Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump github.com/hashicorp/vault/api from 1.9.2 to 1.15.0 #861

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Sep 16, 2024

Bumps github.com/hashicorp/vault/api from 1.9.2 to 1.15.0.

Release notes

Sourced from github.com/hashicorp/vault/api's releases.

v1.15.0

1.15.0

September 27, 2023

SECURITY:

  • secrets/transit: fix a regression that was honoring nonces provided in non-convergent modes during encryption. [GH-22852]

CHANGES:

  • auth/alicloud: Update plugin to v0.16.0 [GH-22646]
  • auth/azure: Update plugin to v0.16.0 [GH-22277]
  • auth/azure: Update plugin to v0.16.1 [GH-22795]
  • auth/azure: Update plugin to v0.16.2 [GH-23060]
  • auth/cf: Update plugin to v0.15.1 [GH-22758]
  • auth/gcp: Update plugin to v0.16.1 [GH-22612]
  • auth/jwt: Update plugin to v0.17.0 [GH-22678]
  • auth/kerberos: Update plugin to v0.10.1 [GH-22797]
  • auth/kubernetes: Update plugin to v0.17.0 [GH-22709]
  • auth/kubernetes: Update plugin to v0.17.1 [GH-22879]
  • auth/ldap: Normalize HTTP response codes when invalid credentials are provided [GH-21282]
  • auth/oci: Update plugin to v0.14.2 [GH-22805]
  • core (enterprise): Ensure Role Governing Policies are only applied down the namespace hierarchy
  • core/namespace (enterprise): Introduce the concept of high-privilege namespace (administrative namespace), which will have access to some system backend paths that were previously only accessible in the root namespace. [GH-21215]
  • core: Bump Go version to 1.21.1.
  • database/couchbase: Update plugin to v0.9.3 [GH-22854]
  • database/couchbase: Update plugin to v0.9.4 [GH-22871]
  • database/elasticsearch: Update plugin to v0.13.3 [GH-22696]
  • database/mongodbatlas: Update plugin to v0.10.1 [GH-22655]
  • database/redis-elasticache: Update plugin to v0.2.2 [GH-22584]
  • database/redis-elasticache: Update plugin to v0.2.3 [GH-22598]
  • database/redis: Update plugin to v0.2.2 [GH-22654]
  • database/snowflake: Update plugin to v0.9.0 [GH-22516]
  • events: Log level for processing an event dropped from info to debug. [GH-22997]
  • events: data_path will include full data path of secret, including name. [GH-22487]
  • replication (enterprise): Switch to non-deprecated gRPC field for resolver target host
  • sdk/logical/events: EventSender interface method is now SendEvent instead of Send. [GH-22487]
  • secrets/ad: Update plugin to v0.16.1 [GH-22856]
  • secrets/alicloud: Update plugin to v0.15.1 [GH-22533]
  • secrets/azure: Update plugin to v0.16.2 [GH-22799]
  • secrets/azure: Update plugin to v0.16.3 [GH-22824]
  • secrets/gcp: Update plugin to v0.17.0 [GH-22746]
  • secrets/gcpkms: Update plugin to v0.15.1 [GH-22757]
  • secrets/keymgmt: Update plugin to v0.9.3
  • secrets/kubernetes: Update plugin to v0.6.0 [GH-22823]
  • secrets/kv: Update plugin to v0.16.1 [GH-22716]
  • secrets/mongodbatlas: Update plugin to v0.10.1 [GH-22748]
  • secrets/openldap: Update plugin to v0.11.2 [GH-22734]
  • secrets/terraform: Update plugin to v0.7.3 [GH-22907]

... (truncated)

Changelog

Sourced from github.com/hashicorp/vault/api's changelog.

1.9.10

September 30, 2022

SECURITY:

  • secrets/pki: Vault’s TLS certificate auth method did not initially load the optionally-configured CRL issued by the role’s CA into memory on startup, resulting in the revocation list not being checked, if the CRL has not yet been retrieved. This vulnerability, CVE-2022-41316, is fixed in Vault 1.12.0, 1.11.4, 1.10.7, and 1.9.10. [HSEC-2022-24]

BUG FIXES:

  • auth/cert: Vault does not initially load the CRLs in cert auth unless the read/write CRL endpoint is hit. [GH-17138]
  • replication (enterprise): Fix data race in SaveCheckpoint()
  • ui: Fix lease force revoke action [GH-16930]

1.9.9

August 31, 2022

SECURITY:

  • core: When entity aliases mapped to a single entity share the same alias name, but have different mount accessors, Vault can leak metadata between the aliases. This metadata leak may result in unexpected access if templated policies are using alias metadata for path names. This vulnerability, CVE-2022-40186, is fixed in 1.11.3, 1.10.6, and 1.9.9. [HSEC-2022-18]

CHANGES:

  • core: Bump Go version to 1.17.13.

BUG FIXES:

  • core (enterprise): Fix some races in merkle index flushing code found in testing
  • core: Increase the allowed concurrent gRPC streams over the cluster port. [GH-16327]
  • database: Invalidate queue should cancel context first to avoid deadlock [GH-15933]
  • secrets/database: Fix a bug where the secret engine would queue up a lot of WAL deletes during startup. [GH-16686]
  • ui: Fix OIDC callback to accept namespace flag in different formats [GH-16886]
  • ui: Fix issue logging in with JWT auth method [GH-16466]

SECURITY:

  • identity/entity: When entity aliases mapped to a single entity share the same alias name, but have different mount accessors, Vault can leak metadata between the aliases. This metadata leak may result in unexpected access if templated policies are using alias metadata for path names. [HCSEC-2022-18]

1.9.8

July 21, 2022

SECURITY:

  • storage/raft: Vault Enterprise (“Vault”) clusters using Integrated Storage expose an unauthenticated API endpoint that could be abused to override the voter status of a node within a Vault HA cluster, introducing potential for future data loss or catastrophic failure. This vulnerability, CVE-2022-36129, was fixed in Vault 1.9.8, 1.10.5, and 1.11.1. [HSEC-2022-15]

CHANGES:

  • core: Bump Go version to 1.17.12.

... (truncated)

Commits
  • b4d0727 backport of commit 771470c28f099c2af5342c76d94716d45aa6887e (#23012)
  • f8da51c backport of commit 88ed074287d99da0e298589c5236fa094f770b08 (#23263)
  • 9e00b34 backport of commit ac9f411949b57669884157a6b6239cb586023175 (#23259)
  • 20af1eb backport of commit 036cbcebd9c5669edbb4519c68cc56f8b83f12d6 (#23258)
  • 99b916a backport of commit 8924f9592d9ff6013c11d5459c376a90908a3c4c (#23257)
  • 4e439e0 backport of commit 1d61aeb8aebc96eecbb6a35e10bd914b4d0f41f4 (#23249)
  • 565427a backport of commit 1e76ad42ef4221cb8a58e050d2edbfc552a878a0 (#23247)
  • 6fafd52 backport: Support mlock and custom tmpdir for containerized plugins (#23215) ...
  • d3927bc Backport UI: Add pagination to new PKI (#23238)
  • 5603003 backport of commit 68dd82c902ecf4487d9c17729527da9befb81a7f (#23246)
  • Additional commits viewable in compare view

Dependabot compatibility score

You can trigger a rebase of this PR by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Note
Automatic rebases have been disabled on this pull request as it has been open for over 30 days.

Bumps [github.com/hashicorp/vault/api](https://github.com/hashicorp/vault) from 1.9.2 to 1.15.0.
- [Release notes](https://github.com/hashicorp/vault/releases)
- [Changelog](https://github.com/hashicorp/vault/blob/main/CHANGELOG-pre-v1.10.md)
- [Commits](hashicorp/vault@v1.9.2...v1.15.0)

---
updated-dependencies:
- dependency-name: github.com/hashicorp/vault/api
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot requested a review from a team as a code owner September 16, 2024 00:11
@dependabot dependabot bot added dependencies Pull requests that update a dependency file go Pull requests that update Go code labels Sep 16, 2024
@marcofranssen marcofranssen merged commit 9a318ba into main Nov 1, 2024
6 of 10 checks passed
@marcofranssen marcofranssen deleted the dependabot/go_modules/github.com/hashicorp/vault/api-1.15.0 branch November 1, 2024 09:59
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file go Pull requests that update Go code
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant