Skip to content

v1.16.3

Latest
Compare
Choose a tag to compare
@hc-github-team-es-release-engineering hc-github-team-es-release-engineering released this 29 May 20:47
e92d9a5

1.16.3

May 30, 2024

CHANGES:

  • auth/jwt: Update plugin to v0.20.3 [GH-26890]
  • core/identity: improve performance for secondary nodes receiving identity related updates through replication [GH-27184]
  • core: Bump Go version to 1.22.2.

IMPROVEMENTS:

  • secrets/pki (enterprise): Disable warnings about unknown parameters to the various CIEPS endpoints
  • ui: Update PGP display and show error for Generate Operation Token flow with PGP [GH-26993]

BUG FIXES:

  • activity (enterprise): fix read-only storage error on upgrades
  • auto-auth: Addressed issue where having no permissions to renew a renewable token caused auto-auth to attempt to renew constantly with no backoff [GH-26844]
  • core (enterprise): Fix an issue that prevented the seal re-wrap status from reporting that a re-wrap is in progress for up to a second.
  • core/audit: Audit logging a Vault request/response will now use a minimum 5 second context timeout.
    If the existing context deadline occurs later than 5s in the future, it will be used, otherwise a
    new context, separate from the original will be used. [GH-26616]
  • core: Add missing field delegated_auth_accessors to GET /sys/mounts/:path API response [GH-26876]
  • core: Address a data race updating a seal's last seen healthy time attribute [GH-27014]
  • core: Fix redact_version listener parameter being ignored for some OpenAPI related endpoints. [GH-26607]
  • events (enterprise): Fix bug preventing subscribing and receiving events within a namepace.
  • pki: Fix error in cross-signing using ed25519 keys [GH-27093]
  • replication (enterprise): fix "given mount path is not in the same namespace as the request" error that can occur when enabling replication for the first time on a secondary cluster
  • secrets-sync (enterprise): Secondary nodes in a cluster now properly check activation-flags values.
  • secrets/azure: Update vault-plugin-secrets-azure to 0.17.2 to include a bug fix for azure role creation [GH-26896]
  • secrets/pki (enterprise): cert_role parameter within authenticators.cert EST configuration handler could not be set
  • secrets/transit: Use 'hash_algorithm' parameter if present in HMAC verify requests. Otherwise fall back to deprecated 'algorithm' parameter. [GH-27211]
  • ui: Fix KVv2 cursor jumping inside json editor after initial input. [GH-27120]
  • ui: Fix KVv2 json editor to allow null values. [GH-27094]
  • ui: Fix broken help link in console for the web command. [GH-26858]
  • ui: Fix link to v2 generic secrets engine from secrets list page. [GH-27019]
  • ui: Prevent perpetual loading screen when Vault needs initialization [GH-26985]
  • ui: Refresh model within a namespace on the Secrets Sync overview page. [GH-26790]