-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
chore(deps): update all non-major dependencies #450
Conversation
bbbbd86
to
9b1b4c5
Compare
9b1b4c5
to
c53cb29
Compare
fc35fa6
to
688ea3c
Compare
f34588b
to
fe3e4d4
Compare
73226ad
to
d20fbfa
Compare
92e6af0
to
a462c68
Compare
456112c
to
3858314
Compare
ℹ Artifact update noticeFile name: go.modIn order to perform the update(s) described in the table above, Renovate ran the
Details:
|
0b93530
to
de92678
Compare
25b4ead
to
f3361fe
Compare
b8e9708
to
2b66679
Compare
2b66679
to
28b41e3
Compare
37d17ce
to
22da6e1
Compare
5a441a5
to
d1a7f12
Compare
48cfd99
to
0a8bdac
Compare
cd4ea5d
to
b60c22e
Compare
b60c22e
to
98e5311
Compare
Edited/Blocked NotificationRenovate will not automatically rebase this PR, because it does not recognize the last commit author and assumes somebody else may have edited the PR. You can manually request rebase by checking the rebase/retry box above. |
This PR contains the following updates:
b4ffde6
->692973e
0c52d54
->0a12ed9
c5b1261
->0a4eaa0
c5b1261
->0a4eaa0
8450866
->e28ff12
v0.23.3
->v0.24.0
v1.12.2
->v1.14.0
v2.27.1
->v2.27.4
df5a14d
->429e197
00311c2
->7708105
Release Notes
go-vela/types (github.com/go-vela/types)
v0.24.0
Compare Source
What's Changed
New Contributors
Full Changelog: go-vela/types@v0.23.3...v0.24.0
hashicorp/vault (github.com/hashicorp/vault/api)
v1.14.0
Compare Source
1.14.0
June 21, 2023
BREAKING CHANGES:
To re-enable keeping these metrics available on the tidy status endpoint, enable
maintain_stored_certificate_counts on tidy-config, to also publish them to the
metrics consumer, enable publish_stored_certificate_count_metrics . [GH-18186]
CHANGES:
that allows for setting of the primary cluster addresses directly, instead of
via a token.
FEATURES:
utilization reporting, which sends minimal product-license metering
data
to HashiCorp without requiring you to manually collect and report them.
env_template
configuration stanza. The process-supervisor configuration can be generated with a newvault agent generate-config
helper tool. [GH-20530]as an external plugin by vault versions that support secrets/auth plugin
multiplexing (> 1.12) [GH-19215]
vault proxy -config=config.hcl
. It currently has the same feature set as Vault Agent's API proxy, but the two may diverge in the future. We plan to deprecate the API proxy functionality of Vault Agent in a future release. [GH-20548]IMPROVEMENTS:
distinguishing client sources. [GH-20626]
reload
option to cert auth configuration in case of external renewals of local x509 key-pairs. [GH-19002]remove_jwt_follows_symlinks
(default: false), that, if set to true will now remove the JWT, instead of the symlink to the JWT, if a symlink to a JWT has been provided in thepath
option, and theremove_jwt_after_reading
config option is set to true (default). [GH-18863]results in a response which contains the full billing period [GH-20694]
/sys/internal/counters/config
endpoint now contains read-onlyminimum_retention_months
. [GH-20150]/sys/internal/counters/config
endpoint now contains read-onlyreporting_enabled
andbilling_start_timestamp
fields. [GH-20086]auth/kerberos: Upgrade plugin dependencies [GH-20771]
VAULT_PPROF_WRITE_TO_FILE=true
is set on the server. [GH-20609]reporting via the
OPTOUT_LICENSE_REPORTING
environment variable. [GH-3939]secrets/gcpkms: Upgrade plugin dependencies [GH-20784]
kv-get
command for reading kv v2 data and metadata [GH-20590]BUG FIXES:
max_page_size
properly [GH-20453]on this secondary if we don't have a corresponding mount entry.
new_token
forwarding is set. When this occurred, this would result in the following error to the client:error performing token check: no lease entry found for token that ought to have one, possible eventual consistency issue
.sscGenCounter
resulting in 412 errors.
have its own changelog entry. Fix wrong lock used in ListAuths link meta interface implementation. [GH-21260]
a performance secondary. This resulted in the data being set to nil in the cache
and a "invalid value" error being returned from the API.
break replication.
with a new entity alias to be incorrectly forwarded from perf standbys. [GH-21100]
TypeInt64
schema field. [GH-18729]secrets/transit: Fix bug related to shorter dedicated HMAC key sizing.
sdk/helper/keysutil: New HMAC type policies will have HMACKey equal to Key and be copied over on import. [GH-20864]
operation_all
to persist after deselecting all operation checkboxes [GH-19139]v1.13.0
Compare Source
1.13.0
March 01, 2023
SECURITY:
secret is unsupported by this backend
will be thrown by the lease manager. [GH-18874]CHANGES:
role
field on login [GH-19005]This will only be used internally for implementing user lockout. [GH-17104]
Plugins using sdk/useragent.String must instead use sdk/useragent.PluginString. [GH-14229]
builtin
in their metadata remain unaffected. [GH-18051]GET /database/config/:name
endpoint now returns an additionalplugin_version
field in the response data. [GH-16982]GET /sys/auth/:path/tune
andGET /sys/mounts/:path/tune
endpoints may now return an additionalplugin_version
field in the response data if set. [GH-17167]GET
for/sys/auth
,/sys/auth/:path
,/sys/mounts
, and/sys/mounts/:path
paths now return additionalplugin_version
,running_plugin_version
andrunning_sha256
fields in the response data for each mount. [GH-17167]FEATURES:
synchronized across primary and performance replica clusters offering
a unified CRL/OCSP view of revocations across cluster boundaries. [GH-19196]
brute force attacks for userpass, approle and ldap auth methods. [GH-19230]
sys/config/group-policy-application
API, policies can be configured to apply outside of namespace hierarchy, allowing this kind of cross-namespace sharing.IMPROVEMENTS:
token_file
auto-auth configuration to allow using a pre-existing token for Vault Agent. [GH-18740]metrics_only
role, serving only metrics, as part of the listener's new top levelrole
option. [GH-18101]elide_list_responses
option, providing a countermeasure for a common source of oversized audit log entries [GH-18128]Virtual Machine Scale Set (VMSS) in flexible orchestration mode. [GH-17540]
abort_on_error
parameter to CLI login command to help in non-interactive contexts [GH-19076]Make passcode arguments consistent across login MFA method types. [GH-18610]
vault operator rekey
prompts to describe recovery keys when-target=recovery
[GH-18892]temporary file for SIGUSR2 signals. [GH-17929]
events.alpha1
experiment. [GH-18682]sys/loggers
andsys/loggers/:name
endpoints [GH-17979]sys/lockedusers/[mount_accessor]/unlock/[alias_identifier] to sys/locked-users/[mount_accessor]/unlock/[alias_identifier]. [GH-18675]
with given mount_accessor and alias_identifier if locked [GH-18279]
detect_deadlocks
config to optionally detect core state deadlocks [GH-18604]vault operator migrate
in order to speed up a migration. [GH-18817]sys/config/group-policy-application
, to allow group policies to be configurableto apply to a group in
any
namespace. The default,within_namespace_hierarchy
, is the current behaviour.{mountPath}
to{<type>_mount_path}
[GH-18663]vX.Y.Z+builtin
orvX.Y.Z+builtin.vault
. [GH-17289]deactivated state if this is not the first unseal after an upgrade. [GH-17879]
tls_server_name
andtls_skip_verify
parameters [GH-18799]allowed by role [GH-18397]
default_follows_latest_issuer
. [GH-17824]config/auto-tidy
,config/crl
, androles/:role
. [GH-18222]which is repeated on batch responses to help more easily correlate inputs with outputs. [GH-18243]
Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.
This PR was generated by Mend Renovate. View the repository job log.