chore(deps): update dependency hashicorp/vault to v1.14.0
This MR contains the following updates:
Package | Update | Change |
---|---|---|
hashicorp/vault | minor |
v1.13.2 -> v1.14.0
|
Release Notes
hashicorp/vault
v1.14.0
1.14.0
June 21, 2023
BREAKING CHANGES:
- secrets/pki: Maintaining running count of certificates will be turned off by default. To re-enable keeping these metrics available on the tidy status endpoint, enable maintain_stored_certificate_counts on tidy-config, to also publish them to the metrics consumer, enable publish_stored_certificate_count_metrics . [GH-18186]
CHANGES:
- auth/alicloud: Updated plugin from v0.14.0 to v0.15.0 [GH-20758]
- auth/azure: Updated plugin from v0.13.0 to v0.15.0 [GH-20816]
- auth/centrify: Updated plugin from v0.14.0 to v0.15.1 [GH-20745]
- auth/gcp: Updated plugin from v0.15.0 to v0.16.0 [GH-20725]
- auth/jwt: Updated plugin from v0.15.0 to v0.16.0 [GH-20799]
- auth/kubernetes: Update plugin to v0.16.0 [GH-20802]
- core: Bump Go version to 1.20.5.
- core: Remove feature toggle for SSCTs, i.e. the env var VAULT_DISABLE_SERVER_SIDE_CONSISTENT_TOKENS. [GH-20834]
- core: Revert #19676 (VAULT_GRPC_MIN_CONNECT_TIMEOUT env var) as we decided it was unnecessary. [GH-20826]
- database/couchbase: Updated plugin from v0.9.0 to v0.9.2 [GH-20764]
- database/redis-elasticache: Updated plugin from v0.2.0 to v0.2.1 [GH-20751]
- replication (enterprise): Add a new parameter for the update-primary API call that allows for setting of the primary cluster addresses directly, instead of via a token.
- secrets/ad: Updated plugin from v0.10.1-0.20230329210417-0b2cdb26cf5d to v0.16.0 [GH-20750]
- secrets/alicloud: Updated plugin from v0.5.4-beta1.0.20230330124709-3fcfc5914a22 to v0.15.0 [GH-20787]
- secrets/aure: Updated plugin from v0.15.0 to v0.16.0 [GH-20777]
- secrets/database/mongodbatlas: Updated plugin from v0.9.0 to v0.10.0 [GH-20882]
- secrets/database/snowflake: Updated plugin from v0.7.0 to v0.8.0 [GH-20807]
- secrets/gcp: Updated plugin from v0.15.0 to v0.16.0 [GH-20818]
- secrets/keymgmt: Updated plugin to v0.9.1
- secrets/kubernetes: Update plugin to v0.5.0 [GH-20802]
- secrets/mongodbatlas: Updated plugin from v0.9.1 to v0.10.0 [GH-20742]
- secrets/pki: Allow issuance of root CAs without AIA, when templated AIA information includes issuer_id. [GH-21209]
- secrets/pki: Warning when issuing leafs from CSRs with basic constraints. In the future, issuance of non-CA leaf certs from CSRs with asserted IsCA Basic Constraints will be prohibited. [GH-20654]
FEATURES:
- AWS Static Roles: The AWS Secrets Engine can manage static roles configured by users. [GH-20536]
- Automated License Utilization Reporting: Added automated license utilization reporting, which sends minimal product-license metering data to HashiCorp without requiring you to manually collect and report them.
-
Environment Variables through Vault Agent: Introducing a new process-supervisor mode for Vault Agent which allows injecting secrets as environment variables into a child process using a new
env_template
configuration stanza. The process-supervisor configuration can be generated with a newvault agent generate-config
helper tool. [GH-20530] - MongoDB Atlas Database Secrets: Adds support for client certificate credentials [GH-20425]
- MongoDB Atlas Database Secrets: Adds support for generating X.509 certificates on dynamic roles for user authentication [GH-20882]
- NEW PKI Workflow in UI: Completes generally available rollout of new PKI UI that provides smoother mount configuration and a more guided user experience [GH-pki-ui-improvements]
- Secrets/Auth Plugin Multiplexing: The plugin will be multiplexed when run as an external plugin by vault versions that support secrets/auth plugin multiplexing (> 1.12) [GH-19215]
- Sidebar Navigation in UI: A new sidebar navigation panel has been added in the UI to replace the top navigation bar. [GH-19296]
- Vault PKI ACME Server: Support for the ACME certificate lifecycle management protocol has been added to the Vault PKI Plugin. This allows standard ACME clients, such as the EFF's certbot and the CNCF's k8s cert-manager, to request certificates from a Vault server with no knowledge of Vault APIs or authentication mechanisms. For public-facing Vault instances, we recommend requiring External Account Bindings (EAB) to limit the ability to request certificates to only authenticated clients. [GH-20752]
-
Vault Proxy: Introduced Vault Proxy, a new subcommand of the Vault binary that can be invoked using
vault proxy -config=config.hcl
. It currently has the same feature set as Vault Agent's API proxy, but the two may diverge in the future. We plan to deprecate the API proxy functionality of Vault Agent in a future release. [GH-20548] - OCI Auto-Auth: Add OCI (Oracle Cloud Infrastructure) auto-auth method [GH-19260]
IMMROVEMENTS:
- api: Add Config.TLSConfig method to fetch the TLS configuration from a client config. [GH-20265]
- physical/etcd: Upgrade etcd3 client to v3.5.7 [GH-20261]
- activitylog: EntityRecord protobufs now contain a ClientType field for distinguishing client sources. [GH-20626]
- agent: Add integration tests for agent running in process supervisor mode [GH-20741]
- agent: Add logic to validate env_template entries in configuration [GH-20569]
- agent: Added
reload
option to cert auth configuration in case of external renewals of local x509 key-pairs. [GH-19002] - agent: JWT auto-auth has a new config option,
remove_jwt_follows_symlinks
(default: false), that, if set to true will now remove the JWT, instead of the symlink to the JWT, if a symlink to a JWT has been provided in thepath
option, and theremove_jwt_after_reading
config option is set to true (default). [GH-18863] - agent: Vault Agent now reports its name and version as part of the User-Agent header in all requests issued. [GH-19776]
- agent: initial implementation of a process runner for injecting secrets via environment variables via vault agent [GH-20628]
- api: GET ... /sys/internal/counters/activity?current_billing_period=true now results in a response which contains the full billing period [GH-20694]
- api:
/sys/internal/counters/config
endpoint now contains read-onlyminimum_retention_months
. [GH-20150] - api:
/sys/internal/counters/config
endpoint now contains read-onlyreporting_enabled
andbilling_start_timestamp
fields. [GH-20086] - api: property based testing for LifetimeWatcher sleep duration calculation [GH-17919]
- audit: add plugin metadata, including plugin name, type, version, sha256, and whether plugin is external, to audit logging [GH-19814]
- audit: forwarded requests can now contain host metadata on the node it was sent 'from' or a flag to indicate that it was forwarded.
- auth/cert: Better return OCSP validation errors during login to the caller. [GH-20234]
- auth/kerberos: Enable plugin multiplexing auth/kerberos: Upgrade plugin dependencies [GH-20771]
- auth/ldap: allow configuration of alias dereferencing in LDAP search [GH-18230]
- auth/ldap: allow providing the LDAP password via an env var when authenticating via the CLI [GH-18225]
- auth/oidc: Adds support for group membership parsing when using IBM ISAM as an OIDC provider. [GH-19247]
- build: Prefer GOBIN when set over GOPATH/bin when building the binary [GH-19862]
- cli: Add walkSecretsTree helper function, which recursively walks secrets rooted at the given path [GH-20464]
- cli: Improve addPrefixToKVPath helper [GH-20488]
- command/server (enterprise): -dev-three-node now creates perf standbys instead of regular standbys. [GH-20629]
- command/server: Add support for dumping pprof files to the filesystem via SIGUSR2 when
VAULT_PMROF_WRITE_TO_FILE=true
is set on the server. [GH-20609] - command/server: New -dev-cluster-json writes a file describing the dev cluster in -dev and -dev-three-node modes, plus -dev-three-node now enables unauthenticated metrics and pprof requests. [GH-20224]
- core (enterprise): add configuration for license reporting [GH-19891]
- core (enterprise): license updates trigger a reload of reporting and the activity log [GH-20680]
- core (enterprise): support reloading configuration for automated reporting via SIGHUP [GH-20680]
- core (enterprise): vault server command now allows for opt-out of automated
reporting via the
OPTOUT_LICENSE_REPORTING
environment variable. [GH-3939] - core, secrets/pki, audit: Update dependency go-jose to v3 due to v2 deprecation. [GH-20559]
- core/activity: error when attempting to update retention configuration below the minimum [GH-20078]
- core/activity: refactor the activity log's generation of precomputed queries [GH-20073]
- core: Add possibility to decode a generated encoded root token via the rest API [GH-20595]
- core: include namespace path in granting_policies block of audit log
- core: include reason for ErrReadOnly on PBPWF writing failures
- core: report intermediate error messages during request forwarding [GH-20643]
- core:provide more descriptive error message when calling enterprise feature paths in open-source [GH-18870]
- database/elasticsearch: Upgrade plugin dependencies [GH-20767]
- database/mongodb: upgrade mongo driver to 1.11 [GH-19954]
- database/redis: Upgrade plugin dependencies [GH-20763]
- http: Support responding to HEAD operation from plugins [GH-19520]
- openapi: Add openapi response definitions to /sys defined endpoints. [GH-18633]
- openapi: Add openapi response definitions to pki/config_*.go [GH-18376]
- openapi: Add openapi response definitions to vault/logical_system_paths.go defined endpoints. [GH-18515]
- openapi: Consistently stop Vault server on exit in gen_openapi.sh [GH-19252]
- openapi: Improve operationId/request/response naming strategy [GH-19319]
- openapi: add openapi response definitions to /sys/internal endpoints [GH-18542]
- openapi: add openapi response definitions to /sys/rotate endpoints [GH-18624]
- openapi: add openapi response definitions to /sys/seal endpoints [GH-18625]
- openapi: add openapi response definitions to /sys/tool endpoints [GH-18626]
- openapi: add openapi response definitions to /sys/version-history, /sys/leader, /sys/ha-status, /sys/host-info, /sys/in-flight-req [GH-18628]
- openapi: add openapi response definitions to /sys/wrapping endpoints [GH-18627]
- openapi: add openapi response defintions to /sys/auth endpoints [GH-18465]
- openapi: add openapi response defintions to /sys/capabilities endpoints [GH-18468]
- openapi: add openapi response defintions to /sys/config and /sys/generate-root endpoints [GH-18472]
- openapi: added ability to validate response structures against openapi schema for test clusters [GH-19043]
- sdk/framework: Fix non-deterministic ordering of 'required' fields in OpenAPI spec [GH-20881]
- sdk: Add new docker-based cluster testing framework to the sdk. [GH-20247]
- secrets/ad: upgrades dependencies [GH-19829]
- secrets/alicloud: upgrades dependencies [GH-19846]
- secrets/consul: Improve error message when ACL bootstrapping fails. [GH-20891]
- secrets/database: Adds error message requiring password on root crednetial rotation. [GH-19103]
- secrets/gcpkms: Enable plugin multiplexing secrets/gcpkms: Upgrade plugin dependencies [GH-20784]
- secrets/mongodbatlas: upgrades dependencies [GH-19861]
- secrets/openldap: upgrades dependencies [GH-19993]
- secrets/pki: Add missing fields to tidy-status, include new last_auto_tidy_finished field. [GH-20442]
- secrets/pki: Add warning when issuer lacks KeyUsage during CRL rebuilds; expose in logs and on rotation. [GH-20253]
- secrets/pki: Allow determining existing issuers and keys on import. [GH-20441]
- secrets/pki: Include CA serial number, key UUID on issuers list endpoint. [GH-20276]
- secrets/pki: Limit ACME issued certificates NotAfter TTL to a maximum of 90 days [GH-20981]
- secrets/pki: Support TLS-ALPN-01 challenge type in ACME for DNS certificate identifiers. [GH-20943]
- secrets/pki: add subject key identifier to read key response [GH-20642]
- secrets/postgresql: Add configuration to scram-sha-256 encrypt passwords on Vault before sending them to PostgreSQL [GH-19616]
- secrets/terraform: upgrades dependencies [GH-19798]
- secrets/transit: Add support to import public keys in transit engine and allow encryption and verification of signed data [GH-17934]
- secrets/transit: Allow importing RSA-PSS OID (1.2.840.113549.1.1.10) private keys via BYOK. [GH-19519]
- secrets/transit: Respond to writes with updated key policy, cache configuration. [GH-20652]
- secrets/transit: Support BYOK-encrypted export of keys to securely allow synchronizing specific keys and version across clusters. [GH-20736]
- ui: Add download button for each secret value in KV v2 [GH-20431]
- ui: Add filtering by auth type and auth name to the Authentication Method list view. [GH-20747]
- ui: Add filtering by engine type and engine name to the Secret Engine list view. [GH-20481]
- ui: Adds whitespace warning to secrets engine and auth method path inputs [GH-19913]
- ui: Remove the Bulma CSS framework. [GH-19878]
- ui: Update Web CLI with examples and a new
kv-get
command for reading kv v2 data and metadata [GH-20590] - ui: Updates UI javascript dependencies [GH-19901]
- ui: add allowed_managed_keys field to secret engine mount options [GH-19791]
- ui: adds warning for commas in stringArray inputs and updates tooltip help text to remove references to comma separation [GH-20163]
- ui: updates clients configuration edit form state based on census reporting configuration [GH-20125]
- website/docs: Add rotate root documentation for azure secrets engine [GH-19187]
- website/docs: fix database static-user sample payload [GH-19170]
BUG FIXES:
- agent: Fix agent generate-config to accept -namespace, VAULT_NAMESPACE, and other client-modifying flags. [GH-21297]
- agent: Fix bug with 'cache' stanza validation [GH-20934]
- api: Addressed a couple of issues that arose as edge cases for the -output-policy flag. Specifically around properly handling list commands, distinguishing kv V1/V2, and correctly recognizing protected paths. [GH-19160]
- api: Properly Handle nil identity_policies in Secret Data [GH-20636]
- auth/ldap: Set default value for
max_page_size
properly [GH-20453] - auth/token: Fix cubbyhole and revocation for legacy service tokens [GH-19416]
- cli/kv: add -mount flag to kv list [GH-19378]
- core (enterprise): Don't delete backend stored data that appears to be filterable on this secondary if we don't have a corresponding mount entry.
- core (enterprise): Fix intermittent issue with token entries sometimes not being found when using a newly created token in a request to a secondary, even when SSCT
new_token
forwarding is set. When this occurred, this would result in the following error to the client:error performing token check: no lease entry found for token that ought to have one, possible eventual consistency issue
. - core (enterprise): Fix log shipper buffer size overflow issue for 32 bit architecture.
- core (enterprise): Fix logshipper buffer size to default to DefaultBufferSize only when reported system memory is zero.
- core (enterprise): Fix panic when using invalid accessor for control-group request
- core (enterprise): Fix perf standby WAL streaming silently failures when replication setup happens at a bad time.
- core (enterprise): Fix read on perf standbys failing with 412 after leadership change, unseal, restores or restarts when no writes occur
- core (enterprise): Remove MFA Enforcment configuration for namespace when deleting namespace
- core/ssct (enterprise): Fixed race condition where a newly promoted DR may revert
sscGenCounter
resulting in 412 errors. - core: Change where we evaluate filtered paths as part of mount operations; this is part of an enterprise bugfix that will have its own changelog entry. Fix wrong lock used in ListAuths link meta interface implementation. [GH-21260]
- core: Do not cache seal configuration to fix a bug that resulted in sporadic auto unseal failures. [GH-21223]
- core: Don't exit just because we think there's a potential deadlock. [GH-21342]
- core: Fix Forwarded Writer construction to correctly find active nodes, allowing PKI cross-cluster functionality to succeed on existing mounts.
- core: Fix panic in sealed nodes using raft storage trying to emit raft metrics [GH-21249]
- core: Fix writes to readonly storage on performance standbys when user lockout feature is enabled. [GH-20783]
- identity: Fixes duplicate groups creation with the same name but unique IDs. [GH-20964]
- license (enterprise): Fix bug where license would update even if the license didn't change.
- openapi: Small fixes for OpenAPI display attributes. Changed "log-in" to "login" [GH-20285]
- plugin/reload: Fix a possible data race with rollback manager and plugin reload [GH-19468]
- replication (enterprise): Fix a caching issue when replicating filtered data to a performance secondary. This resulted in the data being set to nil in the cache and a "invalid value" error being returned from the API.
- replication (enterprise): Fix a race condition with invalid tokens during WAL streaming that was causing Secondary clusters to be unable to connect to a Primary.
- replication (enterprise): Fix a race condition with update-primary that could result in data loss after a DR failover
- replication (enterprise): Fix bug where reloading external plugin on a secondary would break replication.
- replication (enterprise): Fix path filters deleting data right after it's written by backend Initialize funcs
- replication (enterprise): Fix regression causing token creation against a role with a new entity alias to be incorrectly forwarded from perf standbys. [GH-21100]
- replication (enterprise): Fix replication status for Primary clusters showing its primary cluster's information (in case of DR) in secondaries field when known_secondaries field is nil
- replication (enterprise): fix bug where secondary grpc connections would timeout when connecting to a primary host that no longer exists.
- sdk/backend: prevent panic when computing the zero value for a
TypeInt64
schema field. [GH-18729] - secrets/pki: Support setting both maintain_stored_certificate_counts=false and publish_stored_certificate_count_metrics=false explicitly in tidy config. [GH-20664]
- secrets/transform (enterprise): Address SQL connection leak when cleaning expired tokens
- secrets/transform (enterprise): Fix a caching bug affecting secondary nodes after a tokenization key rotation
- secrets/transform (enterprise): Fix persistence problem with rotated tokenization key versions
- secrets/transform: Added importing of keys and key versions into the Transform secrets engine using the command 'vault transform import' and 'vault transform import-version'. [GH-20668]
- secrets/transit: Fix export of HMAC-only key, correctly exporting the key used for sign operations. For consumers of the previously incorrect key, use the plaintext export to retrieve these incorrect keys and import them as new versions. secrets/transit: Fix bug related to shorter dedicated HMAC key sizing. sdk/helper/keysutil: New HMAC type policies will have HMACKey equal to Key and be copied over on import. [GH-20864]
- shamir: change mul and div implementations to be constant-time [GH-19495]
- ui (enterprise): Fix cancel button from transform engine role creation page [GH-19135]
- ui: Fix secret render when path includes %. Resolves #11616. [GH-20430]
- ui: Fixes issue unsealing cluster for seal types other than shamir [GH-20897]
- ui: fixes auto_rotate_period ttl input for transit keys [GH-20731]
- ui: fixes bug in kmip role form that caused
operation_all
to persist after deselecting all operation checkboxes [GH-19139] - ui: fixes key_bits and signature_bits reverting to default values when editing a pki role [GH-20907]
- ui: wait for wanted message event during OIDC callback instead of using the first message event [GH-18521]
v1.13.4
1.13.4
June 21, 2023
BREAKING CHANGES:
- secrets/pki: Maintaining running count of certificates will be turned off by default. To re-enable keeping these metrics available on the tidy status endpoint, enable maintain_stored_certificate_counts on tidy-config, to also publish them to the metrics consumer, enable publish_stored_certificate_count_metrics . [GH-18186]
CHANGES:
- core: Bump Go version to 1.20.5.
FEATURES:
- Automated License Utilization Reporting: Added automated license utilization reporting, which sends minimal product-license metering data to HashiCorp without requiring you to manually collect and report them.
- core (enterprise): Add background worker for automatic reporting of billing information. [GH-19625]
IMMROVEMENTS:
- api: GET ... /sys/internal/counters/activity?current_billing_period=true now results in a response which contains the full billing period [GH-20694]
- api:
/sys/internal/counters/config
endpoint now contains read-onlyminimum_retention_months
. [GH-20150] - api:
/sys/internal/counters/config
endpoint now contains read-onlyreporting_enabled
andbilling_start_timestamp
fields. [GH-20086] - core (enterprise): add configuration for license reporting [GH-19891]
- core (enterprise): license updates trigger a reload of reporting and the activity log [GH-20680]
- core (enterprise): support reloading configuration for automated reporting via SIGHUP [GH-20680]
- core (enterprise): vault server command now allows for opt-out of automated
reporting via the
OPTOUT_LICENSE_REPORTING
environment variable. [GH-3939] - core/activity: error when attempting to update retention configuration below the minimum [GH-20078]
- core/activity: refactor the activity log's generation of precomputed queries [GH-20073]
- ui: updates clients configuration edit form state based on census reporting configuration [GH-20125]
BUG FIXES:
- agent: Fix bug with 'cache' stanza validation [GH-20934]
- core (enterprise): Don't delete backend stored data that appears to be filterable on this secondary if we don't have a corresponding mount entry.
- core: Change where we evaluate filtered paths as part of mount operations; this is part of an enterprise bugfix that will have its own changelog entry. Fix wrong lock used in ListAuths link meta interface implementation. [GH-21260]
- core: Do not cache seal configuration to fix a bug that resulted in sporadic auto unseal failures. [GH-21223]
- core: Don't exit just because we think there's a potential deadlock. [GH-21342]
- core: Fix panic in sealed nodes using raft storage trying to emit raft metrics [GH-21249]
- identity: Fixes duplicate groups creation with the same name but unique IDs. [GH-20964]
- replication (enterprise): Fix a race condition with update-primary that could result in data loss after a DR failover
- replication (enterprise): Fix path filters deleting data right after it's written by backend Initialize funcs
- replication (enterprise): Fix regression causing token creation against a role with a new entity alias to be incorrectly forwarded from perf standbys. [GH-21100]
- storage/raft: Fix race where new follower joining can get pruned by dead server cleanup. [GH-20986]
v1.13.3
1.13.3
June 08, 2023
CHANGES:
- core: Bump Go version to 1.20.4.
- core: Revert #19676 (VAULT_GRPC_MIN_CONNECT_TIMEOUT env var) as we decided it was unnecessary. [GH-20826]
- replication (enterprise): Add a new parameter for the update-primary API call that allows for setting of the primary cluster addresses directly, instead of via a token.
- storage/aerospike: Aerospike storage shouldn't be used on 32-bit architectures and is now unsupported on them. [GH-20825]
IMMROVEMENTS:
- Add debug symbols back to builds to fix Dynatrace support [GH-20519]
- audit: add a
mount_point
field to audit requests and response entries [GH-20411] - autopilot: Update version to v0.2.0 to add better support for respecting min quorum [GH-19472]
- command/server: Add support for dumping pprof files to the filesystem via SIGUSR2 when
VAULT_PMROF_WRITE_TO_FILE=true
is set on the server. [GH-20609] - core: Add possibility to decode a generated encoded root token via the rest API [GH-20595]
- core: include namespace path in granting_policies block of audit log
- core: report intermediate error messages during request forwarding [GH-20643]
- openapi: Fix generated types for duration strings [GH-20841]
- sdk/framework: Fix non-deterministic ordering of 'required' fields in OpenAPI spec [GH-20881]
- secrets/pki: add subject key identifier to read key response [GH-20642]
BUG FIXES:
- api: Properly Handle nil identity_policies in Secret Data [GH-20636]
- auth/ldap: Set default value for
max_page_size
properly [GH-20453] - cli: CLI should take days as a unit of time for ttl like flags [GH-20477]
- cli: disable printing flags warnings messages for the ssh command [GH-20502]
- command/server: fixes panic in Vault server command when running in recovery mode [GH-20418]
- core (enterprise): Fix log shipper buffer size overflow issue for 32 bit architecture.
- core (enterprise): Fix logshipper buffer size to default to DefaultBufferSize only when reported system memory is zero.
- core (enterprise): Remove MFA Enforcment configuration for namespace when deleting namespace
- core/identity: Allow updates of only the custom-metadata for entity alias. [GH-20368]
- core: Fix Forwarded Writer construction to correctly find active nodes, allowing PKI cross-cluster functionality to succeed on existing mounts.
- core: Fix writes to readonly storage on performance standbys when user lockout feature is enabled. [GH-20783]
- core: prevent panic on login after namespace is deleted that had mfa enforcement [GH-20375]
- replication (enterprise): Fix a race condition with invalid tokens during WAL streaming that was causing Secondary clusters to be unable to connect to a Primary.
- replication (enterprise): fix bug where secondary grpc connections would timeout when connecting to a primary host that no longer exists.
- secrets/pki: Include per-issuer enable_aia_url_templating in issuer read endpoint. [GH-20354]
- secrets/transform (enterprise): Fix a caching bug affecting secondary nodes after a tokenization key rotation
- secrets/transform: Added importing of keys and key versions into the Transform secrets engine using the command 'vault transform import' and 'vault transform import-version'. [GH-20668]
- secrets/transit: Fix export of HMAC-only key, correctly exporting the key used for sign operations. For consumers of the previously incorrect key, use the plaintext export to retrieve these incorrect keys and import them as new versions. secrets/transit: Fix bug related to shorter dedicated HMAC key sizing. sdk/helper/keysutil: New HMAC type policies will have HMACKey equal to Key and be copied over on import. [GH-20864]
- ui: Fixes issue unsealing cluster for seal types other than shamir [GH-20897]
- ui: fixes issue creating mfa login enforcement from method enforcements tab [GH-20603]
- ui: fixes key_bits and signature_bits reverting to default values when editing a pki role [GH-20907]
Configuration
-
If you want to rebase/retry this MR, check this box