Bump github.com/hashicorp/vault/api from 1.8.0 to 1.8.1 #87

Closed
dependabot[bot] wants to merge 1 commits from dependabot/go_modules/github.com/hashicorp/vault/api-1.8.1 into v3
dependabot[bot] commented 2022-10-13 11:34:25 +03:00 (Migrated from github.com)

Bumps github.com/hashicorp/vault/api from 1.8.0 to 1.8.1.

Release notes

Sourced from github.com/hashicorp/vault/api's releases.

v1.8.1

1.8.1

August 5th, 2021

CHANGES:

  • go: Update go version to 1.16.6 [GH-12245]

IMPROVEMENTS:

  • serviceregistration: add external-source: "vault" metadata value for Consul registration. [GH-12163]

BUG FIXES:

  • auth/aws: Remove warning stating AWS Token TTL will be capped by the Default Lease TTL. [GH-12026]
  • auth/jwt: Fixes OIDC auth from the Vault UI when using form_post as the oidc_response_mode. [GH-12258]
  • core (enterprise): Disallow autogenerated licenses to be used in diagnose even when config is specified
  • core: fix byte printing for diagnose disk checks [GH-12229]
  • identity: do not allow a role's token_ttl to be longer than the signing key's verification_ttl [GH-12151]
Changelog

Sourced from github.com/hashicorp/vault/api's changelog.

1.8.12

June 10, 2022

BUG FIXES:

  • agent: Redact auto auth token from renew endpoints [GH-15380]
  • core: Prevent changing file permissions of audit logs when mode 0000 is used. [GH-15759]
  • core: fixed systemd reloading notification [GH-15041]
  • core: pre-calculate namespace specific paths when tainting a route during postUnseal [GH-15067]
  • storage/raft (enterprise): Auto-snapshot configuration now forbids slashes in file prefixes for all types, and "/" in path prefix for local storage type. Strip leading prefix in path prefix for AWS. Improve error handling/reporting.
  • transform (enterprise): Fix non-overridable column default value causing tokenization tokens to expire prematurely when using the MySQL storage backend.

1.8.11

April 29, 2022

BUG FIXES:

  • raft: fix Raft TLS key rotation panic that occurs if active key is more than 24 hours old [GH-15156]
  • sdk: Fix OpenApi spec generator to properly convert TypeInt64 to OAS supported int64 [GH-15104]

1.8.10

April 22, 2022

CHANGES:

  • core: A request that fails path validation due to relative path check will now be responded to with a 400 rather than 500. [GH-14328]
  • core: Bump Go version to 1.16.15. [GH-go-ver-1810]

IMPROVEMENTS:

  • auth/ldap: Add username_as_alias configurable to change how aliases are named [GH-14324]
  • core: Systemd unit file included with the Linux packages now sets the service type to notify. [GH-14385]
  • sentinel (enterprise): Upgrade sentinel to v0.18.5 to avoid potential naming collisions in the remote installer

BUG FIXES:

  • api/sys/raft: Update RaftSnapshotRestore to use net/http client allowing bodies larger than allocated memory to be streamed [GH-14269]
  • auth/approle: Add maximum length for input values that result in SHA56 HMAC calculation [GH-14746]
  • cassandra: Update gocql Cassandra client to fix "no hosts available in the pool" error [GH-14973]
  • cli: Fix panic caused by parsing key=value fields whose value is a single backslash [GH-14523]
  • core: Fix panic caused by parsing JSON integers for fields defined as comma-delimited integers [GH-15072]
  • core: Fix panic caused by parsing JSON integers for fields defined as comma-delimited strings [GH-14522]
  • core: Fix panic caused by parsing policies with empty slice values. [GH-14501]
  • core: Fix panic for help request URL paths without /v1/ prefix [GH-14704]
  • core: fixing excessive unix file permissions [GH-14791]
  • core: fixing excessive unix file permissions on dir, files and archive created by vault debug command [GH-14846]
  • core: report unused or redundant keys in server configuration [GH-14752]
  • core: time.After() used in a select statement can lead to memory leak [GH-14814]
  • metrics/autosnapshots (enterprise) : Fix bug that could cause vault.autosnapshots.save.errors to not be incremented when there is an

... (truncated)

Commits
  • 4b0264f Updates vault-plugin-auth-jwt to v0.10.1 (#12258)
  • 21ecd7d Backport 1.8.1: identity: allow creating a role with a non-existent key (#122...
  • d4269f3 [VAULT-1986] Cap AWS Token TTL based on Default Lease TTL (#12026) (#12252)
  • 062842a Updating SDK version for 1.8.1 (#12247)
  • bd35cc7 Updating go version to 1.16.6 for security fix (#12245) (#12249)
  • c48b322 Forward cert signing requests to the primary on perf secondaries as well as p...
  • 436d893 serviceregistration: add external-source meta value (#12163) (#12241)
  • 7f2cfd0 Backport: Don't use autogenerated licenses in diagnose when config is specifi...
  • 6748c7d backport disk usage print fixes (#12232)
  • f882564 identity: do not allow a role's token_ttl to be longer than verification_ttl ...
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
Bumps [github.com/hashicorp/vault/api](https://github.com/hashicorp/vault) from 1.8.0 to 1.8.1. <details> <summary>Release notes</summary> <p><em>Sourced from <a href="https://github.com/hashicorp/vault/releases">github.com/hashicorp/vault/api's releases</a>.</em></p> <blockquote> <h2>v1.8.1</h2> <h2>1.8.1</h2> <h3>August 5th, 2021</h3> <p>CHANGES:</p> <ul> <li>go: Update go version to 1.16.6 [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/12245">GH-12245</a>]</li> </ul> <p>IMPROVEMENTS:</p> <ul> <li>serviceregistration: add <code>external-source: &quot;vault&quot;</code> metadata value for Consul registration. [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/12163">GH-12163</a>]</li> </ul> <p>BUG FIXES:</p> <ul> <li>auth/aws: Remove warning stating AWS Token TTL will be capped by the Default Lease TTL. [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/12026">GH-12026</a>]</li> <li>auth/jwt: Fixes OIDC auth from the Vault UI when using <code>form_post</code> as the <code>oidc_response_mode</code>. [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/12258">GH-12258</a>]</li> <li>core (enterprise): Disallow autogenerated licenses to be used in diagnose even when config is specified</li> <li>core: fix byte printing for diagnose disk checks [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/12229">GH-12229</a>]</li> <li>identity: do not allow a role's token_ttl to be longer than the signing key's verification_ttl [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/12151">GH-12151</a>]</li> </ul> </blockquote> </details> <details> <summary>Changelog</summary> <p><em>Sourced from <a href="https://github.com/hashicorp/vault/blob/main/CHANGELOG.md">github.com/hashicorp/vault/api's changelog</a>.</em></p> <blockquote> <h2>1.8.12</h2> <h3>June 10, 2022</h3> <p>BUG FIXES:</p> <ul> <li>agent: Redact auto auth token from renew endpoints [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/15380">GH-15380</a>]</li> <li>core: Prevent changing file permissions of audit logs when mode 0000 is used. [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/15759">GH-15759</a>]</li> <li>core: fixed systemd reloading notification [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/15041">GH-15041</a>]</li> <li>core: pre-calculate namespace specific paths when tainting a route during postUnseal [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/15067">GH-15067</a>]</li> <li>storage/raft (enterprise): Auto-snapshot configuration now forbids slashes in file prefixes for all types, and &quot;/&quot; in path prefix for local storage type. Strip leading prefix in path prefix for AWS. Improve error handling/reporting.</li> <li>transform (enterprise): Fix non-overridable column default value causing tokenization tokens to expire prematurely when using the MySQL storage backend.</li> </ul> <h2>1.8.11</h2> <h3>April 29, 2022</h3> <p>BUG FIXES:</p> <ul> <li>raft: fix Raft TLS key rotation panic that occurs if active key is more than 24 hours old [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/15156">GH-15156</a>]</li> <li>sdk: Fix OpenApi spec generator to properly convert TypeInt64 to OAS supported int64 [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/15104">GH-15104</a>]</li> </ul> <h2>1.8.10</h2> <h3>April 22, 2022</h3> <p>CHANGES:</p> <ul> <li>core: A request that fails path validation due to relative path check will now be responded to with a 400 rather than 500. [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/14328">GH-14328</a>]</li> <li>core: Bump Go version to 1.16.15. [<a href="https://github.com/hashicorp/vault/pull/go-ver-1810">GH-go-ver-1810</a>]</li> </ul> <p>IMPROVEMENTS:</p> <ul> <li>auth/ldap: Add username_as_alias configurable to change how aliases are named [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/14324">GH-14324</a>]</li> <li>core: Systemd unit file included with the Linux packages now sets the service type to notify. [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/14385">GH-14385</a>]</li> <li>sentinel (enterprise): Upgrade sentinel to <a href="https://docs.hashicorp.com/sentinel/changelog#0-18-5-january-14-2022">v0.18.5</a> to avoid potential naming collisions in the remote installer</li> </ul> <p>BUG FIXES:</p> <ul> <li>api/sys/raft: Update RaftSnapshotRestore to use net/http client allowing bodies larger than allocated memory to be streamed [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/14269">GH-14269</a>]</li> <li>auth/approle: Add maximum length for input values that result in SHA56 HMAC calculation [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/14746">GH-14746</a>]</li> <li>cassandra: Update gocql Cassandra client to fix &quot;no hosts available in the pool&quot; error [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/14973">GH-14973</a>]</li> <li>cli: Fix panic caused by parsing key=value fields whose value is a single backslash [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/14523">GH-14523</a>]</li> <li>core: Fix panic caused by parsing JSON integers for fields defined as comma-delimited integers [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/15072">GH-15072</a>]</li> <li>core: Fix panic caused by parsing JSON integers for fields defined as comma-delimited strings [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/14522">GH-14522</a>]</li> <li>core: Fix panic caused by parsing policies with empty slice values. [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/14501">GH-14501</a>]</li> <li>core: Fix panic for help request URL paths without /v1/ prefix [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/14704">GH-14704</a>]</li> <li>core: fixing excessive unix file permissions [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/14791">GH-14791</a>]</li> <li>core: fixing excessive unix file permissions on dir, files and archive created by vault debug command [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/14846">GH-14846</a>]</li> <li>core: report unused or redundant keys in server configuration [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/14752">GH-14752</a>]</li> <li>core: time.After() used in a select statement can lead to memory leak [<a href="https://github-redirect.dependabot.com/hashicorp/vault/pull/14814">GH-14814</a>]</li> <li>metrics/autosnapshots (enterprise) : Fix bug that could cause vault.autosnapshots.save.errors to not be incremented when there is an</li> </ul> <!-- raw HTML omitted --> </blockquote> <p>... (truncated)</p> </details> <details> <summary>Commits</summary> <ul> <li><a href="https://github.com/hashicorp/vault/commit/4b0264f28defc05454c31277cfa6ff63695a458d"><code>4b0264f</code></a> Updates vault-plugin-auth-jwt to v0.10.1 (<a href="https://github-redirect.dependabot.com/hashicorp/vault/issues/12258">#12258</a>)</li> <li><a href="https://github.com/hashicorp/vault/commit/21ecd7d12ad04a3ec65948335836625a5898b7bb"><code>21ecd7d</code></a> Backport 1.8.1: identity: allow creating a role with a non-existent key (<a href="https://github-redirect.dependabot.com/hashicorp/vault/issues/122">#122</a>...</li> <li><a href="https://github.com/hashicorp/vault/commit/d4269f3d02363c21a270f6995bd26bbe27ebe8ae"><code>d4269f3</code></a> [VAULT-1986] Cap AWS Token TTL based on Default Lease TTL (<a href="https://github-redirect.dependabot.com/hashicorp/vault/issues/12026">#12026</a>) (<a href="https://github-redirect.dependabot.com/hashicorp/vault/issues/12252">#12252</a>)</li> <li><a href="https://github.com/hashicorp/vault/commit/062842ab9dcf1795a49900d240d205e41301ac84"><code>062842a</code></a> Updating SDK version for 1.8.1 (<a href="https://github-redirect.dependabot.com/hashicorp/vault/issues/12247">#12247</a>)</li> <li><a href="https://github.com/hashicorp/vault/commit/bd35cc7deb10c137c19a889d6600c5b285f4d42c"><code>bd35cc7</code></a> Updating go version to 1.16.6 for security fix (<a href="https://github-redirect.dependabot.com/hashicorp/vault/issues/12245">#12245</a>) (<a href="https://github-redirect.dependabot.com/hashicorp/vault/issues/12249">#12249</a>)</li> <li><a href="https://github.com/hashicorp/vault/commit/c48b322fce4588edc8129f55f9196fc33f72a609"><code>c48b322</code></a> Forward cert signing requests to the primary on perf secondaries as well as p...</li> <li><a href="https://github.com/hashicorp/vault/commit/436d893401a9352fc0e2075ccbe5c6d8f966f0bc"><code>436d893</code></a> serviceregistration: add external-source meta value (<a href="https://github-redirect.dependabot.com/hashicorp/vault/issues/12163">#12163</a>) (<a href="https://github-redirect.dependabot.com/hashicorp/vault/issues/12241">#12241</a>)</li> <li><a href="https://github.com/hashicorp/vault/commit/7f2cfd0a793467f8c0d671a63a90f79be911b6dd"><code>7f2cfd0</code></a> Backport: Don't use autogenerated licenses in diagnose when config is specifi...</li> <li><a href="https://github.com/hashicorp/vault/commit/6748c7d278667f1c5caf0bc985614967c250d564"><code>6748c7d</code></a> backport disk usage print fixes (<a href="https://github-redirect.dependabot.com/hashicorp/vault/issues/12232">#12232</a>)</li> <li><a href="https://github.com/hashicorp/vault/commit/f8825648f5be16bb25ef9662f543115ed6025a03"><code>f882564</code></a> identity: do not allow a role's token_ttl to be longer than verification_ttl ...</li> <li>Additional commits viewable in <a href="https://github.com/hashicorp/vault/compare/v1.8.0...v1.8.1">compare view</a></li> </ul> </details> <br /> [![Dependabot compatibility score](https://dependabot-badges.githubapp.com/badges/compatibility_score?dependency-name=github.com/hashicorp/vault/api&package-manager=go_modules&previous-version=1.8.0&new-version=1.8.1)](https://docs.github.com/en/github/managing-security-vulnerabilities/about-dependabot-security-updates#about-compatibility-scores) Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting `@dependabot rebase`. [//]: # (dependabot-automerge-start) [//]: # (dependabot-automerge-end) --- <details> <summary>Dependabot commands and options</summary> <br /> You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) </details>
github-actions[bot] (Migrated from github.com) approved these changes 2022-10-13 11:34:41 +03:00
dependabot[bot] commented 2022-11-01 11:37:16 +03:00 (Migrated from github.com)

Superseded by #89.

Superseded by #89.

Pull request closed

Sign in to join this conversation.
No description provided.