118
-0
lines changed

1 file changed

+118
-0
lines changed

CHANGELOG.md

+118
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,46 @@
22
- [v1.0.0 - v1.9.10](CHANGELOG-pre-v1.10.md)
33
- [v0.11.6 and earlier](CHANGELOG-v0.md)
44

5+
## 1.18.2
6+
### November 21, 2024
7+
8+
SECURITY:
9+
10+
* raft/snapshotagent (enterprise): upgrade raft-snapshotagent to v0.0.0-20241115202008-166203013d8e
11+
12+
CHANGES:
13+
14+
* auth/azure: Update plugin to v0.19.2 [[GH-28848](https://github.com/hashicorp/vault/pull/28848)]
15+
* core/ha (enterprise): Failed attempts to become a performance standby node are now using an exponential backoff instead of a
16+
10 second delay in between retries. The backoff starts at 2s and increases by a factor of two until reaching
17+
the maximum of 16s. This should make unsealing of the node faster in some cases.
18+
* login (enterprise): Return a 500 error during logins when performance standby nodes make failed gRPC requests to the active node. [[GH-28807](https://github.com/hashicorp/vault/pull/28807)]
19+
20+
FEATURES:
21+
22+
* **Product Usage Reporting**: Added product usage reporting, which collects anonymous, numerical, non-sensitive data about Vault secrets usage, and adds it to the existing utilization reports. See the [[docs](https://developer.hashicorp.com/vault/docs/enterprise/license/product-usage-reporting)] for more info [[GH-28858](https://github.com/hashicorp/vault/pull/28858)]
23+
24+
IMPROVEMENTS:
25+
26+
* secret/pki: Introduce a new value `always_enforce_err` within `leaf_not_after_behavior` to force the error in all circumstances such as CA issuance and ACME requests if requested TTL values are beyond the issuer's NotAfter. [[GH-28907](https://github.com/hashicorp/vault/pull/28907)]
27+
* secrets-sync (enterprise): No longer attempt to unsync a random UUID secret name in GCP upon destination creation.
28+
* ui: Adds navigation for LDAP hierarchical roles [[GH-28824](https://github.com/hashicorp/vault/pull/28824)]
29+
* website/docs: changed outdated reference to consul-helm repository to consul-k8s repository. [[GH-28825](https://github.com/hashicorp/vault/pull/28825)]
30+
31+
BUG FIXES:
32+
33+
* auth/ldap: Fixed an issue where debug level logging was not emitted. [[GH-28881](https://github.com/hashicorp/vault/pull/28881)]
34+
* core: Improved an internal helper function that sanitizes paths by adding a check for leading backslashes
35+
in addition to the existing check for leading slashes. [[GH-28878](https://github.com/hashicorp/vault/pull/28878)]
36+
* secret/pki: Fix a bug that prevents PKI issuer field enable_aia_url_templating
37+
to be set to false. [[GH-28832](https://github.com/hashicorp/vault/pull/28832)]
38+
* secrets-sync (enterprise): Fixed issue where secret-key granularity destinations could sometimes cause a panic when loading a sync status.
39+
* secrets/aws: Fix issue with static credentials not rotating after restart or leadership change. [[GH-28775](https://github.com/hashicorp/vault/pull/28775)]
40+
* secrets/ssh: Return the flag `allow_empty_principals` in the read role api when key_type is "ca" [[GH-28901](https://github.com/hashicorp/vault/pull/28901)]
41+
* secrets/transform (enterprise): Fix nil panic when accessing a partially setup database store.
42+
* secrets/transit: Fix a race in which responses from the key update api could contain results from another subsequent update [[GH-28839](https://github.com/hashicorp/vault/pull/28839)]
43+
* ui: Fixes rendering issues of LDAP dynamic and static roles with the same name [[GH-28824](https://github.com/hashicorp/vault/pull/28824)]
44+
545
## 1.18.1
646
### October 30, 2024
747

@@ -248,6 +288,44 @@ use versioned plugins. [[GH-27881](https://github.com/hashicorp/vault/pull/27881
248288
* ui: fixes renew-self being called right after login for non-renewable tokens [[GH-28204](https://github.com/hashicorp/vault/pull/28204)]
249289
* ui: fixes toast (flash) alert message saying "created" when deleting a kv v2 secret [[GH-28093](https://github.com/hashicorp/vault/pull/28093)]
250290

291+
## 1.17.9 Enterprise
292+
### November 21, 2024
293+
294+
SECURITY:
295+
296+
* raft/snapshotagent (enterprise): upgrade raft-snapshotagent to v0.0.0-20241115202008-166203013d8e
297+
298+
CHANGES:
299+
300+
* activity log: Deprecated the field "default_report_months". Instead, the billing start time will be used to determine the start time
301+
when querying the activity log endpoints. [[GH-27350](https://github.com/hashicorp/vault/pull/27350)]
302+
* core/ha (enterprise): Failed attempts to become a performance standby node are now using an exponential backoff instead of a
303+
10 second delay in between retries. The backoff starts at 2s and increases by a factor of two until reaching
304+
the maximum of 16s. This should make unsealing of the node faster in some cases.
305+
* login (enterprise): Return a 500 error during logins when performance standby nodes make failed gRPC requests to the active node. [[GH-28807](https://github.com/hashicorp/vault/pull/28807)]
306+
307+
FEATURES:
308+
309+
* **Product Usage Reporting**: Added product usage reporting, which collects anonymous, numerical, non-sensitive data about Vault secrets usage, and adds it to the existing utilization reports. See the [[docs](https://developer.hashicorp.com/vault/docs/enterprise/license/product-usage-reporting)] for more info [[GH-28858](https://github.com/hashicorp/vault/pull/28858)]
310+
311+
IMPROVEMENTS:
312+
313+
* secrets-sync (enterprise): No longer attempt to unsync a random UUID secret name in GCP upon destination creation.
314+
* ui: Adds navigation for LDAP hierarchical roles [[GH-28824](https://github.com/hashicorp/vault/pull/28824)]
315+
316+
BUG FIXES:
317+
318+
* core: Improved an internal helper function that sanitizes paths by adding a check for leading backslashes
319+
in addition to the existing check for leading slashes. [[GH-28878](https://github.com/hashicorp/vault/pull/28878)]
320+
* secret/pki: Fix a bug that prevents PKI issuer field enable_aia_url_templating
321+
to be set to false. [[GH-28832](https://github.com/hashicorp/vault/pull/28832)]
322+
* secrets-sync (enterprise): Fixed issue where secret-key granularity destinations could sometimes cause a panic when loading a sync status.
323+
* secrets/aws: Fix issue with static credentials not rotating after restart or leadership change. [[GH-28775](https://github.com/hashicorp/vault/pull/28775)]
324+
* secrets/ssh: Return the flag `allow_empty_principals` in the read role api when key_type is "ca" [[GH-28901](https://github.com/hashicorp/vault/pull/28901)]
325+
* secrets/transform (enterprise): Fix nil panic when accessing a partially setup database store.
326+
* secrets/transit: Fix a race in which responses from the key update api could contain results from another subsequent update [[GH-28839](https://github.com/hashicorp/vault/pull/28839)]
327+
* ui: Fixes rendering issues of LDAP dynamic and static roles with the same name [[GH-28824](https://github.com/hashicorp/vault/pull/28824)]
328+
251329
## 1.17.8 Enterprise
252330
### October 30, 2024
253331

@@ -653,6 +731,46 @@ autopilot to fail to discover new server versions and so not trigger an upgrade.
653731
* ui: fixed a bug where the replication pages did not update display when navigating between DR and performance [[GH-26325](https://github.com/hashicorp/vault/pull/26325)]
654732
* ui: fixes undefined start time in filename for downloaded client count attribution csv [[GH-26485](https://github.com/hashicorp/vault/pull/26485)]
655733

734+
## 1.16.13 Enterprise
735+
### November 21, 2024
736+
737+
**Enterprise LTS:** Vault Enterprise 1.16 is a [Long-Term Support (LTS)](https://developer.hashicorp.com/vault/docs/enterprise/lts) release.
738+
739+
SECURITY:
740+
741+
* raft/snapshotagent (enterprise): upgrade raft-snapshotagent to v0.0.0-20241115202008-166203013d8e
742+
743+
CHANGES:
744+
745+
* activity log: Deprecated the field "default_report_months". Instead, the billing start time will be used to determine the start time
746+
when querying the activity log endpoints. [[GH-27350](https://github.com/hashicorp/vault/pull/27350)]
747+
* core/ha (enterprise): Failed attempts to become a performance standby node are now using an exponential backoff instead of a
748+
10 second delay in between retries. The backoff starts at 2s and increases by a factor of two until reaching
749+
the maximum of 16s. This should make unsealing of the node faster in some cases.
750+
* login (enterprise): Return a 500 error during logins when performance standby nodes make failed gRPC requests to the active node. [[GH-28807](https://github.com/hashicorp/vault/pull/28807)]
751+
752+
FEATURES:
753+
754+
* **Product Usage Reporting**: Added product usage reporting, which collects anonymous, numerical, non-sensitive data about Vault secrets usage, and adds it to the existing utilization reports. See the [[docs](https://developer.hashicorp.com/vault/docs/enterprise/license/product-usage-reporting)] for more info [[GH-28858](https://github.com/hashicorp/vault/pull/28858)]
755+
756+
IMPROVEMENTS:
757+
758+
* raft-snapshot (enterprise): add support for managed identity credentials for azure snapshots
759+
* secrets-sync (enterprise): No longer attempt to unsync a random UUID secret name in GCP upon destination creation.
760+
761+
BUG FIXES:
762+
763+
* auth/ldap: Fixed an issue where debug level logging was not emitted. [[GH-28881](https://github.com/hashicorp/vault/pull/28881)]
764+
* core: Improved an internal helper function that sanitizes paths by adding a check for leading backslashes
765+
in addition to the existing check for leading slashes. [[GH-28878](https://github.com/hashicorp/vault/pull/28878)]
766+
* secret/pki: Fix a bug that prevents PKI issuer field enable_aia_url_templating
767+
to be set to false. [[GH-28832](https://github.com/hashicorp/vault/pull/28832)]
768+
* secrets-sync (enterprise): Fixed issue where secret-key granularity destinations could sometimes cause a panic when loading a sync status.
769+
* secrets/aws: Fix issue with static credentials not rotating after restart or leadership change. [[GH-28775](https://github.com/hashicorp/vault/pull/28775)]
770+
* secrets/ssh: Return the flag `allow_empty_principals` in the read role api when key_type is "ca" [[GH-28901](https://github.com/hashicorp/vault/pull/28901)]
771+
* secrets/transform (enterprise): Fix nil panic when accessing a partially setup database store.
772+
* secrets/transit: Fix a race in which responses from the key update api could contain results from another subsequent update [[GH-28839](https://github.com/hashicorp/vault/pull/28839)]
773+
656774
## 1.16.12 Enterprise
657775
### October 30, 2024
658776

0 commit comments

Comments
 (0)