feat(deps): update dependency vault to v1.16.3
This MR contains the following updates:
Package | Update | Change |
---|---|---|
vault | patch |
1.16.2 -> 1.16.3
|
Release Notes
hashicorp/vault (vault)
v1.16.3
May 30, 2024
Enterprise LTS: Vault Enterprise 1.16 is a Long-Term Support (LTS) release.
CHANGES:
- auth/jwt: Update plugin to v0.20.3 [GH-26890]
- core/identity: improve performance for secondary nodes receiving identity related updates through replication [GH-27184]
- core: Bump Go version to 1.22.2.
IMPROVEMENTS:
- secrets/pki (enterprise): Disable warnings about unknown parameters to the various CIEPS endpoints
- ui: Update PGP display and show error for Generate Operation Token flow with PGP [GH-26993]
BUG FIXES:
- activity (enterprise): fix read-only storage error on upgrades
- auto-auth: Addressed issue where having no permissions to renew a renewable token caused auto-auth to attempt to renew constantly with no backoff [GH-26844]
- core (enterprise): Fix an issue that prevented the seal re-wrap status from reporting that a re-wrap is in progress for up to a second.
- core/audit: Audit logging a Vault request/response will now use a minimum 5 second context timeout. If the existing context deadline occurs later than 5s in the future, it will be used, otherwise a new context, separate from the original will be used. [GH-26616]
- core: Add missing field delegated_auth_accessors to GET /sys/mounts/:path API response [GH-26876]
- core: Address a data race updating a seal's last seen healthy time attribute [GH-27014]
- core: Fix
redact_version
listener parameter being ignored for some OpenAPI related endpoints. [GH-26607] - events (enterprise): Fix bug preventing subscribing and receiving events within a namepace.
- pki: Fix error in cross-signing using
ed25519
keys [GH-27093] - replication (enterprise): fix "given mount path is not in the same namespace as the request" error that can occur when enabling replication for the first time on a secondary cluster
- secrets-sync (enterprise): Secondary nodes in a cluster now properly check activation-flags values.
- secrets/azure: Update vault-plugin-secrets-azure to 0.17.2 to include a bug fix for azure role creation [GH-26896]
- secrets/pki (enterprise): cert_role parameter within authenticators.cert EST configuration handler could not be set
- secrets/transit: Use 'hash_algorithm' parameter if present in HMAC verify requests. Otherwise fall back to deprecated 'algorithm' parameter. [GH-27211]
- ui: Fix KVv2 cursor jumping inside json editor after initial input. [GH-27120]
- ui: Fix KVv2 json editor to allow null values. [GH-27094]
- ui: Fix broken help link in console for the web command. [GH-26858]
- ui: Fix link to v2 generic secrets engine from secrets list page. [GH-27019]
- ui: Prevent perpetual loading screen when Vault needs initialization [GH-26985]
- ui: Refresh model within a namespace on the Secrets Sync overview page. [GH-26790]
Configuration
-
If you want to rebase/retry this MR, check this box
This MR has been generated by Renovate Bot.
Edited by renovate