Unpacking Software Livestream

Join our monthly Unpacking Software livestream to hear about the latest news, chat and opinion on packaging, software deployment and lifecycle management!

Learn More

Chocolatey Product Spotlight

Join the Chocolatey Team on our regular monthly stream where we put a spotlight on the most recent Chocolatey product releases. You'll have a chance to have your questions answered in a live Ask Me Anything format.

Learn More

Chocolatey Coding Livestream

Join us for the Chocolatey Coding Livestream, where members of our team dive into the heart of open source development by coding live on various Chocolatey projects. Tune in to witness real-time coding, ask questions, and gain insights into the world of package management. Don't miss this opportunity to engage with our team and contribute to the future of Chocolatey!

Learn More

Calling All Chocolatiers! Whipping Up Windows Automation with Chocolatey Central Management

Webinar from
Wednesday, 17 January 2024

We are delighted to announce the release of Chocolatey Central Management v0.12.0, featuring seamless Deployment Plan creation, time-saving duplications, insightful Group Details, an upgraded Dashboard, bug fixes, user interface polishing, and refined documentation. As an added bonus we'll have members of our Solutions Engineering team on-hand to dive into some interesting ways you can leverage the new features available!

Watch On-Demand
Chocolatey Community Coffee Break

Join the Chocolatey Team as we discuss all things Community, what we do, how you can get involved and answer your Chocolatey questions.

Watch The Replays
Chocolatey and Intune Overview

Webinar Replay from
Wednesday, 30 March 2022

At Chocolatey Software we strive for simple, and teaching others. Let us teach you just how simple it could be to keep your 3rd party applications updated across your devices, all with Intune!

Watch On-Demand
Chocolatey For Business. In Azure. In One Click.

Livestream from
Thursday, 9 June 2022

Join James and Josh to show you how you can get the Chocolatey For Business recommended infrastructure and workflow, created, in Azure, in around 20 minutes.

Watch On-Demand
The Future of Chocolatey CLI

Livestream from
Thursday, 04 August 2022

Join Paul and Gary to hear more about the plans for the Chocolatey CLI in the not so distant future. We'll talk about some cool new features, long term asks from Customers and Community and how you can get involved!

Watch On-Demand
Hacktoberfest Tuesdays 2022

Livestreams from
October 2022

For Hacktoberfest, Chocolatey ran a livestream every Tuesday! Re-watch Cory, James, Gary, and Rain as they share knowledge on how to contribute to open-source projects such as Chocolatey CLI.

Watch On-Demand

Downloads:

307,363

Downloads of v 1.20.0:

477

Last Update:

26 Jun 2025

Package Maintainer(s):

Software Author(s):

  • Mitchell Hashimoto
  • HashiCorp

Tags:

Vault

  • 1
  • 2
  • 3

1.20.0 | Updated: 26 Jun 2025

Downloads:

307,363

Downloads of v 1.20.0:

477

Maintainer(s):

Software Author(s):

  • Mitchell Hashimoto
  • HashiCorp

Vault 1.20.0

Legal Disclaimer: Neither this package nor Chocolatey Software, Inc. are affiliated with or endorsed by Mitchell Hashimoto, HashiCorp. The inclusion of Mitchell Hashimoto, HashiCorp trademark(s), if any, upon this webpage is solely to identify Mitchell Hashimoto, HashiCorp goods or services and not for commercial purposes.

  • 1
  • 2
  • 3

Some Checks Have Failed or Are Not Yet Complete

Not All Tests Have Passed


Validation Testing Passed


Verification Testing Passed

Details

Scan Testing Resulted in Flagged as a Note:

At least one file within this package has greater than 0 detections, but less than 5

Details
Learn More

Deployment Method: Individual Install, Upgrade, & Uninstall

To install Vault, run the following command from the command line or from PowerShell:

>

To upgrade Vault, run the following command from the command line or from PowerShell:

>

To uninstall Vault, run the following command from the command line or from PowerShell:

>

Deployment Method:

NOTE

This applies to both open source and commercial editions of Chocolatey.

1. Enter Your Internal Repository Url

(this should look similar to https://community.chocolatey.org/api/v2/)


2. Setup Your Environment

1. Ensure you are set for organizational deployment

Please see the organizational deployment guide

2. Get the package into your environment

  • Open Source or Commercial:
    • Proxy Repository - Create a proxy nuget repository on Nexus, Artifactory Pro, or a proxy Chocolatey repository on ProGet. Point your upstream to https://community.chocolatey.org/api/v2/. Packages cache on first access automatically. Make sure your choco clients are using your proxy repository as a source and NOT the default community repository. See source command for more information.
    • You can also just download the package and push it to a repository Download

3. Copy Your Script

choco upgrade vault -y --source="'INTERNAL REPO URL'" [other options]

See options you can pass to upgrade.

See best practices for scripting.

Add this to a PowerShell script or use a Batch script with tools and in places where you are calling directly to Chocolatey. If you are integrating, keep in mind enhanced exit codes.

If you do use a PowerShell script, use the following to ensure bad exit codes are shown as failures:


choco upgrade vault -y --source="'INTERNAL REPO URL'" 
$exitCode = $LASTEXITCODE

Write-Verbose "Exit code was $exitCode"
$validExitCodes = @(0, 1605, 1614, 1641, 3010)
if ($validExitCodes -contains $exitCode) {
  Exit 0
}

Exit $exitCode

- name: Install vault
  win_chocolatey:
    name: vault
    version: '1.20.0'
    source: INTERNAL REPO URL
    state: present

See docs at https://docs.ansible.com/ansible/latest/modules/win_chocolatey_module.html.


chocolatey_package 'vault' do
  action    :install
  source   'INTERNAL REPO URL'
  version  '1.20.0'
end

See docs at https://docs.chef.io/resource_chocolatey_package.html.


cChocoPackageInstaller vault
{
    Name     = "vault"
    Version  = "1.20.0"
    Source   = "INTERNAL REPO URL"
}

Requires cChoco DSC Resource. See docs at https://github.com/chocolatey/cChoco.


package { 'vault':
  ensure   => '1.20.0',
  provider => 'chocolatey',
  source   => 'INTERNAL REPO URL',
}

Requires Puppet Chocolatey Provider module. See docs at https://forge.puppet.com/puppetlabs/chocolatey.


4. If applicable - Chocolatey configuration/installation

See infrastructure management matrix for Chocolatey configuration elements and examples.

NOTE

Private CDN cached downloads available for licensed customers. Never experience 404 breakages again! Learn more...

Package Approved

This package was approved as a trusted package on 26 Jun 2025.

Description

Vault is a tool for securely accessing secrets. A secret is anything that you want to tightly control access to, such as API keys, passwords, certificates, and more. Vault provides a unified interface to any secret, while providing tight access control and recording a detailed audit log.

A modern system requires access to a multitude of secrets: database credentials, API keys for external services, credentials for service-oriented architecture communication, etc. Understanding who is accessing what secrets is already very difficult and platform-specific. Adding on key rolling, secure storage, and detailed audit logs is almost impossible without a custom solution. This is where Vault steps in.

The key features of Vault are:

  • Secure Secret Storage: Arbitrary key/value secrets can be stored in Vault. Vault encrypts these secrets prior to writing them to persistent storage, so gaining access to the raw storage isn't enough to access your secrets. Vault can write to disk, Consul, and more.
  • Dynamic Secrets: Vault can generate secrets on-demand for some systems, such as AWS or SQL databases. For example, when an application needs to access an S3 bucket, it asks Vault for credentials, and Vault will generate an AWS keypair with valid permissions on demand. After creating these dynamic secrets, Vault will also automatically revoke them after the lease is up.
  • Data Encryption: Vault can encrypt and decrypt data without storing it. This allows security teams to define encryption parameters and developers to store encrypted data in a location such as SQL without having to design their own encryption methods.
  • Leasing and Renewal: All secrets in Vault have a lease associated with it. At the end of the lease, Vault will automatically revoke that secret. Clients are able to renew leases via built-in renew APIs.
  • Revocation: Vault has built-in support for secret revocation. Vault can revoke not only single secrets, but a tree of secrets, for example all secrets read by a specific user, or all secrets of a particular type. Revocation assists in key rolling as well as locking down systems in the case of an intrusion.

For more information, see the introduction section of the Vault website.


tools\chocolateyInstall.ps1
$packageArgs = @{
  PackageName         = "vault"
  Url                 = "https://releases.hashicorp.com/vault/$($env:ChocolateyPackageVersion)/vault_$($env:ChocolateyPackageVersion)_windows_386.zip"
  UnzipLocation       = "$(Split-Path -parent $MyInvocation.MyCommand.Definition)"
  Url64               = "https://releases.hashicorp.com/vault/$($env:ChocolateyPackageVersion)/vault_$($env:ChocolateyPackageVersion)_windows_amd64.zip"
  Checksum            = '47bafd6fca4159d2c0e723f31e4dc0f29ee73344dd10230253497c35ef3e1400'
  ChecksumType        = 'sha256'
  Checksum64          = 'e3edfe135a6bdd0c14c4452326e0517f55a5eb9ece6499059c81f5f131206c85'
  version             = $env:ChocolateyPackageVersion
}

Install-ChocolateyZipPackage @packageArgs

Log in or click on link to see number of positives.

In cases where actual malware is found, the packages are subject to removal. Software sometimes has false positives. Moderators do not necessarily validate the safety of the underlying software, only that a package retrieves software from the official distribution point and/or validate embedded software against official distribution point (where distribution rights allow redistribution).

Chocolatey Pro provides runtime protection from possible malware.

Add to Builder Version Downloads Last Updated Status
Vault 1.19.5 4317 Friday, May 30, 2025 Approved
Vault 1.19.4 17 Saturday, May 17, 2025 Approved
Vault 1.19.3 5431 Thursday, May 1, 2025 Approved
Vault 1.19.2 2116 Saturday, April 19, 2025 Approved
Vault 1.19.1 2463 Saturday, April 5, 2025 Approved
Vault 1.19.0 4873 Thursday, March 6, 2025 Approved
Vault 1.18.5 2178 Tuesday, February 25, 2025 Approved
Vault 1.18.4 4790 Friday, January 31, 2025 Approved
Vault 1.18.3 5740 Thursday, December 19, 2024 Approved
Vault 1.18.2 4976 Friday, November 22, 2024 Approved
Vault 1.18.1 3664 Thursday, October 31, 2024 Approved
Vault 1.18.0 3988 Thursday, October 10, 2024 Approved
Vault 1.17.6 4682 Thursday, September 26, 2024 Approved
Vault 1.17.5 4639 Saturday, August 31, 2024 Approved
Vault 1.17.4 185 Friday, August 30, 2024 Approved
Vault 1.17.3 3596 Thursday, August 8, 2024 Approved
Vault 1.17.2 4730 Thursday, July 11, 2024 Approved
Vault 1.17.1 2061 Thursday, June 27, 2024 Approved
Vault 1.17.0 2294 Thursday, June 13, 2024 Approved
Vault 1.16.3 1934 Thursday, May 30, 2024 Approved
Vault 1.16.2 4596 Wednesday, April 24, 2024 Approved
Vault 1.16.1 2664 Friday, April 5, 2024 Approved
Vault 1.16.0 1465 Wednesday, March 27, 2024 Approved
Vault 1.15.6 4471 Friday, March 1, 2024 Approved
Vault 1.15.5 8076 Wednesday, January 31, 2024 Approved
Vault 1.15.4 21077 Wednesday, December 6, 2023 Approved
Vault 1.15.3 954 Friday, December 1, 2023 Approved
Vault 1.15.2 6079 Thursday, November 9, 2023 Approved
Vault 1.15.1 2999 Thursday, October 26, 2023 Approved
Vault 1.15.0 5368 Wednesday, September 27, 2023 Approved
Vault 1.14.3 2572 Thursday, September 14, 2023 Approved
Vault 1.14.2 2032 Wednesday, August 30, 2023 Approved
Vault 1.14.1 4184 Wednesday, July 26, 2023 Approved
Vault 1.14.0 4720 Wednesday, June 21, 2023 Approved
Vault 1.13.3 1631 Friday, June 9, 2023 Approved
Vault 1.13.2 13542 Thursday, April 27, 2023 Approved
Vault 1.13.1 4264 Thursday, March 30, 2023 Approved
Vault 1.13.0 1579 Tuesday, March 7, 2023 Approved
Vault 1.12.3 2164 Thursday, February 23, 2023 Approved
Vault 1.12.2 6069 Saturday, December 17, 2022 Approved
Vault 1.11.1 25321 Wednesday, July 27, 2022 Approved
Vault 1.11.0 2575 Tuesday, June 21, 2022 Approved
Vault 1.10.4 561 Friday, June 17, 2022 Approved
Vault 1.10.3 3415 Friday, May 13, 2022 Approved
Vault 1.10.2 90 Friday, May 13, 2022 Approved
Vault 1.10.1 1562 Monday, April 25, 2022 Approved
Vault 1.10.0 2351 Friday, March 25, 2022 Approved
Vault 1.9.4 1463 Wednesday, March 9, 2022 Approved
Vault 1.9.3 2401 Monday, January 31, 2022 Approved
Vault 1.9.2 1987 Wednesday, December 22, 2021 Approved
Vault 1.9.1 1132 Tuesday, December 14, 2021 Approved
Vault 1.9.0 1632 Tuesday, November 23, 2021 Approved
Vault 1.8.5 128 Tuesday, November 23, 2021 Approved
Vault 1.8.4 3210 Friday, October 8, 2021 Approved
Vault 1.8.3 717 Friday, October 1, 2021 Approved
Vault 1.8.2 776 Thursday, September 30, 2021 Approved
Vault 1.8.1 197 Thursday, September 30, 2021 Approved
Vault 1.8.0 3363 Thursday, July 29, 2021 Approved
Vault 1.7.3 2815 Thursday, June 17, 2021 Approved
Vault 1.7.2 2008 Friday, May 21, 2021 Approved
Vault 1.7.1 1592 Monday, April 26, 2021 Approved
Vault 1.7.0 1626 Tuesday, April 6, 2021 Approved
Vault 1.6.3 490 Thursday, March 25, 2021 Approved
Vault 1.6.2 4047 Monday, February 1, 2021 Approved
Vault 1.6.1 774 Thursday, January 21, 2021 Approved
Vault 1.5.5 6001 Friday, October 23, 2020 Approved
Vault 1.5.4 21936 Thursday, October 22, 2020 Approved
Vault 1.5.3 644 Thursday, October 22, 2020 Approved
Vault 1.5.2 2379 Wednesday, August 26, 2020 Approved
Vault 1.5.0 1708 Wednesday, July 22, 2020 Approved
Vault 1.4.3 938 Friday, July 3, 2020 Approved
Vault 1.4.1 1785 Monday, May 4, 2020 Approved
Vault 1.4.0 1429 Thursday, April 9, 2020 Approved
Vault 1.3.4 278 Wednesday, April 8, 2020 Approved
Vault 1.3.3 971 Monday, March 9, 2020 Approved
Vault 1.3.2 1538 Friday, January 24, 2020 Approved
Vault 1.3.1 1695 Friday, December 20, 2019 Approved
Vault 1.3.0 553 Wednesday, December 11, 2019 Approved
Vault 1.2.4 1064 Tuesday, November 12, 2019 Approved
Vault 1.2.3 3465 Monday, September 16, 2019 Approved
Vault 1.2.2 2409 Friday, August 16, 2019 Approved
Vault 1.2.1 215 Thursday, August 8, 2019 Approved
Vault 1.2.0 1003 Wednesday, July 31, 2019 Approved
Vault 1.1.1 5120 Tuesday, April 16, 2019 Approved
Vault 1.1.0 1087 Tuesday, March 19, 2019 Approved
Vault 1.0.3 754 Friday, March 1, 2019 Approved
Vault 0.10.0 3188 Monday, April 16, 2018 Approved
Vault 0.10.0-rc1 344 Saturday, April 7, 2018 Approved
Vault 0.9.6 545 Saturday, April 7, 2018 Approved
Vault 0.9.5 316 Saturday, April 7, 2018 Approved
Vault 0.9.4 409 Saturday, April 7, 2018 Approved
Vault 0.9.3 342 Saturday, April 7, 2018 Approved
Vault 0.9.2 341 Saturday, April 7, 2018 Approved
Vault 0.9.1 1049 Saturday, January 13, 2018 Approved
Vault 0.9.0 415 Saturday, January 13, 2018 Approved
Vault 0.8.3 1014 Wednesday, September 20, 2017 Approved
Vault 0.8.2 419 Wednesday, September 20, 2017 Approved
Vault 0.8.1 517 Thursday, August 24, 2017 Approved
Vault 0.8.0 504 Thursday, August 24, 2017 Approved
Vault 0.7.3 609 Thursday, June 8, 2017 Approved
Vault 0.7.2 475 Wednesday, June 7, 2017 Approved
Vault 0.7.1 440 Wednesday, June 7, 2017 Approved
Vault 0.7.0 455 Wednesday, June 7, 2017 Approved
Vault 0.6.5 988 Wednesday, February 8, 2017 Approved
Vault 0.6.4 597 Thursday, December 22, 2016 Approved
Vault 0.6.3 450 Wednesday, December 14, 2016 Approved
Vault 0.6.2 535 Tuesday, October 25, 2016 Approved
Vault 0.6.1 528 Tuesday, August 30, 2016 Approved

1.20.0

June 25, 2025

SECURITY:

  • core: require a nonce when cancelling a rekey operation that was initiated within the last 10 minutes. [GH-30794]

CHANGES:

  • UI: remove outdated and unneeded js string extensions [GH-29834]
  • activity (enterprise): The sys/internal/counters/activity endpoint will return actual values for new clients in the current month.
  • activity (enterprise): provided values for start_time and end_time in sys/internal/counters/activity are aligned to the corresponding billing period.
  • activity: provided value for end_time in sys/internal/counters/activity is now capped at the end of the last completed month. [GH-30164]
  • api: Update the default API client to check for the Retry-After header and, if it exists, wait for the specified duration before retrying the request. [GH-30887]
  • auth/alicloud: Update plugin to v0.21.0 [GH-30810]
  • auth/azure: Update plugin to v0.20.2. Login requires resource_group_name, vm_name, and vmss_name to match token claims [GH-30052]
  • auth/azure: Update plugin to v0.20.3 [GH-30082]
  • auth/azure: Update plugin to v0.20.4 [GH-30543]
  • auth/azure: Update plugin to v0.21.0 [GH-30872]
  • auth/azure: Update plugin to v0.21.1 [GH-31010]
  • auth/cf: Update plugin to v0.20.1 [GH-30583]
  • auth/cf: Update plugin to v0.21.0 [GH-30842]
  • auth/gcp: Update plugin to v0.20.2 [GH-30081]
  • auth/jwt: Update plugin to v0.23.2 [GH-30431]
  • auth/jwt: Update plugin to v0.24.1 [GH-30876]
  • auth/kerberos: Update plugin to v0.15.0 [GH-30845]
  • auth/kubernetes: Update plugin to v0.22.1 [GH-30910]
  • auth/oci: Update plugin to v0.19.0 [GH-30841]
  • auth/saml: Update plugin to v0.6.0
  • core: Bump Go version to 1.24.4.
  • core: Verify that the client IP address extracted from an X-Forwarded-For header is a valid IPv4 or IPv6 address [GH-29774]
  • database/couchbase: Update plugin to v0.14.0 [GH-30836]
  • database/elasticsearch: Update plugin to v0.18.0 [GH-30796]
  • database/mongodbatlas: Update plugin to v0.15.0 [GH-30856]
  • database/redis-elasticache: Update plugin to v0.7.0 [GH-30785]
  • database/redis: Update plugin to v0.6.0 [GH-30797]
  • database/snowflake: Update plugin to v0.14.0 [GH-30748]
  • database/snowflake: Update plugin to v0.14.1 [GH-30868]
  • logical/system: add ent stub for plugin catalog handling [GH-30890]
  • quotas/rate-limit: Round up the Retry-After value to the nearest second when calculating the retry delay. [GH-30887]
  • secrets/ad: Update plugin to v0.21.0 [GH-30819]
  • secrets/alicloud: Update plugin to v0.20.0 [GH-30809]
  • secrets/azure: Update plugin to v0.21.2 [GH-30037]
  • secrets/azure: Update plugin to v0.21.3 [GH-30083]
  • secrets/azure: Update plugin to v0.22.0 [GH-30832]
  • secrets/gcp: Update plugin to v0.21.2 [GH-29970]
  • secrets/gcp: Update plugin to v0.21.3 [GH-30080]
  • secrets/gcp: Update plugin to v0.22.0 [GH-30846]
  • secrets/gcpkms: Update plugin to v0.21.0 [GH-30835]
  • secrets/kubernetes: Update plugin to v0.11.0 [GH-30855]
  • secrets/kv: Update plugin to v0.24.0 [GH-30826]
  • secrets/mongodbatlas: Update plugin to v0.15.0 [GH-30860]
  • secrets/openldap: Update plugin to v0.15.2 [GH-30079]
  • secrets/openldap: Update plugin to v0.15.4 [GH-30279]
  • secrets/openldap: Update plugin to v0.16.0 [GH-30844]
  • secrets/terraform: Update plugin to v0.12.0 [GH-30905]
  • server: disable_mlock configuration option is now required for integrated storage and no longer has a default. If you are using the default value with integrated storage, you must now explicitly set disable_mlock to true or false or Vault server will fail to start. [GH-29974]
  • ui/activity: Replaces mount and namespace attribution charts with a table to allow sorting
    client count data by namespace, mount_path, mount_type or number of clients for
    a selected month. [GH-30678]
  • ui: Client count side nav link 'Vault Usage Metrics' renamed to 'Client Usage' [GH-30765]
  • ui: Client counting "running total" charts now reflect new clients only [GH-30506]
  • ui: Removed FormError component (not used) [GH-34699]
  • ui: Selecting a different method in the login form no longer updates the /vault/auth?with= query parameter [GH-30500]
  • ui: /vault/auth?with= query parameter now exclusively refers to the auth mount path and renders a simplified form [GH-30500]

FEATURES:

  • Auto Irrevocable Lease Removal (Enterprise): Add the Vault Enterprise configuration param, remove_irrevocable_lease_after. When set to a non-zero value, this will automatically delete irrevocable leases after the configured duration exceeds the lease's expire time. The minimum duration allowed for this field is two days. [GH-30703]
  • Development Cluster Configuration (Enterprise): Added development_cluster as a field to Vault's utilization reports.
    The field is configurable via HCL and indicates whether the cluster is being used in a development environment, defaults to false if not set. [GH-30659]
  • Entity-based and collective rate limit quotas (Enterprise): Add new group_by field to the rate limit quota API to support different grouping modes.
  • Login form customization (Enterprise): Adds support to choose a default and/or backup auth methods for the web UI login form to streamline the web UI login experience. [GH-30700]
  • Plugin Downloads: Support automatically downloading official HashiCorp secret and auth plugins from releases.hashicorp.com (beta)
  • SSH Key Signing Improvements (Enterprise): Add support for using managed keys to sign SSH keys in the SSH secrets engine.
  • Secret Recovery from Snapshot (Enterprise): Adds a framework to load an integrated storage
    snapshot into Vault and read, list, and recover KV v1 and cubbyhole secrets from the snapshot. [GH-30739]
  • UI Secrets Engines: TOTP secrets engine is now supported. [GH-29751]
  • UI Telemetry: Add Posthog for UI telemetry tracking on Vault Dedicated managed clusters [GH-30425]
  • Vault Namespace Picker: Updating the Vault Namespace Picker to enable search functionality, allow direct navigation to nested namespaces and improve accessibility. [GH-30490]
  • Vault PKI SCEP Server (Enterprise): Support for the Simple Certificate Enrollment Protocol (SCEP) has been added to the Vault PKI Plugin. This allows standard SCEP clients to request certificates from a Vault server with no knowledge of Vault APIs.

IMPROVEMENTS:

  • activity (enterprise): Added vault.client.billing_period.activity telemetry metric to emit information about the total number of distinct clients used in the current billing period.
  • activity: mount_type was added to the API response of sys/internal/counters/activity [GH-30071]
  • activity: mount_type was added to the API response of sys/internal/counters/activity
  • api (enterprise): Added a new API, /sys/utilization-report, giving a snapshot overview of Vault's utilization at a high level.
  • api/client: Add Cert auth method support. This allows the client to authenticate using a client certificate. [GH-29546]
  • core (enterprise): Updated code and documentation to support FIPS 140-3 compliant algorithms.
  • core (enterprise): allow a root token to relock a namespace locked by the Namespace API Lock feature.
  • core (enterprise): report errors from the underlying seal when getting entropy.
  • core (enterprise): update to FIPS 140-3 cryptographic module in the FIPS builds.
  • core/metrics: added a new telemetry metric, vault.core.response_status_code, with two labels, code, and type, detailing the status codes of all responses to requests that Vault handles. [GH-30354]
  • core: Improve memory use of path management for namespaces, auth methods, and secrets engines. Now Vault should handle larger numbers of namespaces and multiple instances of the same secrets engine or auth method more efficiently. [GH-31022]
  • core: Updated code and documentation to support FIPS 140-3 compliant algorithms. [GH-30576]
  • core: support for X25519MLKEM768 (post quantum key agreement) in the Go TLS stack. [GH-30603]
  • events: Add vault_index to an event's metadata if the metadata contains modified=true, to support client consistency controls when reading from Vault in response to an event where storage was modified. [GH-30725]
  • physical/postgres: Adds support to authenticate with the PostgreSQL Backend server with cloud based identities (AWS IAM, Azure MSI and GCP IAM) [GH-30681]
  • plugins: Support registration of CE plugins with extracted artifact directory. [GH-30673]
  • secrets/aws: Add LIST endpoint to the AWS secrets engine static roles. [GH-29842]
  • secrets/pki: Add Delta (Freshest) CRL support to AIA information (both mount-level and issuer configured) [GH-30319]
  • secrets/transit (enterprise): enable the use of 192-bit keys for AES CMAC
  • storage/mysql: Added support for getting mysql backend username and password from the environment variables VAULT_MYSQL_USERNAME and VAULT_MYSQL_PASSWORD. [GH-30136]
  • storage/raft: Upgrade hashicorp/raft library to v1.7.3 which includes additional logging on the leader when opening and sending a snapshot to a follower. [GH-29976]
  • transit: Exclude the partial wrapping key path from the transit/keys LIST operation. [GH-30728]
  • ui (enterprise): Replace date selector in client count usage page with fixed start and end dates that align with billing periods in order to return more relevant client counting data. [GH-30349]
  • ui/database: Adding input field for setting skip static role password rotation for database connection config, updating static role skip field to use toggle button [GH-29820]
  • ui/database: Adding password input field for creating a static role [GH-30275]
  • ui/database: Adding warning modal pop up when creating a static role that will be rotated immediately [GH-30119]
  • ui/database: Glimmerizing and adding validations to role create [GH-29754]
  • ui/database: Updating toggle buttons for skip_rotation_import to reverse polarity of values that get displayed versus whats sent to api [GH-30055]
  • ui: Add 'Refresh list' button to the namespace list page. [GH-30692]
  • ui: Enable search for a namespace on the namespace list page. [GH-30680]
  • ui: Hide "Other" tab when mounts are configured with listing_visibility="unauth"; all methods can be accessed via the "Sign in with other methods" link [GH-30500]
  • ui: Improve accessibility of login form to meet a11y standards [GH-30500]
  • ui: Replaces all instances of the deprecated event.keyCode with event.key [GH-30493]
  • ui: Update date selector in client count usage page to disable current month selection for Vault clusters without a license. [GH-30488]
  • ui: Use Hds::CodeBlock component to replace readonly JsonEditor instances [GH-29720]
  • ui: adds key value pair string inputs as optional form for wrap tool [GH-29677]
  • ui: remove ember-svg-jar dependency [GH-30181]

DEPRECATIONS:

  • api: Deprecated the /sys/internal/counters/tokens endpoint. Attempting to call this endpoint will return a 403 "unsupported path" exception. [GH-30561]
  • core: deprecate duplicate attributes in HCL configuration files and policy definitions [GH-30386]

BUG FIXES:

  • api/tokenhelper: Exec token_helper without a shell [GH-29653]
  • auth/aws: fix a panic when a performance standby node attempts to write/update config. [GH-30039]
  • auth/ldap: Fix a bug that does not properly delete users and groups by first converting their names to lowercase when case senstivity option is off. [GH-29922]
  • auth/ldap: fix a panic when a performance standby node attempts to write/update config. [GH-30039]
  • aws/secrets: Prevent vault from rejecting secret role configurations where no regions or endpoints are set [GH-29996]
  • core (enterprise): add nil check before attempting to use Rotation Manager operations.
  • core (enterprise): fix a bug where plugin automated root rotations would stop after seal/unseal operations
  • core (enterprise): fix issue with errors being swallowed on failed HSM logins.
    core/managed-keys (enterprise): fix RSA encryption/decryption with OAEP on managed keys.
  • core: Fix a bug that prevents certain loggers from writing to a log file. [GH-29917]
  • core: Fix string contains check in Identity APIs to be case-insensitive. [GH-31045]
  • core: Omit automatic version control information of the main module from compiled Vault binaries [GH-30926]
  • database: Prevent static roles created in versions prior to 1.15.0 from rotating on backend restart. [GH-30320]
  • database: no longer incorrectly add an "unrecognized parameters" warning for certain SQL database secrets config operations when another warning is returned [GH-30327]
  • identity: Fix non-deterministic merge behavior when two entities have
    conflicting local aliases. [GH-30390]
  • identity: reintroduce RPC functionality for group creates, allowing performance standbys to handle external group changes during login and token renewal [GH-30069]
  • plugins (enterprise): Fix an issue where Enterprise plugins can't run on a standby node
    when it becomes active because standby nodes don't extract the artifact when the plugin
    is registered. Remove extracting from Vault and require the operator to place
    the extracted artifact in the plugin directory before registration.
  • plugins (enterprise): Fix plugin registration with artifact when a binary for the same plugin is already present in the plugin directory.
  • plugins: plugin registration should honor the plugin_tmpdir config [GH-29978]
  • plugins: plugin registration should honor the plugin_tmpdir config
  • raft/retry_join: Fix decoding auto_join configurations that include escape characters [GH-29874]
  • secrets/aws: fix a bug where environment and shared credential providers were overriding the WIF configuration [GH-29982]
  • secrets/aws: fix a case where GovCloud wasn't taken into account; fix a case where the region setting wasn't respected [GH-30312]
  • secrets/aws: fix a panic when a performance standby node attempts to write/update config. [GH-30039]
  • secrets/database: Fix a bug where a global database plugin reload exits if any of the database connections are not available [GH-29519]
  • secrets/database: Treat all rotation_schedule values as UTC to ensure consistent behavior. [GH-30606]
  • secrets/db: fix a panic when a performance standby node attempts to write/update config. [GH-30039]
  • secrets/openldap: Prevent static role rotation on upgrade when NextVaultRotation is nil.
    Fixes an issue where static roles were unexpectedly rotated after upgrade due to a missing NextVaultRotation value.
    Now sets it to either LastVaultRotation + RotationPeriod or now + RotationPeriod. [GH-30265]
  • secrets/pki (enterprise): Address a parsing bug that rejected CMPv2 requests containing a validity field.
  • secrets/pki: Fix a bug that prevents enabling automatic tidying of the CMPv2 nonce store. [GH-29852]
  • secrets/pki: fix a bug where key_usage was ignored when generating root certificates, and signing certain
    intermediate certificates. [GH-30034]
  • secrets/transit (enterprise): ensure verify endpoint always returns valid field in batch_results with CMAC
  • secrets/transit (enterprise): fixed encryption/decryption with RSA against PKCS#11 managed keys
  • secrets/transit: ensure verify endpoint always returns valid field in batch_results with HMAC [GH-30852]
  • secrets/transit: fix a panic when rotating on a managed key returns an error [GH-30214]
  • ui/database: Added input field for setting 'skip_import_rotation' when creating a static role [GH-29633]
  • ui/kmip: Fixes KMIP credentials view and displays private_key after generating [GH-30778]
  • ui: Automatically refresh namespace list inside the namespace picker after creating or deleting a namespace in the UI. [GH-30737]
  • ui: Fix broken link to Hashicorp Vault developer site in the Web REPL help. [GH-30670]
  • ui: Fix initial setting of form toggle inputs for parameters nested within the config block [GH-30960]
  • ui: Fix refresh namespace list after deleting a namespace. [GH-30680]
  • ui: MFA methods now display the namespace path instead of the namespace id. [GH-29588]
  • ui: Redirect users authenticating with Vault as an OIDC provider to log in again when token expires. [GH-30838]

This package has no dependencies.

Discussion for the Vault Package

Ground Rules:

  • This discussion is only about Vault and the Vault package. If you have feedback for Chocolatey, please contact the Google Group.
  • This discussion will carry over multiple versions. If you have a comment about a particular version, please note that in your comments.
  • The maintainers of this Chocolatey Package will be notified about new comments that are posted to this Disqus thread, however, it is NOT a guarantee that you will get a response. If you do not hear back from the maintainers after posting a message below, please follow up by using the link on the left side of this page or follow this link to contact maintainers. If you still hear nothing back, please follow the package triage process.
  • Tell us what you love about the package or Vault, or tell us what needs improvement.
  • Share your experiences with the package, or extra configuration or gotchas that you've found.
  • If you use a url, the comment will be flagged for moderation until you've been whitelisted. Disqus moderated comments are approved on a weekly schedule if not sooner. It could take between 1-5 days for your comment to show up.
comments powered by Disqus