chore(deps): update dependency hashicorp/vault to v2#590
Open
renovate[bot] wants to merge 1 commit intomainfrom
Open
chore(deps): update dependency hashicorp/vault to v2#590renovate[bot] wants to merge 1 commit intomainfrom
renovate[bot] wants to merge 1 commit intomainfrom
Conversation
Signed-off-by: Renovate Bot <renovate-bot@users.noreply.github.com>
Contributor
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: The full list of commands accepted by this bot can be found here. DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
v1.21.4→v2.0.0Release Notes
hashicorp/vault (hashicorp/vault)
v2.0.0Compare Source
BREAKING CHANGES:
SECURITY:
cloudflare/circlto v1.6.3 to resolve CVE-2026-1229filippo.io/edwards25519to v1.1.1 to resolve GO-2026-4503max_token_header_sizelistener option (default 8 KB) to bound the size of authentication token headers (X-Vault-TokenandAuthorization: Bearer), preventing a potential denial-of-service attack via oversized header contents. The stdlib-levelMaxHeaderBytesbackstop is also now set on the HTTP server. Setmax_token_header_size = -1to disable the limit.cloudflare/circlto v1.6.3 to resolve CVE-2026-1229go.opentelemetry.io/otel/sdkto v1.40.0 to resolve GO-2026-4394CHANGES:
supplemental_audit_datacan now appear within audit entries of type "response" within the request and response data structures. These new fields can contain data that further describe the request/response data and are mainly used for non-JSON based requests and responses to help auditing. Theaudit-non-hmac-request-keysandaudit-non-hmac-response-keysapply to keys withinsupplemental_audit_datato remove the HMAC of the field values if so desired.path//to/resource)vault operator utilizationhave a changed format. Notably they contain an array ofsnapshot_recordsinstead ofsnapshots. Thedecoded_snapshotfield in each record contains the human-readable data that was previously in thesnapshotsarray.FEATURES:
license_entitlementis required in the Vault config to use an IBM license. For more details, see the License documentation.enable_self_enrollmentparameter in the API.IMPROVEMENTS:
sys/reporting/scanendpoint which will output a set of files containing information about Vault state to the location specified by thereporting_scan_directoryconfig item.sys/billing/overviewendpoint that returns current and previous month consumption billing metrics. Accessible via API client methodclient.Sys().BillingOverview().vault.core.license.termination_time_epoch.vault.route.read-snapshot.{mount_point}andvault.route.list-snapshot.{mount_point}metrics.issuer,edition,add_ons,license_start_time,license_expiration_time, andlicense_termination_time.supplemental_audit_datasection of audit log response entries. Details such as issuer_id, next_update, ocsp_status, serial_number, revoked_at will appear as hmac values by default unless added to the mount'saudit-non-hmac-response-keysset of keys.server_flag,client_flag,code_signing_flag, andemail_protection_flagparameters for creating/updating a role.BUG FIXES:
alias_metadatanow populates alias custom metadata field instead of alias metadata.alias_metadatanow populates alias custom metadata field instead of alias metadata.alias_metadatanow populates alias custom metadata field instead of alias metadata.alias_metadatanow populates alias custom metadata field instead of alias metadata.alias_metadatanow populates alias custom metadata field instead of alias metadata.alias_metadatanow populates alias custom metadata field instead of alias metadata.alias_metadatanow populates alias custom metadata field instead of alias metadata.alias_metadatanow populates alias custom metadata field instead of alias metadata.alias_metadatanow populates alias custom metadata field instead of alias metadata.log_requests_levelconfiguration was not respected on a SIGHUP reload when set to "off" or removed from the config file.key_usageextension so details accurately reflect certificate values.basic_constraints_valid_for_non_cais correctly set.?with=<path>query param correctly displays only the specified mount when multiple mounts of the same auth type are configured withlisting_visibility="unauth"Configuration
📅 Schedule: (in timezone Europe/London)
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.