Skip to content

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Aug 29, 2025

Bumps github.com/hashicorp/vault from 1.16.3 to 1.20.3.

Release notes

Sourced from github.com/hashicorp/vault's releases.

v1.20.3

No release notes provided.

v1.20.2

August 06, 2025

SECURITY:

BUG FIXES:

  • agent/template: Fixed issue where templates would not render correctly if namespaces was provided by config, and the namespace and mount path of the secret were the same. [GH-31392]
  • identity/mfa: revert cache entry change from #31217 and document cache entry values [GH-31421]

v1.20.1

No release notes provided.

v1.20.0

1.20.0

June 25, 2025

SECURITY:

  • core: require a nonce when cancelling a rekey operation that was initiated within the last 10 minutes. [GH-30794]

CHANGES:

  • UI: remove outdated and unneeded js string extensions [GH-29834]
  • activity (enterprise): The sys/internal/counters/activity endpoint will return actual values for new clients in the current month.
  • activity (enterprise): provided values for start_time and end_time in sys/internal/counters/activity are aligned to the corresponding billing period.
  • activity: provided value for end_time in sys/internal/counters/activity is now capped at the end of the last completed month. [GH-30164]
  • api: Update the default API client to check for the Retry-After header and, if it exists, wait for the specified duration before retrying the request. [GH-30887]
  • auth/alicloud: Update plugin to v0.21.0 [GH-30810]
  • auth/azure: Update plugin to v0.20.2. Login requires resource_group_name, vm_name, and vmss_name to match token claims [GH-30052]
  • auth/azure: Update plugin to v0.20.3 [GH-30082]
  • auth/azure: Update plugin to v0.20.4 [GH-30543]
  • auth/azure: Update plugin to v0.21.0 [GH-30872]
  • auth/azure: Update plugin to v0.21.1 [GH-31010]
  • auth/cf: Update plugin to v0.20.1 [GH-30583]
  • auth/cf: Update plugin to v0.21.0 [GH-30842]
  • auth/gcp: Update plugin to v0.20.2 [GH-30081]
  • auth/jwt: Update plugin to v0.23.2 [GH-30431]
  • auth/jwt: Update plugin to v0.24.1 [GH-30876]
  • auth/kerberos: Update plugin to v0.15.0 [GH-30845]
  • auth/kubernetes: Update plugin to v0.22.1 [GH-30910]
  • auth/oci: Update plugin to v0.19.0 [GH-30841]
  • auth/saml: Update plugin to v0.6.0
  • core: Bump Go version to 1.24.4.
  • core: Verify that the client IP address extracted from an X-Forwarded-For header is a valid IPv4 or IPv6 address [GH-29774]

... (truncated)

Changelog

Sourced from github.com/hashicorp/vault's changelog.

1.20.3

August 28, 2025

SECURITY:

CHANGES:

  • core: Bump Go version to 1.24.6. (ce56e14e)
  • http: Add JSON configurable limits to HTTP handling for JSON payloads: max_json_depth, max_json_string_value_length, max_json_object_entry_count, max_json_array_element_count. [GH-31069]
  • sdk: Upgrade to go-secure-stdlib/[email protected], which also bumps github.com/docker/docker to v28.3.3+incompatible (8f172169)
  • secrets/openldap (enterprise): update plugin to v0.16.1

IMPROVEMENTS:

  • auth/ldap: add explicit logging to rotations in ldap [GH-31401]
  • core (enterprise): improve rotation manager logging to include specific lines for rotation success and failure
  • secrets/database: log password rotation success (info) and failure (error). Some relevant log lines have been updated to include "path" fields. [GH-31402]
  • secrets/transit: add logging on both success and failure of key rotation [GH-31420]
  • ui: Use the Helios Design System Code Block component for all readonly code editors and use its Code Editor component for all other code editors [GH-30188]

BUG FIXES:

  • core (enterprise): fix a bug where issuing a token in a namespace used root auth configuration instead of namespace auth configuration
  • core/metrics: Add service name prefix for core HA metrics to avoid duplicate, zero-value metrics. (91e5f443)
  • core/seal: When Seal-HA is enabled, make it an error to persist the barrier keyring when not all seals are healthy. This prevents the possibility of failing to unseal when a different subset of seals are healthy than were healthy at last write. (bbe64227)
  • raft (enterprise): auto-join will now work in regions that do not support dual-stack (c66baf5e)
  • raft/autopilot: Fixes an issue with enterprise redundancy zones where, if the leader was in a redundancy zone and that leader becomes unavailable, the node would become an unzoned voter. This can artificially inflate the required number of nodes for quorum, leading to a situation where the cluster cannot recover if another leader subsequently becomes unavailable. Vault will now keep an unavailable node in its last known redundancy zone as a non-voter. [GH-31443]
  • replication (enterprise): Fix bug where group updates fail when processed on a standby node in a PR secondary cluster.
  • secrets-sync (enterprise): GCP locational KMS keys are no longer incorrectly removed when the location name is all lowercase.
  • secrets/database/postgresql: Support for multiline statements in the rotation_statements field. [GH-31442]
  • ui: Fix DR secondary view from not loading/transitioning. [GH-31478]

1.20.2

August 06, 2025

SECURITY:

BUG FIXES:

  • agent/template: Fixed issue where templates would not render correctly if namespaces was provided by config, and the namespace and mount path of the secret were the same. [GH-31392]
  • identity/mfa: revert cache entry change from #31217 and document cache entry values [GH-31421]

... (truncated)

Commits
  • 7665ff2 [VAULT-39259] This is an automated pull request to build all artifacts for a ...
  • 8f17216 [VAULT-38910]: upgrade docker package to resolve GO-2025-3829 (#8642) (#8879)...
  • 5bf666b manually copy over missing changelogs for 1.20 (#8955)
  • 8b3a9ce Backport bump go-getter to 1.7.9 into release/1.20.x+ent (#8930) (#8948)
  • c66baf5 VAULT-39010 Adding new go-discover logic (#8884) (#8933) (#8947)
  • 41b5eb0 [VAULT-39235]: pipeline(changed-files): don't group underscore prefixed chang...
  • 91e5f44 Backport Backport Copy VAULT-38888 Add prefix vault to metric summary definit...
  • bbe6422 Disallow writing of barrier keyring if seals aren't healthy (#8707) (#8889) (...
  • e9c2004 [VAULT-39208]actions: update action pins (#8864) (#8869) (#8874)
  • d3066cd [VAULT-39153] pipeline(backport): remove docs and pipeline from allowed ce in...
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Bumps [github.com/hashicorp/vault](https://github.com/hashicorp/vault) from 1.16.3 to 1.20.3.
- [Release notes](https://github.com/hashicorp/vault/releases)
- [Changelog](https://github.com/hashicorp/vault/blob/main/CHANGELOG.md)
- [Commits](hashicorp/vault@v1.16.3...v1.20.3)

---
updated-dependencies:
- dependency-name: github.com/hashicorp/vault
  dependency-version: 1.20.3
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file go Pull requests that update go code labels Aug 29, 2025
@dependabot dependabot bot requested a review from a team as a code owner August 29, 2025 16:35
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file go Pull requests that update go code
Development

Successfully merging this pull request may close these issues.

0 participants