Bump github.com/hashicorp/vault/api from 1.8.3 to 1.9.0 #107

Closed
dependabot[bot] wants to merge 1 commits from dependabot/go_modules/github.com/hashicorp/vault/api-1.9.0 into v3
dependabot[bot] commented 2023-02-13 12:08:29 +03:00 (Migrated from github.com)

Bumps github.com/hashicorp/vault/api from 1.8.3 to 1.9.0.

Release notes

Sourced from github.com/hashicorp/vault/api's releases.

v1.9.0

1.9.0

November 17, 2021

CHANGES:

  • expiration: VAULT_16_REVOKE_PERMITPOOL environment variable has been removed. [GH-12888]
  • expiration: VAULT_LEASE_USE_LEGACY_REVOCATION_STRATEGY environment variable has been removed. [GH-12888]
  • go: Update go version to 1.17.2
  • secrets/ssh: Roles with empty allowed_extensions will now forbid end-users specifying extensions when requesting ssh key signing. Update roles setting allowed_extensions to * to permit any extension to be specified by an end-user. [GH-12847]

FEATURES:

  • Customizable HTTP Headers: Add support to define custom HTTP headers for root path (/) and also on API endpoints (/v1/*) [GH-12485]
  • Deduplicate Token With Entities in Activity Log: Vault tokens without entities are now tracked with client IDs and deduplicated in the Activity Log [GH-12820]
  • Elasticsearch Database UI: The UI now supports adding and editing Elasticsearch connections in the database secret engine. [GH-12672]
  • KV Custom Metadata: Add ability in kv-v2 to specify version-agnostic custom key metadata via the metadata endpoint. The data will be present in responses made to the data endpoint independent of the calling token's read access to the metadata endpoint. [GH-12907]
  • KV patch (Tech Preview): Add partial update support for the /<mount>/data/:path kv-v2 endpoint through HTTP PATCH. A new patch ACL capability has been added and is required to make such requests. [GH-12687]
  • Key Management Secrets Engine (Enterprise): Adds support for distributing and managing keys in GCP Cloud KMS.
  • Local Auth Mount Entities (enterprise): Logins on local auth mounts will generate identity entities for the tokens issued. The aliases of the entity resulting from local auth mounts (local-aliases), will be scoped by the cluster. This means that the local-aliases will never leave the geographical boundary of the cluster where they were issued. This is something to be mindful about for those who have implemented local auth mounts for complying with GDPR guidelines.
  • Namespaces (Enterprise): Adds support for locking Vault API for particular namespaces.
  • OIDC Identity Provider (Tech Preview): Adds support for Vault to be an OpenID Connect (OIDC) provider. [GH-12932]
  • Oracle Database UI: The UI now supports adding and editing Oracle connections in the database secret engine. [GH-12752]
  • Postgres Database UI: The UI now supports adding and editing Postgres connections in the database secret engine. [GH-12945]

IMPROVEMENTS:

  • agent/cache: Process persistent cache leases in dependency order during restore to ensure child leases are always correctly restored [GH-12843]
  • agent/cache: Use an in-process listener between consul-template and vault-agent when caching is enabled and either templates or a listener is defined [GH-12762]
  • agent/cache: tolerate partial restore failure from persistent cache [GH-12718]
  • agent/template: add support for new 'writeToFile' template function [GH-12505]
  • api: Add configuration option for ensuring isolated read-after-write semantics for all Client requests. [GH-12814]
  • api: adds native Login method to Go client module with different auth method interfaces to support easier authentication [GH-12796]
  • api: Move mergeStates and other required utils from agent to api module [GH-12731]
  • api: Support VAULT_HTTP_PROXY environment variable to allow overriding the Vault client's HTTP proxy [GH-12582]
  • auth/approle: The role/:name/secret-id-accessor/lookup endpoint now returns a 404 status code when the secret_id_accessor cannot be found [GH-12788]
  • auth/approle: expose secret_id_accessor as WrappedAccessor when creating wrapped secret-id. [GH-12425]
  • auth/aws: add profile support for AWS credentials when using the AWS auth method [GH-12621]

... (truncated)

Changelog

Sourced from github.com/hashicorp/vault/api's changelog.

1.9.0

November 17, 2021

CHANGES:

  • auth/kubernetes: disable_iss_validation defaults to true. #127 [GH-12975]
  • expiration: VAULT_16_REVOKE_PERMITPOOL environment variable has been removed. [GH-12888]
  • expiration: VAULT_LEASE_USE_LEGACY_REVOCATION_STRATEGY environment variable has been removed. [GH-12888]
  • go: Update go version to 1.17.2
  • secrets/ssh: Roles with empty allowed_extensions will now forbid end-users specifying extensions when requesting ssh key signing. Update roles setting allowed_extensions to * to permit any extension to be specified by an end-user. [GH-12847]

FEATURES:

  • Customizable HTTP Headers: Add support to define custom HTTP headers for root path (/) and also on API endpoints (/v1/*) [GH-12485]
  • Deduplicate Token With Entities in Activity Log: Vault tokens without entities are now tracked with client IDs and deduplicated in the Activity Log [GH-12820]
  • Elasticsearch Database UI: The UI now supports adding and editing Elasticsearch connections in the database secret engine. [GH-12672]
  • KV Custom Metadata: Add ability in kv-v2 to specify version-agnostic custom key metadata via the metadata endpoint. The data will be present in responses made to the data endpoint independent of the calling token's read access to the metadata endpoint. [GH-12907]
  • KV patch (Tech Preview): Add partial update support for the /<mount>/data/:path kv-v2 endpoint through HTTP PATCH. A new patch ACL capability has been added and is required to make such requests. [GH-12687]
  • Key Management Secrets Engine (Enterprise): Adds support for distributing and managing keys in GCP Cloud KMS.
  • Local Auth Mount Entities (enterprise): Logins on local auth mounts will generate identity entities for the tokens issued. The aliases of the entity resulting from local auth mounts (local-aliases), will be scoped by the cluster. This means that the local-aliases will never leave the geographical boundary of the cluster where they were issued. This is something to be mindful about for those who have implemented local auth mounts for complying with GDPR guidelines.
  • Namespaces (Enterprise): Adds support for locking Vault API for particular namespaces.
  • OIDC Identity Provider (Tech Preview): Adds support for Vault to be an OpenID Connect (OIDC) provider. [GH-12932]
  • Oracle Database UI: The UI now supports adding and editing Oracle connections in the database secret engine. [GH-12752]
  • Postgres Database UI: The UI now supports adding and editing Postgres connections in the database secret engine. [GH-12945]

SECURITY:

  • core/identity: A Vault user with write permission to an entity alias ID sharing a mount accessor with another user may acquire this other user’s policies by merging their identities. This vulnerability, CVE-2021-41802, was fixed in Vault and Vault Enterprise 1.7.5, 1.8.4, and 1.9.0.
  • core/identity: Templated ACL policies would always match the first-created entity alias if multiple entity aliases existed for a specified entity and mount combination, potentially resulting in incorrect policy enforcement. This vulnerability, CVE-2021-43998, was fixed in Vault and Vault Enterprise 1.7.6, 1.8.5, and 1.9.0.

IMPROVEMENTS:

  • agent/cache: Process persistent cache leases in dependency order during restore to ensure child leases are always correctly restored [GH-12843]
  • agent/cache: Use an in-process listener between consul-template and vault-agent when caching is enabled and either templates or a listener is defined [GH-12762]
  • agent/cache: tolerate partial restore failure from persistent cache [GH-12718]
  • agent/template: add support for new 'writeToFile' template function [GH-12505]
  • api: Add configuration option for ensuring isolated read-after-write semantics for all Client requests. [GH-12814]
  • api: adds native Login method to Go client module with different auth method interfaces to support easier authentication [GH-12796]

... (truncated)

Commits

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
Bumps [github.com/hashicorp/vault/api](https://github.com/hashicorp/vault) from 1.8.3 to 1.9.0. <details> <summary>Release notes</summary> <p><em>Sourced from <a href="https://github.com/hashicorp/vault/releases">github.com/hashicorp/vault/api's releases</a>.</em></p> <blockquote> <h2>v1.9.0</h2> <h2>1.9.0</h2> <h3>November 17, 2021</h3> <p>CHANGES:</p> <ul> <li>expiration: VAULT_16_REVOKE_PERMITPOOL environment variable has been removed. [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/12888">GH-12888</a>]</li> <li>expiration: VAULT_LEASE_USE_LEGACY_REVOCATION_STRATEGY environment variable has been removed. [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/12888">GH-12888</a>]</li> <li>go: Update go version to 1.17.2</li> <li>secrets/ssh: Roles with empty allowed_extensions will now forbid end-users specifying extensions when requesting ssh key signing. Update roles setting allowed_extensions to <code>*</code> to permit any extension to be specified by an end-user. [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/12847">GH-12847</a>]</li> </ul> <p>FEATURES:</p> <ul> <li><strong>Customizable HTTP Headers</strong>: Add support to define custom HTTP headers for root path (<code>/</code>) and also on API endpoints (<code>/v1/*</code>) [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/12485">GH-12485</a>]</li> <li><strong>Deduplicate Token With Entities in Activity Log</strong>: Vault tokens without entities are now tracked with client IDs and deduplicated in the Activity Log [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/12820">GH-12820</a>]</li> <li><strong>Elasticsearch Database UI</strong>: The UI now supports adding and editing Elasticsearch connections in the database secret engine. [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/12672">GH-12672</a>]</li> <li><strong>KV Custom Metadata</strong>: Add ability in kv-v2 to specify version-agnostic custom key metadata via the metadata endpoint. The data will be present in responses made to the data endpoint independent of the calling token's <code>read</code> access to the metadata endpoint. [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/12907">GH-12907</a>]</li> <li><strong>KV patch (Tech Preview)</strong>: Add partial update support for the <code>/&lt;mount&gt;/data/:path</code> kv-v2 endpoint through HTTP <code>PATCH</code>. A new <code>patch</code> ACL capability has been added and is required to make such requests. [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/12687">GH-12687</a>]</li> <li><strong>Key Management Secrets Engine (Enterprise)</strong>: Adds support for distributing and managing keys in GCP Cloud KMS.</li> <li><strong>Local Auth Mount Entities (enterprise)</strong>: Logins on <code>local</code> auth mounts will generate identity entities for the tokens issued. The aliases of the entity resulting from local auth mounts (local-aliases), will be scoped by the cluster. This means that the local-aliases will never leave the geographical boundary of the cluster where they were issued. This is something to be mindful about for those who have implemented local auth mounts for complying with GDPR guidelines.</li> <li><strong>Namespaces (Enterprise)</strong>: Adds support for locking Vault API for particular namespaces.</li> <li><strong>OIDC Identity Provider (Tech Preview)</strong>: Adds support for Vault to be an OpenID Connect (OIDC) provider. [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/12932">GH-12932</a>]</li> <li><strong>Oracle Database UI</strong>: The UI now supports adding and editing Oracle connections in the database secret engine. [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/12752">GH-12752</a>]</li> <li><strong>Postgres Database UI</strong>: The UI now supports adding and editing Postgres connections in the database secret engine. [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/12945">GH-12945</a>]</li> </ul> <p>IMPROVEMENTS:</p> <ul> <li>agent/cache: Process persistent cache leases in dependency order during restore to ensure child leases are always correctly restored [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/12843">GH-12843</a>]</li> <li>agent/cache: Use an in-process listener between consul-template and vault-agent when caching is enabled and either templates or a listener is defined [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/12762">GH-12762</a>]</li> <li>agent/cache: tolerate partial restore failure from persistent cache [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/12718">GH-12718</a>]</li> <li>agent/template: add support for new 'writeToFile' template function [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/12505">GH-12505</a>]</li> <li>api: Add configuration option for ensuring isolated read-after-write semantics for all Client requests. [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/12814">GH-12814</a>]</li> <li>api: adds native Login method to Go client module with different auth method interfaces to support easier authentication [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/12796">GH-12796</a>]</li> <li>api: Move mergeStates and other required utils from agent to api module [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/12731">GH-12731</a>]</li> <li>api: Support VAULT_HTTP_PROXY environment variable to allow overriding the Vault client's HTTP proxy [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/12582">GH-12582</a>]</li> <li>auth/approle: The <code>role/:name/secret-id-accessor/lookup</code> endpoint now returns a 404 status code when the <code>secret_id_accessor</code> cannot be found [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/12788">GH-12788</a>]</li> <li>auth/approle: expose secret_id_accessor as WrappedAccessor when creating wrapped secret-id. [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/12425">GH-12425</a>]</li> <li>auth/aws: add profile support for AWS credentials when using the AWS auth method [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/12621">GH-12621</a>]</li> </ul> <!-- raw HTML omitted --> </blockquote> <p>... (truncated)</p> </details> <details> <summary>Changelog</summary> <p><em>Sourced from <a href="https://github.com/hashicorp/vault/blob/main/CHANGELOG.md">github.com/hashicorp/vault/api's changelog</a>.</em></p> <blockquote> <h2>1.9.0</h2> <h3>November 17, 2021</h3> <p>CHANGES:</p> <ul> <li>auth/kubernetes: <code>disable_iss_validation</code> defaults to true. <a href="https://github-redirect.dependabot.com/hashicorp/vault-plugin-auth-kubernetes/pull/127">#127</a> [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/12975">GH-12975</a>]</li> <li>expiration: VAULT_16_REVOKE_PERMITPOOL environment variable has been removed. [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/12888">GH-12888</a>]</li> <li>expiration: VAULT_LEASE_USE_LEGACY_REVOCATION_STRATEGY environment variable has been removed. [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/12888">GH-12888</a>]</li> <li>go: Update go version to 1.17.2</li> <li>secrets/ssh: Roles with empty allowed_extensions will now forbid end-users specifying extensions when requesting ssh key signing. Update roles setting allowed_extensions to <code>*</code> to permit any extension to be specified by an end-user. [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/12847">GH-12847</a>]</li> </ul> <p>FEATURES:</p> <ul> <li><strong>Customizable HTTP Headers</strong>: Add support to define custom HTTP headers for root path (<code>/</code>) and also on API endpoints (<code>/v1/*</code>) [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/12485">GH-12485</a>]</li> <li><strong>Deduplicate Token With Entities in Activity Log</strong>: Vault tokens without entities are now tracked with client IDs and deduplicated in the Activity Log [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/12820">GH-12820</a>]</li> <li><strong>Elasticsearch Database UI</strong>: The UI now supports adding and editing Elasticsearch connections in the database secret engine. [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/12672">GH-12672</a>]</li> <li><strong>KV Custom Metadata</strong>: Add ability in kv-v2 to specify version-agnostic custom key metadata via the metadata endpoint. The data will be present in responses made to the data endpoint independent of the calling token's <code>read</code> access to the metadata endpoint. [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/12907">GH-12907</a>]</li> <li><strong>KV patch (Tech Preview)</strong>: Add partial update support for the <code>/&lt;mount&gt;/data/:path</code> kv-v2 endpoint through HTTP <code>PATCH</code>. A new <code>patch</code> ACL capability has been added and is required to make such requests. [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/12687">GH-12687</a>]</li> <li><strong>Key Management Secrets Engine (Enterprise)</strong>: Adds support for distributing and managing keys in GCP Cloud KMS.</li> <li><strong>Local Auth Mount Entities (enterprise)</strong>: Logins on <code>local</code> auth mounts will generate identity entities for the tokens issued. The aliases of the entity resulting from local auth mounts (local-aliases), will be scoped by the cluster. This means that the local-aliases will never leave the geographical boundary of the cluster where they were issued. This is something to be mindful about for those who have implemented local auth mounts for complying with GDPR guidelines.</li> <li><strong>Namespaces (Enterprise)</strong>: Adds support for locking Vault API for particular namespaces.</li> <li><strong>OIDC Identity Provider (Tech Preview)</strong>: Adds support for Vault to be an OpenID Connect (OIDC) provider. [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/12932">GH-12932</a>]</li> <li><strong>Oracle Database UI</strong>: The UI now supports adding and editing Oracle connections in the database secret engine. [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/12752">GH-12752</a>]</li> <li><strong>Postgres Database UI</strong>: The UI now supports adding and editing Postgres connections in the database secret engine. [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/12945">GH-12945</a>]</li> </ul> <p>SECURITY:</p> <ul> <li>core/identity: A Vault user with write permission to an entity alias ID sharing a mount accessor with another user may acquire this other user’s policies by merging their identities. This vulnerability, CVE-2021-41802, was fixed in Vault and Vault Enterprise 1.7.5, 1.8.4, and 1.9.0.</li> <li>core/identity: Templated ACL policies would always match the first-created entity alias if multiple entity aliases existed for a specified entity and mount combination, potentially resulting in incorrect policy enforcement. This vulnerability, CVE-2021-43998, was fixed in Vault and Vault Enterprise 1.7.6, 1.8.5, and 1.9.0.</li> </ul> <p>IMPROVEMENTS:</p> <ul> <li>agent/cache: Process persistent cache leases in dependency order during restore to ensure child leases are always correctly restored [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/12843">GH-12843</a>]</li> <li>agent/cache: Use an in-process listener between consul-template and vault-agent when caching is enabled and either templates or a listener is defined [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/12762">GH-12762</a>]</li> <li>agent/cache: tolerate partial restore failure from persistent cache [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/12718">GH-12718</a>]</li> <li>agent/template: add support for new 'writeToFile' template function [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/12505">GH-12505</a>]</li> <li>api: Add configuration option for ensuring isolated read-after-write semantics for all Client requests. [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/12814">GH-12814</a>]</li> <li>api: adds native Login method to Go client module with different auth method interfaces to support easier authentication [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/12796">GH-12796</a>]</li> </ul> <!-- raw HTML omitted --> </blockquote> <p>... (truncated)</p> </details> <details> <summary>Commits</summary> <ul> <li><a href="https://github.com/hashicorp/vault/commit/6dae166b52e0d65147991d143045ad929eb3d71b"><code>6dae166</code></a> Revert more downgrades from <a href="https://github-redirect.dependabot.com/hashicorp/vault/issues/12975">#12975</a>. (<a href="https://github-redirect.dependabot.com/hashicorp/vault/issues/13168">#13168</a>) (<a href="https://github-redirect.dependabot.com/hashicorp/vault/issues/13172">#13172</a>)</li> <li><a href="https://github.com/hashicorp/vault/commit/5c83aaa8eccda2b04a01ab7034e213e1c35fbd48"><code>5c83aaa</code></a> Fix 1.9 regression with raft and stored time values (<a href="https://github-redirect.dependabot.com/hashicorp/vault/issues/13165">#13165</a>) (<a href="https://github-redirect.dependabot.com/hashicorp/vault/issues/13170">#13170</a>)</li> <li><a href="https://github.com/hashicorp/vault/commit/abe5416c33f085415dfa2d5bdc4bfebf92b5fd74"><code>abe5416</code></a> Fix startup failures when aliases from a pre-1.9 vault version exist (<a href="https://github-redirect.dependabot.com/hashicorp/vault/issues/13169">#13169</a>)...</li> <li><a href="https://github.com/hashicorp/vault/commit/559197a5e5bdfe2afc8e1cddd7dc6a6bcdcb961d"><code>559197a</code></a> Updating SDK in go.mod (<a href="https://github-redirect.dependabot.com/hashicorp/vault/issues/13147">#13147</a>)</li> <li><a href="https://github.com/hashicorp/vault/commit/f5c187a796057eb62eda3b60a1587975763fca9b"><code>f5c187a</code></a> Updating version for 1.9.0 (<a href="https://github-redirect.dependabot.com/hashicorp/vault/issues/13144">#13144</a>)</li> <li><a href="https://github.com/hashicorp/vault/commit/f42e70dbacdac782563218c455a829c88a133e5d"><code>f42e70d</code></a> Changelog fixes (<a href="https://github-redirect.dependabot.com/hashicorp/vault/issues/13128">#13128</a>)</li> <li><a href="https://github.com/hashicorp/vault/commit/816537178fb2e825a1beb73527a09b077d65fd5a"><code>8165371</code></a> update changelog/12621.txt (<a href="https://github-redirect.dependabot.com/hashicorp/vault/issues/13117">#13117</a>) (<a href="https://github-redirect.dependabot.com/hashicorp/vault/issues/13125">#13125</a>)</li> <li><a href="https://github.com/hashicorp/vault/commit/481c01b13910949e81ae15084499d9162243b39f"><code>481c01b</code></a> CL for local auth mount (<a href="https://github-redirect.dependabot.com/hashicorp/vault/issues/13113">#13113</a>)</li> <li><a href="https://github.com/hashicorp/vault/commit/df42108450e3f67dfcb1163993973d7935af6413"><code>df42108</code></a> Add message while adding Oracle db connection (<a href="https://github-redirect.dependabot.com/hashicorp/vault/issues/13087">#13087</a>) (<a href="https://github-redirect.dependabot.com/hashicorp/vault/issues/13115">#13115</a>)</li> <li><a href="https://github.com/hashicorp/vault/commit/5906da5fcd6b8ddb8fdd4703908f48a8ee987a60"><code>5906da5</code></a> OIDC: return full issuer uri on read provider (<a href="https://github-redirect.dependabot.com/hashicorp/vault/issues/13058">#13058</a>) (<a href="https://github-redirect.dependabot.com/hashicorp/vault/issues/13110">#13110</a>)</li> <li>Additional commits viewable in <a href="https://github.com/hashicorp/vault/compare/v1.8.3...v1.9.0">compare view</a></li> </ul> </details> <br /> [![Dependabot compatibility score](https://dependabot-badges.githubapp.com/badges/compatibility_score?dependency-name=github.com/hashicorp/vault/api&package-manager=go_modules&previous-version=1.8.3&new-version=1.9.0)](https://docs.github.com/en/github/managing-security-vulnerabilities/about-dependabot-security-updates#about-compatibility-scores) Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting `@dependabot rebase`. [//]: # (dependabot-automerge-start) [//]: # (dependabot-automerge-end) --- <details> <summary>Dependabot commands and options</summary> <br /> You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) </details>
github-actions[bot] (Migrated from github.com) reviewed 2023-02-13 12:08:42 +03:00
github-actions[bot] (Migrated from github.com) reviewed 2023-02-14 12:06:31 +03:00
github-actions[bot] (Migrated from github.com) reviewed 2023-02-22 11:20:36 +03:00
github-actions[bot] (Migrated from github.com) approved these changes 2023-02-27 12:24:52 +03:00
vtolstov closed this pull request 2023-06-01 11:37:50 +03:00
Some checks failed
codeql / analyze (go) (pull_request) Failing after 9s
prbuild / test (pull_request) Failing after 5s
prbuild / lint (pull_request) Failing after 5s

Pull request closed

Sign in to join this conversation.
No Milestone
No project
No Assignees
1 Participants
Notifications
Due Date
The due date is invalid or out of range. Please use the format 'yyyy-mm-dd'.

No due date set.

Dependencies

No dependencies set.

Reference: unistack-org/micro-config-vault#107
No description provided.