Downloads:
264,688
Downloads of v 1.17.0:
2,274
Last Update:
13 Jun 2024
Package Maintainer(s):
Software Author(s):
- Mitchell Hashimoto
- HashiCorp
Tags:
vault hashicorp- Software Specific:
- Software Site
- Software Source
- Software License
- Software Docs
- Software Issues
- Package Specific:
- Package Source
- Package outdated?
- Package broken?
- Contact Maintainers
- Contact Site Admins
- Software Vendor?
- Report Abuse
- Download
Vault
This is not the latest version of Vault available.
- 1
- 2
- 3
1.17.0 | Updated: 13 Jun 2024
- Software Specific:
- Software Site
- Software Source
- Software License
- Software Docs
- Software Issues
- Package Specific:
- Package Source
- Package outdated?
- Package broken?
- Contact Maintainers
- Contact Site Admins
- Software Vendor?
- Report Abuse
- Download
Downloads:
264,688
Downloads of v 1.17.0:
2,274
Maintainer(s):
Software Author(s):
- Mitchell Hashimoto
- HashiCorp
Vault 1.17.0
This is not the latest version of Vault available.
Legal Disclaimer: Neither this package nor Chocolatey Software, Inc. are affiliated with or endorsed by Mitchell Hashimoto, HashiCorp. The inclusion of Mitchell Hashimoto, HashiCorp trademark(s), if any, upon this webpage is solely to identify Mitchell Hashimoto, HashiCorp goods or services and not for commercial purposes.
- 1
- 2
- 3
All Checks are Passing
3 Passing Tests
Deployment Method: Individual Install, Upgrade, & Uninstall
To install Vault, run the following command from the command line or from PowerShell:
To upgrade Vault, run the following command from the command line or from PowerShell:
To uninstall Vault, run the following command from the command line or from PowerShell:
Deployment Method:
This applies to both open source and commercial editions of Chocolatey.
1. Enter Your Internal Repository Url
(this should look similar to https://community.chocolatey.org/api/v2/)
2. Setup Your Environment
1. Ensure you are set for organizational deployment
Please see the organizational deployment guide
2. Get the package into your environment
Option 1: Cached Package (Unreliable, Requires Internet - Same As Community)-
Open Source or Commercial:
- Proxy Repository - Create a proxy nuget repository on Nexus, Artifactory Pro, or a proxy Chocolatey repository on ProGet. Point your upstream to https://community.chocolatey.org/api/v2/. Packages cache on first access automatically. Make sure your choco clients are using your proxy repository as a source and NOT the default community repository. See source command for more information.
- You can also just download the package and push it to a repository Download
-
Open Source
-
Download the package:
Download - Follow manual internalization instructions
-
-
Package Internalizer (C4B)
-
Run: (additional options)
choco download vault --internalize --version=1.17.0 --source=https://community.chocolatey.org/api/v2/
-
For package and dependencies run:
choco push --source="'INTERNAL REPO URL'"
- Automate package internalization
-
Run: (additional options)
3. Copy Your Script
choco upgrade vault -y --source="'INTERNAL REPO URL'" --version="'1.17.0'" [other options]
See options you can pass to upgrade.
See best practices for scripting.
Add this to a PowerShell script or use a Batch script with tools and in places where you are calling directly to Chocolatey. If you are integrating, keep in mind enhanced exit codes.
If you do use a PowerShell script, use the following to ensure bad exit codes are shown as failures:
choco upgrade vault -y --source="'INTERNAL REPO URL'" --version="'1.17.0'"
$exitCode = $LASTEXITCODE
Write-Verbose "Exit code was $exitCode"
$validExitCodes = @(0, 1605, 1614, 1641, 3010)
if ($validExitCodes -contains $exitCode) {
Exit 0
}
Exit $exitCode
- name: Install vault
win_chocolatey:
name: vault
version: '1.17.0'
source: INTERNAL REPO URL
state: present
See docs at https://docs.ansible.com/ansible/latest/modules/win_chocolatey_module.html.
chocolatey_package 'vault' do
action :install
source 'INTERNAL REPO URL'
version '1.17.0'
end
See docs at https://docs.chef.io/resource_chocolatey_package.html.
cChocoPackageInstaller vault
{
Name = "vault"
Version = "1.17.0"
Source = "INTERNAL REPO URL"
}
Requires cChoco DSC Resource. See docs at https://github.com/chocolatey/cChoco.
package { 'vault':
ensure => '1.17.0',
provider => 'chocolatey',
source => 'INTERNAL REPO URL',
}
Requires Puppet Chocolatey Provider module. See docs at https://forge.puppet.com/puppetlabs/chocolatey.
4. If applicable - Chocolatey configuration/installation
See infrastructure management matrix for Chocolatey configuration elements and examples.
Private CDN cached downloads available for licensed customers. Never experience 404 breakages again! Learn more...
This package was approved as a trusted package on 13 Jun 2024.
Vault is a tool for securely accessing secrets. A secret is anything that you want to tightly control access to, such as API keys, passwords, certificates, and more. Vault provides a unified interface to any secret, while providing tight access control and recording a detailed audit log.
A modern system requires access to a multitude of secrets: database credentials, API keys for external services, credentials for service-oriented architecture communication, etc. Understanding who is accessing what secrets is already very difficult and platform-specific. Adding on key rolling, secure storage, and detailed audit logs is almost impossible without a custom solution. This is where Vault steps in.
The key features of Vault are:
- Secure Secret Storage: Arbitrary key/value secrets can be stored in Vault. Vault encrypts these secrets prior to writing them to persistent storage, so gaining access to the raw storage isn't enough to access your secrets. Vault can write to disk, Consul, and more.
- Dynamic Secrets: Vault can generate secrets on-demand for some systems, such as AWS or SQL databases. For example, when an application needs to access an S3 bucket, it asks Vault for credentials, and Vault will generate an AWS keypair with valid permissions on demand. After creating these dynamic secrets, Vault will also automatically revoke them after the lease is up.
- Data Encryption: Vault can encrypt and decrypt data without storing it. This allows security teams to define encryption parameters and developers to store encrypted data in a location such as SQL without having to design their own encryption methods.
- Leasing and Renewal: All secrets in Vault have a lease associated with it. At the end of the lease, Vault will automatically revoke that secret. Clients are able to renew leases via built-in renew APIs.
- Revocation: Vault has built-in support for secret revocation. Vault can revoke not only single secrets, but a tree of secrets, for example all secrets read by a specific user, or all secrets of a particular type. Revocation assists in key rolling as well as locking down systems in the case of an intrusion.
For more information, see the introduction section of the Vault website.
Log in or click on link to see number of positives.
- vault.1.17.0.nupkg (451cc58e48a2) - ## / 68
- vault_1.17.0_windows_amd64.zip (ba01bebbda08) - ## / 63
- vault_1.17.0_windows_386.zip (113123fb4623) - ## / 61
In cases where actual malware is found, the packages are subject to removal. Software sometimes has false positives. Moderators do not necessarily validate the safety of the underlying software, only that a package retrieves software from the official distribution point and/or validate embedded software against official distribution point (where distribution rights allow redistribution).
Chocolatey Pro provides runtime protection from possible malware.
Add to Builder | Version | Downloads | Last Updated | Status |
---|---|---|---|---|
Vault 1.18.1 | 3492 | Thursday, October 31, 2024 | Approved | |
Vault 1.18.0 | 3961 | Thursday, October 10, 2024 | Approved | |
Vault 1.17.6 | 3200 | Thursday, September 26, 2024 | Approved | |
Vault 1.17.5 | 4245 | Saturday, August 31, 2024 | Approved | |
Vault 1.17.4 | 165 | Friday, August 30, 2024 | Approved | |
Vault 1.17.3 | 3579 | Thursday, August 8, 2024 | Approved | |
Vault 1.17.2 | 4708 | Thursday, July 11, 2024 | Approved | |
Vault 1.17.1 | 2036 | Thursday, June 27, 2024 | Approved | |
Vault 1.17.0 | 2274 | Thursday, June 13, 2024 | Approved | |
Vault 1.16.3 | 1916 | Thursday, May 30, 2024 | Approved | |
Vault 1.16.2 | 4573 | Wednesday, April 24, 2024 | Approved | |
Vault 1.16.1 | 2620 | Friday, April 5, 2024 | Approved | |
Vault 1.16.0 | 1434 | Wednesday, March 27, 2024 | Approved | |
Vault 1.15.6 | 4457 | Friday, March 1, 2024 | Approved | |
Vault 1.15.5 | 8052 | Wednesday, January 31, 2024 | Approved | |
Vault 1.15.4 | 21061 | Wednesday, December 6, 2023 | Approved | |
Vault 1.15.3 | 927 | Friday, December 1, 2023 | Approved | |
Vault 1.15.2 | 6057 | Thursday, November 9, 2023 | Approved | |
Vault 1.15.1 | 2982 | Thursday, October 26, 2023 | Approved | |
Vault 1.15.0 | 5348 | Wednesday, September 27, 2023 | Approved | |
Vault 1.14.3 | 2328 | Thursday, September 14, 2023 | Approved | |
Vault 1.14.2 | 1992 | Wednesday, August 30, 2023 | Approved | |
Vault 1.14.1 | 4160 | Wednesday, July 26, 2023 | Approved | |
Vault 1.14.0 | 4690 | Wednesday, June 21, 2023 | Approved | |
Vault 1.13.3 | 1608 | Friday, June 9, 2023 | Approved | |
Vault 1.13.2 | 13509 | Thursday, April 27, 2023 | Approved | |
Vault 1.13.1 | 4252 | Thursday, March 30, 2023 | Approved | |
Vault 1.13.0 | 1554 | Tuesday, March 7, 2023 | Approved | |
Vault 1.12.3 | 2146 | Thursday, February 23, 2023 | Approved | |
Vault 1.12.2 | 6007 | Saturday, December 17, 2022 | Approved | |
Vault 1.11.1 | 25105 | Wednesday, July 27, 2022 | Approved | |
Vault 1.11.0 | 2559 | Tuesday, June 21, 2022 | Approved | |
Vault 1.10.4 | 536 | Friday, June 17, 2022 | Approved | |
Vault 1.10.3 | 3373 | Friday, May 13, 2022 | Approved | |
Vault 1.10.2 | 64 | Friday, May 13, 2022 | Approved | |
Vault 1.10.1 | 1542 | Monday, April 25, 2022 | Approved | |
Vault 1.10.0 | 2334 | Friday, March 25, 2022 | Approved | |
Vault 1.9.4 | 1435 | Wednesday, March 9, 2022 | Approved | |
Vault 1.9.3 | 2362 | Monday, January 31, 2022 | Approved | |
Vault 1.9.2 | 1965 | Wednesday, December 22, 2021 | Approved | |
Vault 1.9.1 | 1105 | Tuesday, December 14, 2021 | Approved | |
Vault 1.9.0 | 1610 | Tuesday, November 23, 2021 | Approved | |
Vault 1.8.5 | 102 | Tuesday, November 23, 2021 | Approved | |
Vault 1.8.4 | 3139 | Friday, October 8, 2021 | Approved | |
Vault 1.8.3 | 691 | Friday, October 1, 2021 | Approved | |
Vault 1.8.2 | 718 | Thursday, September 30, 2021 | Approved | |
Vault 1.8.1 | 172 | Thursday, September 30, 2021 | Approved | |
Vault 1.8.0 | 3330 | Thursday, July 29, 2021 | Approved | |
Vault 1.7.3 | 2711 | Thursday, June 17, 2021 | Approved | |
Vault 1.7.2 | 1975 | Friday, May 21, 2021 | Approved | |
Vault 1.7.1 | 1561 | Monday, April 26, 2021 | Approved | |
Vault 1.7.0 | 1596 | Tuesday, April 6, 2021 | Approved | |
Vault 1.6.3 | 467 | Thursday, March 25, 2021 | Approved | |
Vault 1.6.2 | 4024 | Monday, February 1, 2021 | Approved | |
Vault 1.6.1 | 744 | Thursday, January 21, 2021 | Approved | |
Vault 1.5.5 | 5745 | Friday, October 23, 2020 | Approved | |
Vault 1.5.4 | 21900 | Thursday, October 22, 2020 | Approved | |
Vault 1.5.3 | 620 | Thursday, October 22, 2020 | Approved | |
Vault 1.5.2 | 2353 | Wednesday, August 26, 2020 | Approved | |
Vault 1.5.0 | 1689 | Wednesday, July 22, 2020 | Approved | |
Vault 1.4.3 | 912 | Friday, July 3, 2020 | Approved | |
Vault 1.4.1 | 1768 | Monday, May 4, 2020 | Approved | |
Vault 1.4.0 | 1410 | Thursday, April 9, 2020 | Approved | |
Vault 1.3.4 | 254 | Wednesday, April 8, 2020 | Approved | |
Vault 1.3.3 | 947 | Monday, March 9, 2020 | Approved | |
Vault 1.3.2 | 1514 | Friday, January 24, 2020 | Approved | |
Vault 1.3.1 | 1671 | Friday, December 20, 2019 | Approved | |
Vault 1.3.0 | 529 | Wednesday, December 11, 2019 | Approved | |
Vault 1.2.4 | 1048 | Tuesday, November 12, 2019 | Approved | |
Vault 1.2.3 | 3436 | Monday, September 16, 2019 | Approved | |
Vault 1.2.2 | 2379 | Friday, August 16, 2019 | Approved | |
Vault 1.2.1 | 197 | Thursday, August 8, 2019 | Approved | |
Vault 1.2.0 | 980 | Wednesday, July 31, 2019 | Approved | |
Vault 1.1.1 | 5094 | Tuesday, April 16, 2019 | Approved | |
Vault 1.1.0 | 1057 | Tuesday, March 19, 2019 | Approved | |
Vault 1.0.3 | 730 | Friday, March 1, 2019 | Approved | |
Vault 0.10.0 | 3156 | Monday, April 16, 2018 | Approved | |
Vault 0.10.0-rc1 | 325 | Saturday, April 7, 2018 | Approved | |
Vault 0.9.6 | 513 | Saturday, April 7, 2018 | Approved | |
Vault 0.9.5 | 296 | Saturday, April 7, 2018 | Approved | |
Vault 0.9.4 | 378 | Saturday, April 7, 2018 | Approved | |
Vault 0.9.3 | 319 | Saturday, April 7, 2018 | Approved | |
Vault 0.9.2 | 317 | Saturday, April 7, 2018 | Approved | |
Vault 0.9.1 | 1026 | Saturday, January 13, 2018 | Approved | |
Vault 0.9.0 | 391 | Saturday, January 13, 2018 | Approved | |
Vault 0.8.3 | 985 | Wednesday, September 20, 2017 | Approved | |
Vault 0.8.2 | 398 | Wednesday, September 20, 2017 | Approved | |
Vault 0.8.1 | 474 | Thursday, August 24, 2017 | Approved | |
Vault 0.8.0 | 469 | Thursday, August 24, 2017 | Approved | |
Vault 0.7.3 | 590 | Thursday, June 8, 2017 | Approved | |
Vault 0.7.2 | 449 | Wednesday, June 7, 2017 | Approved | |
Vault 0.7.1 | 408 | Wednesday, June 7, 2017 | Approved | |
Vault 0.7.0 | 429 | Wednesday, June 7, 2017 | Approved | |
Vault 0.6.5 | 955 | Wednesday, February 8, 2017 | Approved | |
Vault 0.6.4 | 567 | Thursday, December 22, 2016 | Approved | |
Vault 0.6.3 | 429 | Wednesday, December 14, 2016 | Approved | |
Vault 0.6.2 | 505 | Tuesday, October 25, 2016 | Approved | |
Vault 0.6.1 | 503 | Tuesday, August 30, 2016 | Approved |
HashiCorp 2015-2022
1.17.0
June 12, 2024
CHANGES:
- api: Upgrade from github.com/go-jose/go-jose/v3 v3.0.3 to github.com/go-jose/go-jose/v4 v4.0.1. [GH-26527]
- audit: breaking change - Vault now allows audit logs to contain 'correlation-id' and 'x-correlation-id' headers when they
are present in the incoming request. By default they are not HMAC'ed (but can be configured to HMAC by Vault Operators). [GH-26777] - auth/alicloud: Update plugin to v0.18.0 [GH-27133]
- auth/azure: Update plugin to v0.18.0 [GH-27146]
- auth/centrify: Remove the deprecated Centrify auth method plugin [GH-27130]
- auth/cf: Update plugin to v0.17.0 [GH-27161]
- auth/gcp: Update plugin to v0.18.0 [GH-27140]
- auth/jwt: Update plugin to v0.20.2 [GH-26291]
- auth/jwt: Update plugin to v0.20.3 [GH-26890]
- auth/kerberos: Update plugin to v0.12.0 [GH-27177]
- auth/kubernetes: Update plugin to v0.19.0 [GH-27186]
- auth/oci: Update plugin to v0.16.0 [GH-27142]
- core (enterprise): Seal High Availability (HA) must be enabled by
enable_multiseal
in configuration. - core/identity: improve performance for secondary nodes receiving identity related updates through replication [GH-27184]
- core: Bump Go version to 1.22.4
- core: return an additional "invalid token" error message in 403 response when the provided request token is expired,
exceeded the number of uses, or is a bogus value [GH-25953] - database/couchbase: Update plugin to v0.11.0 [GH-27145]
- database/elasticsearch: Update plugin to v0.15.0 [GH-27136]
- database/mongodbatlas: Update plugin to v0.12.0 [GH-27143]
- database/redis-elasticache: Update plugin to v0.4.0 [GH-27139]
- database/redis: Update plugin to v0.3.0 [GH-27117]
- database/snowflake: Update plugin to v0.11.0 [GH-27132]
- sdk: String templates now have a maximum size of 100,000 characters. [GH-26110]
- secrets/ad: Update plugin to v0.18.0 [GH-27172]
- secrets/alicloud: Update plugin to v0.17.0 [GH-27134]
- secrets/azure: Update plugin to v0.17.1 [GH-26528]
- secrets/azure: Update plugin to v0.19.0 [GH-27141]
- secrets/gcp: Update plugin to v0.19.0 [GH-27164]
- secrets/gcpkms: Update plugin to v0.17.0 [GH-27163]
- secrets/keymgmt (enterprise): Removed
namespace
label on thevault.kmse.key.count
metric. - secrets/kmip (enterprise): Update plugin to v0.15.0
- secrets/kubernetes: Update plugin to v0.8.0 [GH-27187]
- secrets/kv: Update plugin to v0.18.0 [GH-26877]
- secrets/kv: Update plugin to v0.19.0 [GH-27159]
- secrets/mongodbatlas: Update plugin to v0.12.0 [GH-27149]
- secrets/openldap: Update plugin to v0.13.0 [GH-27137]
- secrets/pki: sign-intermediate API will truncate notAfter if calculated to go beyond the signing issuer's notAfter. Previously the notAfter was permitted to go beyond leading to invalid chains. [GH-26796]
- secrets/terraform: Update plugin to v0.8.0 [GH-27147]
- ui/kubernetes: Update the roles filter-input to use explicit search. [GH-27178]
- ui: Update dependencies including D3 libraries [GH-26346]
- ui: Upgrade Ember data from 4.11.3 to 4.12.4 [GH-25272]
- ui: Upgrade Ember to version 5.4 [GH-26708]
- ui: deleting a nested secret will no longer redirect you to the nearest path segment [GH-26845]
- ui: flash messages render on right side of page [GH-25459]
FEATURES:
- PKI Certificate Metadata (enterprise): Add Certificate Metadata Functionality to Record and Return Client Information about a Certificate.
- Adaptive Overload Protection (enterprise): Adds Adaptive Overload Protection
for write requests as a Beta feature (disabled by default). This automatically
prevents overloads caused by too many write requests while maintaining optimal
throughput for the hardware configuration and workload. - Audit Filtering (enterprise) : Audit devices support expression-based filter rules (powered by go-bexpr) to determine which entries are written to the audit log.
- LDAP Secrets engine hierarchical path support: Hierarchical path handling is now supported for role and set APIs. [GH-27203]
- Plugin Identity Tokens: Adds secret-less configuration of AWS auth engine using web identity federation. [GH-26507]
- Plugin Workload Identity (enterprise): Vault can generate identity tokens for plugins to use in workload identity federation auth flows.
- Transit AES-CMAC (enterprise): Added support to create and verify AES backed cipher-based message authentication codes
IMPROVEMENTS:
- activity (enterprise): Change minimum retention window in activity log to 48 months
- agent: Added a new config option,
lease_renewal_threshold
, that controls the refresh rate of non-renewable leases in Agent's template engine. [GH-25212] - agent: Agent will re-trigger auto auth if token used for rendering templates has been revoked, has exceeded the number of uses, or is a bogus value. [GH-26172]
- api: Move CLI token helper functions to importable packages in
api
module. [GH-25744] - audit: timestamps across multiple audit devices for an audit entry will now match. [GH-26088]
- auth/aws: Add inferred_hostname metadata for IAM AWS authentication method. [GH-25418]
- auth/aws: add canonical ARN as entity alias option [GH-22460]
- auth/aws: add support for external_ids in AWS assume-role [GH-26628]
- auth/cert: Adds support for TLS certificate authenticaion through a reverse proxy that terminates the SSL connection [GH-17272]
- cli: Add events subscriptions commands
- command/server: Removed environment variable requirement to generate pprof
files using SIGUSR2. Added CPU profile support. [GH-25391] - core (enterprise): persist seal rewrap status, so rewrap status API is consistent on secondary nodes.
- core/activity: Include ACME client metrics to precomputed queries [GH-26519]
- core/activity: Include ACME clients in activity log responses [GH-26020]
- core/activity: Include ACME clients in vault operator usage response [GH-26525]
- core/config: reload service registration configuration on SIGHUP [GH-17598]
- core: add deadlock detection in barrier and sealwrap
- license utilization reporting (enterprise): Add retention months to license utilization reports.
- proxy/cache (enterprise): Support new configuration parameter for static secret caching,
static_secret_token_capability_refresh_behavior
, to control the behavior when the capability refresh request receives an error from Vault. - proxy: Proxy will re-trigger auto auth if the token used for requests has been revoked, has exceeded the number of uses,
or is an otherwise invalid value. [GH-26307] - raft/snapshotagent (enterprise): upgrade raft-snapshotagent to v0.0.0-20221104090112-13395acd02c5
- replication (enterprise): Add replication heartbeat metric to telemetry
- replication (enterprise): Periodically write current time on the primary to storage, use that downstream to measure replication lag in time, expose that in health and replication status endpoints. [GH-26406]
- sdk/decompression: DecompressWithCanary will now chunk the decompression in memory to prevent loading it all at once. [GH-26464]
- sdk/helper/testcluster: add some new helpers, improve some error messages. [GH-25329]
- sdk/helper/testhelpers: add namespace helpers [GH-25270]
- secrets-sync (enterprise): Added global config path to the administrative namespace.
- secrets/pki (enterprise): Disable warnings about unknown parameters to the various CIEPS endpoints
- secrets/pki: Add a new ACME configuration parameter that allows increasing the maximum TTL for ACME leaf certificates [GH-26797]
- secrets/transform (enterprise): Add delete by token and delete by plaintext operations to Tokenization.
- storage/azure: Perform validation on Azure account name and container name [GH-26135]
- storage/raft (enterprise): add support for separate entry size limit for mount
and namespace table paths in storage to allow increased mount table size without
allowing other user storage entries to become larger. [GH-25992] - storage/raft: panic on unknown Raft operations [GH-25991]
- ui (enterprise): Allow HVD users to access Secrets Sync. [GH-26841]
- ui (enterprise): Update dashboard to make activity log query using the same start time as the metrics overview [GH-26729]
- ui (enterprise): Update filters on the custom messages list view. [GH-26653]
- ui: Allow users to wrap inputted data again instead of resetting form [GH-27289]
- ui: Display ACME clients on a separate page in the UI. [GH-26020]
- ui: Hide dashboard client count card if user does not have permission to view clients. [GH-26848]
- ui: Show computed values from
sys/internal/ui/mounts
endpoint for auth mount configuration view [GH-26663] - ui: Update PGP display and show error for Generate Operation Token flow with PGP [GH-26993]
- ui: Update language in Transit secret engine to reflect that not all keys are for encyryption [GH-27346]
- ui: Update userpass user form to allow setting
password_hash
field. [GH-26577] - ui: fixes cases where inputs did not have associated labels [GH-26263]
- ui: show banner instead of permission denied error when batch token is expired [GH-26396]
- website/docs: Add note about eventual consietency with the MongoDB Atlas database secrets engine [GH-24152]
DEPRECATIONS:
- Request Limiter Beta(enterprise): This Beta feature added in 1.16 has been
superseded by Adaptive Overload Protection and will be removed. - secrets/azure: Deprecate field "password_policy" as we are not able to set it anymore with the new MS Graph API. [GH-25637]
BUG FIXES:
- activity (enterprise): fix read-only storage error on upgrades
- agent: Correctly constructs kv-v2 secret paths in nested namespaces. [GH-26863]
- agent: Fixes a high Vault load issue, by restarting the Conusl template server after backing off instead of immediately. [GH-25497]
- agent:
vault.namespace
no longer gets incorrectly overridden byauto_auth.namespace
, if set [GH-26427] - api: fixed a bug where LifetimeWatcher routines weren't respecting exponential backoff in the presence of unexpected errors [GH-26383]
- audit: Operator changes to configured audit headers (via
/sys/config/auditing
)
will now force invalidation and be reloaded from storage when data is replicated
to other nodes. - auth/ldap: Fix login error for group search anonymous bind. [GH-26200]
- auth/ldap: Fix login error missing entity alias attribute value. [GH-26200]
- auto-auth: Addressed issue where having no permissions to renew a renewable token caused auto-auth to attempt to renew constantly with no backoff [GH-26844]
- cli/debug: Fix resource leak in CLI debug command. [GH-26167]
- cli: fixed a bug where the Vault CLI would error out if
HOME was not set. [GH-26243] - core (enterprise): Fix 403s returned when forwarding invalid token to active node from secondary.
- core (enterprise): Fix an issue that prevented the seal re-wrap status from reporting that a re-wrap is in progress for up to a second.
- core (enterprise): fix bug where raft followers disagree with the seal type after returning to one seal from two. [GH-26523]
- core (enterprise): fix issue where the Seal HA rewrap system may remain running when an active node steps down.
- core/audit: Audit logging a Vault request/response will now use a minimum 5 second context timeout.
If the existing context deadline occurs later than 5s in the future, it will be used, otherwise a
new context, separate from the original will be used. [GH-26616] - core/metrics: store cluster name in unencrypted storage to prevent blank cluster name [GH-26878]
- core/namespace (enterprise): Privileged namespace paths provided in the
administrative_namespace_path
config will now be canonicalized. - core/seal: During a seal reload through SIGHUP, only write updated seal barrier on an active node [GH-26381]
- core/seal: allow overriding of VAULT_GCPCKMS_SEAL_KEY_RING and VAULT_GCPCKMS_SEAL_CRYPTO_KEY environment keys in seal-ha
- core: Add missing field delegated_auth_accessors to GET /sys/mounts/:path API response [GH-26876]
- core: Address a data race updating a seal's last seen healthy time attribute [GH-27014]
- core: Fix
redact_version
listener parameter being ignored for some OpenAPI related endpoints. [GH-26607] - core: Only reload seal configuration when enable_multiseal is set to true. [GH-26166]
- core: when listener configuration
chroot_namespace
is active, Vault will no longer report that the configuration is invalid when Vault is sealed - events (enterprise): Fix bug preventing subscribing and receiving events within a namepace.
- events (enterprise): Terminate WebSocket connection when token is revoked.
- openapi: Fixing approle reponse duration types [GH-25510]
- openapi: added the missing migrate parameter for the unseal endpoint in vault/logical_system_paths.go [GH-25550]
- pki: Fix error in cross-signing using ed25519 keys [GH-27093]
- plugin/wif: fix a bug where the namespace was not set for external plugins using workload identity federation [GH-26384]
- replication (enterprise): fix "given mount path is not in the same namespace as the request" error that can occur when enabling replication for the first time on a secondary cluster
- replication (enterprise): fixed data integrity issue with the processing of identity aliases causing duplicates to occur in rare cases
- router: Fix missing lock in MatchingSystemView. [GH-25191]
- secret/database: Fixed race condition where database mounts may leak connections [GH-26147]
- secrets-sync (enterprise): Fixed an issue with syncing to target projects in GCP
- secrets/azure: Update vault-plugin-secrets-azure to 0.17.2 to include a bug fix for azure role creation [GH-26896]
- secrets/pki (enterprise): cert_role parameter within authenticators.cert EST configuration handler could not be set
- secrets/pki: fixed validation bug which rejected ldap schemed URLs in crl_distribution_points. [GH-26477]
- secrets/transform (enterprise): Fix a bug preventing the use of alternate schemas on PostgreSQL token stores.
- secrets/transit: Use 'hash_algorithm' parameter if present in HMAC verify requests. Otherwise fall back to deprecated 'algorithm' parameter. [GH-27211]
- storage/raft (enterprise): Fix a bug where autopilot automated upgrades could fail due to using the wrong upgrade version
- storage/raft (enterprise): Fix a regression introduced in 1.15.8 that causes
autopilot to fail to discover new server versions and so not trigger an upgrade. [GH-27277] - storage/raft: prevent writes from impeding leader transfers, e.g. during automated upgrades [GH-25390]
- transform (enterprise): guard against a panic looking up a token in exportable mode with barrier storage.
- ui: Do not show resultant-ACL banner when ancestor namespace grants wildcard access. [GH-27263]
- ui: Fix KVv2 cursor jumping inside json editor after initial input. [GH-27120]
- ui: Fix KVv2 json editor to allow null values. [GH-27094]
- ui: Fix a bug where disabling TTL on the AWS credential form would still send TTL value [GH-27366]
- ui: Fix broken help link in console for the web command. [GH-26858]
- ui: Fix configuration link from Secret Engine list view for Ember engines. [GH-27131]
- ui: Fix link to v2 generic secrets engine from secrets list page. [GH-27019]
- ui: Prevent perpetual loading screen when Vault needs initialization [GH-26985]
- ui: Refresh model within a namespace on the Secrets Sync overview page. [GH-26790]
- ui: Remove possibility of returning an undefined timezone from date-format helper [GH-26693]
- ui: Resolved accessibility issues with Web REPL. Associated label and help text with input, added a conditional to show the console/ui-panel only when toggled open, added keyboard focus trap. [GH-26872]
- ui: fix issue where a month without new clients breaks the client count dashboard [GH-27352]
- ui: fixed a bug where the replication pages did not update display when navigating between DR and performance [GH-26325]
- ui: fixes undefined start time in filename for downloaded client count attribution csv [GH-26485]
This package has no dependencies.
Ground Rules:
- This discussion is only about Vault and the Vault package. If you have feedback for Chocolatey, please contact the Google Group.
- This discussion will carry over multiple versions. If you have a comment about a particular version, please note that in your comments.
- The maintainers of this Chocolatey Package will be notified about new comments that are posted to this Disqus thread, however, it is NOT a guarantee that you will get a response. If you do not hear back from the maintainers after posting a message below, please follow up by using the link on the left side of this page or follow this link to contact maintainers. If you still hear nothing back, please follow the package triage process.
- Tell us what you love about the package or Vault, or tell us what needs improvement.
- Share your experiences with the package, or extra configuration or gotchas that you've found.
- If you use a url, the comment will be flagged for moderation until you've been whitelisted. Disqus moderated comments are approved on a weekly schedule if not sooner. It could take between 1-5 days for your comment to show up.