Bump github.com/hashicorp/vault/api from 1.7.2 to 1.8.0 #85

Merged
dependabot[bot] merged 1 commits from dependabot/go_modules/github.com/hashicorp/vault/api-1.8.0 into v3 2022-10-04 12:58:32 +03:00
dependabot[bot] commented 2022-09-21 11:28:12 +03:00 (Migrated from github.com)

Bumps github.com/hashicorp/vault/api from 1.7.2 to 1.8.0.

Release notes

Sourced from github.com/hashicorp/vault/api's releases.

v1.8.0

1.8.0

July 28th, 2021

CHANGES:

  • agent: Errors in the template engine will no longer cause agent to exit unless explicitly defined to do so. A new configuration parameter, exit_on_retry_failure, within the new top-level stanza, template_config, can be set to true in order to cause agent to exit. Note that for agent to exit if template.error_on_missing_key is set to true, exit_on_retry_failure must be also set to true. Otherwise, the template engine will log an error but then restart its internal runner. [GH-11775]
  • agent: Update to use IAM Service Account Credentials endpoint for signing JWTs when using GCP Auto-Auth method [GH-11473]
  • core (enterprise): License/EULA changes that ensure the presence of a valid HashiCorp license to start Vault. More information is available in the Vault License FAQ

FEATURES:

  • GCP Secrets Engine Static Accounts: Adds ability to use existing service accounts for generation of service account keys and access tokens. [GH-12023]
  • Key Management Secrets Engine (Enterprise): Adds general availability for distributing and managing keys in AWS KMS. [GH-11958]
  • License Autoloading (Enterprise): Licenses may now be automatically loaded from the environment or disk.
  • MySQL Database UI: The UI now supports adding and editing MySQL connections in the database secret engine [GH-11532]
  • Vault Diagnose: A new vault operator command to detect common issues with vault server setups.

IMPROVEMENTS:

  • agent/template: Added static_secret_render_interval to specify how often to fetch non-leased secrets [GH-11934]
  • agent: Allow Agent auto auth to read symlinked JWT files [GH-11502]
  • api: Allow a leveled logger to be provided to api.Client through SetLogger. [GH-11696]
  • auth/aws: Underlying error included in validation failure message. [GH-11638]
  • cli/api: Add lease lookup command [GH-11129]
  • core: Add prefix_filter to telemetry config [GH-12025]
  • core: Add a darwin/arm64 binary release supporting the Apple M1 CPU [GH-12071]
  • core: Add a small (<1s) exponential backoff to failed TCP listener Accept failures. [GH-11588]
  • core (enterprise): Add controlled capabilities to control group policy stanza
  • core: Add metrics for standby node forwarding. [GH-11366]
  • core: Add metrics to report if a node is a perf standby, if a node is a dr secondary or primary, and if a node is a perf secondary or primary. [GH-11472]
  • core: Send notifications to systemd on start, stop, and configuration reload. [GH-11517]
  • core: add irrevocable lease list and count apis [GH-11607]
  • core: allow arbitrary length stack traces upon receiving SIGUSR2 (was 32MB) [GH-11364]
  • db/cassandra: Added tls_server_name to specify server name for TLS validation [GH-11820]
  • go: Update to Go 1.16.5 [GH-11802]
  • raft: Improve raft batch size selection [GH-11907]
  • raft: change freelist type to map and set nofreelistsync to true [GH-11895]
  • replication: Delay evaluation of X-Vault-Index headers until merkle sync completes.
  • secrets/rabbitmq: Add ability to customize dynamic usernames [GH-11899]
  • secrets/ad: Add rotate-role endpoint to allow rotations of service accounts. [GH-11942]

... (truncated)

Changelog

Sourced from github.com/hashicorp/vault/api's changelog.

1.8.0

July 28th, 2021

CHANGES:

  • agent: Errors in the template engine will no longer cause agent to exit unless explicitly defined to do so. A new configuration parameter, exit_on_retry_failure, within the new top-level stanza, template_config, can be set to true in order to cause agent to exit. Note that for agent to exit if template.error_on_missing_key is set to true, exit_on_retry_failure must be also set to true. Otherwise, the template engine will log an error but then restart its internal runner. [GH-11775]
  • agent: Update to use IAM Service Account Credentials endpoint for signing JWTs when using GCP Auto-Auth method [GH-11473]
  • core (enterprise): License/EULA changes that ensure the presence of a valid HashiCorp license to start Vault. More information is available in the Vault License FAQ

FEATURES:

  • GCP Secrets Engine Static Accounts: Adds ability to use existing service accounts for generation of service account keys and access tokens. [GH-12023]
  • Key Management Secrets Engine (Enterprise): Adds general availability for distributing and managing keys in AWS KMS. [GH-11958]
  • License Autoloading (Enterprise): Licenses may now be automatically loaded from the environment or disk.
  • MySQL Database UI: The UI now supports adding and editing MySQL connections in the database secret engine [GH-11532]
  • Vault Diagnose: A new vault operator command to detect common issues with vault server setups.

SECURITY:

  • storage/raft: When initializing Vault’s Integrated Storage backend, excessively broad filesystem permissions may be set for the underlying Bolt database used by Vault’s Raft implementation. This vulnerability, CVE-2021-38553, was fixed in Vault 1.8.0.
  • ui: The Vault UI erroneously cached and exposed user-viewed secrets between authenticated sessions in a single shared browser, if the browser window / tab was not refreshed or closed between logout and a subsequent login. This vulnerability, CVE-2021-38554, was fixed in Vault 1.8.0 and will be addressed in pending 1.7.4 / 1.6.6 releases.

IMPROVEMENTS:

  • agent/template: Added static_secret_render_interval to specify how often to fetch non-leased secrets [GH-11934]
  • agent: Allow Agent auto auth to read symlinked JWT files [GH-11502]
  • api: Allow a leveled logger to be provided to api.Client through SetLogger. [GH-11696]
  • auth/aws: Underlying error included in validation failure message. [GH-11638]
  • cli/api: Add lease lookup command [GH-11129]
  • core: Add prefix_filter to telemetry config [GH-12025]
  • core: Add a darwin/arm64 binary release supporting the Apple M1 CPU [GH-12071]
  • core: Add a small (<1s) exponential backoff to failed TCP listener Accept failures. [GH-11588]
  • core (enterprise): Add controlled capabilities to control group policy stanza
  • core: Add metrics for standby node forwarding. [GH-11366]
  • core: Add metrics to report if a node is a perf standby, if a node is a dr secondary or primary, and if a node is a perf secondary or primary. [GH-11472]
  • core: Send notifications to systemd on start, stop, and configuration reload. [GH-11517]
  • core: add irrevocable lease list and count apis [GH-11607]
  • core: allow arbitrary length stack traces upon receiving SIGUSR2 (was 32MB) [GH-11364]
  • core: Improve renew/revoke performance using per-lease locks [GH-11122]
  • db/cassandra: Added tls_server_name to specify server name for TLS validation [GH-11820]
  • go: Update to Go 1.16.5 [GH-11802]

... (truncated)

Commits

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
Bumps [github.com/hashicorp/vault/api](https://github.com/hashicorp/vault) from 1.7.2 to 1.8.0. <details> <summary>Release notes</summary> <p><em>Sourced from <a href="https://github.com/hashicorp/vault/releases">github.com/hashicorp/vault/api's releases</a>.</em></p> <blockquote> <h2>v1.8.0</h2> <h2>1.8.0</h2> <h3>July 28th, 2021</h3> <p>CHANGES:</p> <ul> <li>agent: Errors in the template engine will no longer cause agent to exit unless explicitly defined to do so. A new configuration parameter, <code>exit_on_retry_failure</code>, within the new top-level stanza, <code>template_config</code>, can be set to <code>true</code> in order to cause agent to exit. Note that for agent to exit if <code>template.error_on_missing_key</code> is set to <code>true</code>, <code>exit_on_retry_failure</code> must be also set to <code>true</code>. Otherwise, the template engine will log an error but then restart its internal runner. [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/11775">GH-11775</a>]</li> <li>agent: Update to use IAM Service Account Credentials endpoint for signing JWTs when using GCP Auto-Auth method [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/11473">GH-11473</a>]</li> <li>core (enterprise): License/EULA changes that ensure the presence of a valid HashiCorp license to start Vault. More information is available in the <a href="https://www.vaultproject.io/docs/enterprise/license/faqs">Vault License FAQ</a></li> </ul> <p>FEATURES:</p> <ul> <li><strong>GCP Secrets Engine Static Accounts</strong>: Adds ability to use existing service accounts for generation of service account keys and access tokens. [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/12023">GH-12023</a>]</li> <li><strong>Key Management Secrets Engine (Enterprise)</strong>: Adds general availability for distributing and managing keys in AWS KMS. [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/11958">GH-11958</a>]</li> <li><strong>License Autoloading (Enterprise)</strong>: Licenses may now be automatically loaded from the environment or disk.</li> <li><strong>MySQL Database UI</strong>: The UI now supports adding and editing MySQL connections in the database secret engine [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/11532">GH-11532</a>]</li> <li><strong>Vault Diagnose</strong>: A new <code>vault operator</code> command to detect common issues with vault server setups.</li> </ul> <p>IMPROVEMENTS:</p> <ul> <li>agent/template: Added static_secret_render_interval to specify how often to fetch non-leased secrets [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/11934">GH-11934</a>]</li> <li>agent: Allow Agent auto auth to read symlinked JWT files [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/11502">GH-11502</a>]</li> <li>api: Allow a leveled logger to be provided to <code>api.Client</code> through <code>SetLogger</code>. [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/11696">GH-11696</a>]</li> <li>auth/aws: Underlying error included in validation failure message. [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/11638">GH-11638</a>]</li> <li>cli/api: Add lease lookup command [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/11129">GH-11129</a>]</li> <li>core: Add <code>prefix_filter</code> to telemetry config [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/12025">GH-12025</a>]</li> <li>core: Add a darwin/arm64 binary release supporting the Apple M1 CPU [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/12071">GH-12071</a>]</li> <li>core: Add a small (&lt;1s) exponential backoff to failed TCP listener Accept failures. [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/11588">GH-11588</a>]</li> <li>core (enterprise): Add controlled capabilities to control group policy stanza</li> <li>core: Add metrics for standby node forwarding. [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/11366">GH-11366</a>]</li> <li>core: Add metrics to report if a node is a perf standby, if a node is a dr secondary or primary, and if a node is a perf secondary or primary. [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/11472">GH-11472</a>]</li> <li>core: Send notifications to systemd on start, stop, and configuration reload. [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/11517">GH-11517</a>]</li> <li>core: add irrevocable lease list and count apis [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/11607">GH-11607</a>]</li> <li>core: allow arbitrary length stack traces upon receiving SIGUSR2 (was 32MB) [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/11364">GH-11364</a>]</li> <li>db/cassandra: Added tls_server_name to specify server name for TLS validation [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/11820">GH-11820</a>]</li> <li>go: Update to Go 1.16.5 [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/11802">GH-11802</a>]</li> <li>raft: Improve raft batch size selection [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/11907">GH-11907</a>]</li> <li>raft: change freelist type to map and set nofreelistsync to true [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/11895">GH-11895</a>]</li> <li>replication: Delay evaluation of X-Vault-Index headers until merkle sync completes.</li> <li>secrets/rabbitmq: Add ability to customize dynamic usernames [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/11899">GH-11899</a>]</li> <li>secrets/ad: Add <code>rotate-role</code> endpoint to allow rotations of service accounts. [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/11942">GH-11942</a>]</li> </ul> <!-- raw HTML omitted --> </blockquote> <p>... (truncated)</p> </details> <details> <summary>Changelog</summary> <p><em>Sourced from <a href="https://github.com/hashicorp/vault/blob/main/CHANGELOG.md">github.com/hashicorp/vault/api's changelog</a>.</em></p> <blockquote> <h2>1.8.0</h2> <h3>July 28th, 2021</h3> <p>CHANGES:</p> <ul> <li>agent: Errors in the template engine will no longer cause agent to exit unless explicitly defined to do so. A new configuration parameter, <code>exit_on_retry_failure</code>, within the new top-level stanza, <code>template_config</code>, can be set to <code>true</code> in order to cause agent to exit. Note that for agent to exit if <code>template.error_on_missing_key</code> is set to <code>true</code>, <code>exit_on_retry_failure</code> must be also set to <code>true</code>. Otherwise, the template engine will log an error but then restart its internal runner. [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/11775">GH-11775</a>]</li> <li>agent: Update to use IAM Service Account Credentials endpoint for signing JWTs when using GCP Auto-Auth method [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/11473">GH-11473</a>]</li> <li>core (enterprise): License/EULA changes that ensure the presence of a valid HashiCorp license to start Vault. More information is available in the <a href="https://www.vaultproject.io/docs/enterprise/license/faqs">Vault License FAQ</a></li> </ul> <p>FEATURES:</p> <ul> <li><strong>GCP Secrets Engine Static Accounts</strong>: Adds ability to use existing service accounts for generation of service account keys and access tokens. [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/12023">GH-12023</a>]</li> <li><strong>Key Management Secrets Engine (Enterprise)</strong>: Adds general availability for distributing and managing keys in AWS KMS. [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/11958">GH-11958</a>]</li> <li><strong>License Autoloading (Enterprise)</strong>: Licenses may now be automatically loaded from the environment or disk.</li> <li><strong>MySQL Database UI</strong>: The UI now supports adding and editing MySQL connections in the database secret engine [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/11532">GH-11532</a>]</li> <li><strong>Vault Diagnose</strong>: A new <code>vault operator</code> command to detect common issues with vault server setups.</li> </ul> <p>SECURITY:</p> <ul> <li>storage/raft: When initializing Vault’s Integrated Storage backend, excessively broad filesystem permissions may be set for the underlying Bolt database used by Vault’s Raft implementation. This vulnerability, CVE-2021-38553, was fixed in Vault 1.8.0.</li> <li>ui: The Vault UI erroneously cached and exposed user-viewed secrets between authenticated sessions in a single shared browser, if the browser window / tab was not refreshed or closed between logout and a subsequent login. This vulnerability, CVE-2021-38554, was fixed in Vault 1.8.0 and will be addressed in pending 1.7.4 / 1.6.6 releases.</li> </ul> <p>IMPROVEMENTS:</p> <ul> <li>agent/template: Added static_secret_render_interval to specify how often to fetch non-leased secrets [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/11934">GH-11934</a>]</li> <li>agent: Allow Agent auto auth to read symlinked JWT files [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/11502">GH-11502</a>]</li> <li>api: Allow a leveled logger to be provided to <code>api.Client</code> through <code>SetLogger</code>. [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/11696">GH-11696</a>]</li> <li>auth/aws: Underlying error included in validation failure message. [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/11638">GH-11638</a>]</li> <li>cli/api: Add lease lookup command [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/11129">GH-11129</a>]</li> <li>core: Add <code>prefix_filter</code> to telemetry config [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/12025">GH-12025</a>]</li> <li>core: Add a darwin/arm64 binary release supporting the Apple M1 CPU [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/12071">GH-12071</a>]</li> <li>core: Add a small (&lt;1s) exponential backoff to failed TCP listener Accept failures. [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/11588">GH-11588</a>]</li> <li>core (enterprise): Add controlled capabilities to control group policy stanza</li> <li>core: Add metrics for standby node forwarding. [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/11366">GH-11366</a>]</li> <li>core: Add metrics to report if a node is a perf standby, if a node is a dr secondary or primary, and if a node is a perf secondary or primary. [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/11472">GH-11472</a>]</li> <li>core: Send notifications to systemd on start, stop, and configuration reload. [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/11517">GH-11517</a>]</li> <li>core: add irrevocable lease list and count apis [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/11607">GH-11607</a>]</li> <li>core: allow arbitrary length stack traces upon receiving SIGUSR2 (was 32MB) [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/11364">GH-11364</a>]</li> <li>core: Improve renew/revoke performance using per-lease locks [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/11122">GH-11122</a>]</li> <li>db/cassandra: Added tls_server_name to specify server name for TLS validation [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/11820">GH-11820</a>]</li> <li>go: Update to Go 1.16.5 [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/11802">GH-11802</a>]</li> </ul> <!-- raw HTML omitted --> </blockquote> <p>... (truncated)</p> </details> <details> <summary>Commits</summary> <ul> <li><a href="https://github.com/hashicorp/vault/commit/82a99f14eb6133f99a975e653d4dac21c17505c7"><code>82a99f1</code></a> Use a mode when opening the db file that won't result in excessive perms. (<a href="https://github-redirect.dependabot.com/hashicorp/vault/issues/1">#1</a>...</li> <li><a href="https://github.com/hashicorp/vault/commit/43cfab4684bce38e5a6b8a62bb7a48238e9c2920"><code>43cfab4</code></a> Add fallback font for masked-input (<a href="https://github-redirect.dependabot.com/hashicorp/vault/issues/12152">#12152</a>) (<a href="https://github-redirect.dependabot.com/hashicorp/vault/issues/12158">#12158</a>)</li> <li><a href="https://github.com/hashicorp/vault/commit/ca2ad70d3333a86ba4129a5f9dc09cfb3c74c804"><code>ca2ad70</code></a> Update node to latest stable version (<a href="https://github-redirect.dependabot.com/hashicorp/vault/issues/12049">#12049</a>) (<a href="https://github-redirect.dependabot.com/hashicorp/vault/issues/12154">#12154</a>)</li> <li><a href="https://github.com/hashicorp/vault/commit/9f77f5a3fcc1d6d05a8b80f875e02876117fbf4c"><code>9f77f5a</code></a> Re-adding deleted changelog note (<a href="https://github-redirect.dependabot.com/hashicorp/vault/issues/12141">#12141</a>)</li> <li><a href="https://github.com/hashicorp/vault/commit/c3855d75da123ed5a726b6a624c1b39d82d328b1"><code>c3855d7</code></a> Backport: 1.8.x UI/database cg read role (<a href="https://github-redirect.dependabot.com/hashicorp/vault/issues/12111">#12111</a>) (<a href="https://github-redirect.dependabot.com/hashicorp/vault/issues/12136">#12136</a>)</li> <li><a href="https://github.com/hashicorp/vault/commit/5c7e855e49013e2cad39c6a907f4d85b3ab7048f"><code>5c7e855</code></a> Fix KV Version History queryParams on the component LinkedBlock (<a href="https://github-redirect.dependabot.com/hashicorp/vault/issues/12079">#12079</a>) (<a href="https://github-redirect.dependabot.com/hashicorp/vault/issues/12">#12</a>...</li> <li><a href="https://github.com/hashicorp/vault/commit/4ffff3a0ad03c9da4dd105e3363749680c00d8e3"><code>4ffff3a</code></a> changelog: update feature formatting for gcp and key management secrets (<a href="https://github-redirect.dependabot.com/hashicorp/vault/issues/121">#121</a>...</li> <li><a href="https://github.com/hashicorp/vault/commit/46ed8838ec9d13d97261da2bbb7678a827c5c8b8"><code>46ed883</code></a> Change changelog type for openldap bug fix (<a href="https://github-redirect.dependabot.com/hashicorp/vault/issues/12112">#12112</a>) (<a href="https://github-redirect.dependabot.com/hashicorp/vault/issues/12114">#12114</a>)</li> <li><a href="https://github.com/hashicorp/vault/commit/ed8d36b632f46e17227764ab0570cb01b13a6db0"><code>ed8d36b</code></a> UI: Automatically refresh page on logout (<a href="https://github-redirect.dependabot.com/hashicorp/vault/issues/12035">#12035</a>) (<a href="https://github-redirect.dependabot.com/hashicorp/vault/issues/12082">#12082</a>)</li> <li><a href="https://github.com/hashicorp/vault/commit/df0c8d31a30925ca20a839984a372e8888f0318d"><code>df0c8d3</code></a> Backport recent diagnose fixes to 1.8.x (<a href="https://github-redirect.dependabot.com/hashicorp/vault/issues/12108">#12108</a>)</li> <li>Additional commits viewable in <a href="https://github.com/hashicorp/vault/compare/v1.7.2...v1.8.0">compare view</a></li> </ul> </details> <br /> [![Dependabot compatibility score](https://dependabot-badges.githubapp.com/badges/compatibility_score?dependency-name=github.com/hashicorp/vault/api&package-manager=go_modules&previous-version=1.7.2&new-version=1.8.0)](https://docs.github.com/en/github/managing-security-vulnerabilities/about-dependabot-security-updates#about-compatibility-scores) Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting `@dependabot rebase`. [//]: # (dependabot-automerge-start) [//]: # (dependabot-automerge-end) --- <details> <summary>Dependabot commands and options</summary> <br /> You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) </details>
github-actions[bot] (Migrated from github.com) reviewed 2022-09-21 11:28:29 +03:00
github-actions[bot] (Migrated from github.com) approved these changes 2022-10-04 12:52:39 +03:00
Sign in to join this conversation.
No Milestone
No project
No Assignees
1 Participants
Notifications
Due Date
The due date is invalid or out of range. Please use the format 'yyyy-mm-dd'.

No due date set.

Dependencies

No dependencies set.

Reference: unistack-org/micro-config-vault#85
No description provided.