Skip to content

Conversation

@dependabot
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Jun 9, 2025

Bumps github.com/hashicorp/vault/api from 1.10.0 to 1.20.0.

Release notes

Sourced from github.com/hashicorp/vault/api's releases.

v1.19.5

1.19.5

May 30, 2025

Enterprise LTS: Vault Enterprise 1.19 is a Long-Term Support (LTS) release.

CHANGES:

  • database/snowflake: Update plugin to v0.13.1 [GH-30775]

IMPROVEMENTS:

  • plugins: Support registration of CE plugins with extracted artifact directory. [GH-30673]

BUG FIXES:

  • ui: Fix broken link to Hashicorp Vault developer site in the Web REPL help. [GH-30670]

v1.19.4

1.19.4

May 16, 2025

CHANGES:

  • Update vault-plugin-auth-cf to v0.20.1 [GH-30586]
  • auth/azure: Update plugin to v0.20.4 [GH-30543]
  • core: Bump Go version to 1.24.3.

IMPROVEMENTS:

  • Namespaces (enterprise): allow a root token to relock a namespace
  • core (enterprise): update to FIPS 140-3 cryptographic module in the FIPS builds.
  • core: Updated code and documentation to support FIPS 140-3 compliant algorithms. [GH-30576]
  • core: support for X25519MLKEM768 (post quantum key agreement) in the Go TLS stack. [GH-30603]
  • ui: Replaces all instances of the deprecated event.keyCode with event.key [GH-30493]

BUG FIXES:

  • core (enterprise): fix a bug where plugin automated root rotations would stop after seal/unseal operations
  • plugins (enterprise): Fix an issue where Enterprise plugins can't run on a standby node when it becomes active because standby nodes don't extract the artifact when the plugin is registered. Remove extracting from Vault and require the operator to place the extracted artifact in the plugin directory before registration.

v1.19.3

1.19.3

April 30, 2025

CHANGES:

... (truncated)

Changelog

Sourced from github.com/hashicorp/vault/api's changelog.

1.15.16 Enterprise

October 09, 2024

SECURITY:

  • secrets/identity: A privileged Vault operator with write permissions to the root namespace's identity endpoint could escalate their privileges to Vault's root policy (CVE-2024-9180) HCSEC-2024-21

IMPROVEMENTS:

  • core: log at level ERROR rather than INFO when all seals are unhealthy. [GH-28564]

BUG FIXES:

  • auth/cert: When using ocsp_ca_certificates, an error was produced though extra certs validation succeeded. [GH-28597]
  • auth/token: Fix token TTL calculation so that it uses max_lease_ttl tune value for tokens created via auth/token/create. [GH-28498]

1.15.15 Enterprise

September 25, 2024

SECURITY:

CHANGES:

  • core: Bump Go version to 1.22.7.
  • secrets/ssh: Add a flag, allow_empty_principals to allow keys or certs to apply to any user/principal. [GH-28466]

BUG FIXES:

  • secret/aws: Fixed potential panic after step-down and the queue has not repopulated. [GH-28330]
  • auth/cert: During certificate validation, OCSP requests are debug logged even if Vault's log level is above DEBUG. [GH-28450]
  • auth/cert: ocsp_ca_certificates field was not honored when validating OCSP responses signed by a CA that did not issue the certificate. [GH-28309]
  • auth: Updated error handling for missing login credentials in AppRole and UserPass auth methods to return a 400 error instead of a 500 error. [GH-28441]
  • core: Fixed an issue where maximum request duration timeout was not being added to all requests containing strings sys/monitor and sys/events. With this change, timeout is now added to all requests except monitor and events endpoint. [GH-28230]

1.15.14 Enterprise

August 29, 2024

CHANGES:

  • activity (enterprise): filter all fields in client count responses by the request namespace [GH-27790]
  • core: Bump Go version to 1.22.6

IMPROVEMENTS:

  • activity log: Changes how new client counts in the current month are estimated, in order to return more visibly sensible totals. [GH-27547]
  • activity: /sys/internal/counters/activity will now include a warning if the specified usage period contains estimated client counts. [GH-28068]
  • cli: vault operator usage will now include a warning if the specified usage period contains estimated client counts. [GH-28068]
  • core/activity: Ensure client count queries that include the current month return consistent results by sorting the clients before performing estimation [GH-28062]

... (truncated)

Commits
  • 71ca099 Update vault-plugin-secrets-gcp to v0.22.0 (#30846)
  • 51ec0db Update vault-plugin-auth-kerberos to v0.15.0 (#30845)
  • 38cc2c9 Update vault-plugin-auth-cf to v0.21.0 (#30842)
  • 36aa49b enos(fips1403): simplify semver constraint to only consider currently mixed r...
  • 407c297 Update vault-plugin-secrets-openldap to v0.16.0 (#30844)
  • a725087 VAULT-36495 CE changes (#30807)
  • d19e946 Update vault-plugin-auth-oci to v0.19.0 (#30841)
  • d9ecd5b PostgreSQL backend passwordless authentication in cloud (#30681)
  • 636524e Update vault-plugin-database-couchbase to v0.14.0 (#30836)
  • befafd5 [VAULT-35682] build(cgo): Build CGO binaries in a container (#30834)
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Bumps [github.com/hashicorp/vault/api](https://github.com/hashicorp/vault) from 1.10.0 to 1.20.0.
- [Release notes](https://github.com/hashicorp/vault/releases)
- [Changelog](https://github.com/hashicorp/vault/blob/main/CHANGELOG-v1.10-v1.15.md)
- [Commits](hashicorp/vault@v1.10.0...api/v1.20.0)

---
updated-dependencies:
- dependency-name: github.com/hashicorp/vault/api
  dependency-version: 1.20.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot requested review from a-mesin and florianrusch June 9, 2025 11:39
@dependabot @github
Copy link
Contributor Author

dependabot bot commented on behalf of github Jun 9, 2025

The reviewers field in the dependabot.yml file will be removed soon. Please use the code owners file to specify reviewers for Dependabot PRs. For more information, see this blog post.

@dependabot @github
Copy link
Contributor Author

dependabot bot commented on behalf of github Sep 15, 2025

Superseded by #120.

@dependabot dependabot bot closed this Sep 15, 2025
@dependabot dependabot bot deleted the dependabot/go_modules/github.com/hashicorp/vault/api-1.20.0 branch September 15, 2025 11:43
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant