|
3 | 3 | - [v1.0.0 - v1.9.10](CHANGELOG-pre-v1.10.md)
|
4 | 4 | - [v0.11.6 and earlier](CHANGELOG-v0.md)
|
5 | 5 |
|
| 6 | +## 1.20.3 |
| 7 | +### August 28, 2025 |
| 8 | + |
| 9 | +SECURITY: |
| 10 | + |
| 11 | +* core: Update github.com/hashicorp/go-getter to fix security vulnerability GHSA-wjrx-6529-hcj3. ([8b3a9ce1](https://github.com/hashicorp/vault/commit/8b3a9ce1f651932559a129a7889243d24127cee2)) |
| 12 | + |
| 13 | +CHANGES: |
| 14 | + |
| 15 | +* core: Bump Go version to 1.24.6. ([ce56e14e](https://github.com/hashicorp/vault/commit/ce56e14e7466ae80e05d11a83c8f41db0f4653be)) |
| 16 | +* http: Add JSON configurable limits to HTTP handling for JSON payloads: `max_json_depth`, `max_json_string_value_length`, `max_json_object_entry_count`, `max_json_array_element_count`. [[GH-31069](https://github.com/hashicorp/vault/pull/31069)] |
| 17 | +* sdk: Upgrade to go-secure-stdlib/ [email protected], which also bumps github.com/docker/docker to v28.3.3+incompatible ( [8f172169 ](https://github.com/hashicorp/vault/commit/8f1721697bba123117f4f98dae4154ef9fe614e5)) |
| 18 | +* secrets/openldap (enterprise): update plugin to v0.16.1 |
| 19 | + |
| 20 | +IMPROVEMENTS: |
| 21 | + |
| 22 | +* auth/ldap: add explicit logging to rotations in ldap [[GH-31401](https://github.com/hashicorp/vault/pull/31401)] |
| 23 | +* core (enterprise): improve rotation manager logging to include specific lines for rotation success and failure |
| 24 | +* secrets/database: log password rotation success (info) and failure (error). Some relevant log lines have been updated to include "path" fields. [[GH-31402](https://github.com/hashicorp/vault/pull/31402)] |
| 25 | +* secrets/transit: add logging on both success and failure of key rotation [[GH-31420](https://github.com/hashicorp/vault/pull/31420)] |
| 26 | +* ui: Use the Helios Design System Code Block component for all readonly code editors and use its Code Editor component for all other code editors [[GH-30188](https://github.com/hashicorp/vault/pull/30188)] |
| 27 | + |
| 28 | +BUG FIXES: |
| 29 | + |
| 30 | +* core (enterprise): fix a bug where issuing a token in a namespace used root auth configuration instead of namespace auth configuration |
| 31 | +* core/metrics: Add service name prefix for core HA metrics to avoid duplicate, zero-value metrics. ([91e5f443](https://github.com/hashicorp/vault/commit/91e5f44315fb52c37b54e8b0eece1b4390665cc3)) |
| 32 | +* core/seal: When Seal-HA is enabled, make it an error to persist the barrier |
| 33 | +keyring when not all seals are healthy. This prevents the possibility of |
| 34 | +failing to unseal when a different subset of seals are healthy than were |
| 35 | +healthy at last write. ([bbe64227](https://github.com/hashicorp/vault/commit/bbe64227c586cb34f73d9ae8025398f24aa7e12d)) |
| 36 | +* raft (enterprise): auto-join will now work in regions that do not support dual-stack ([c66baf5e](https://github.com/hashicorp/vault/commit/c66baf5ee1ee9320daa6af5528cb2f250f2a0f3a)) |
| 37 | +* raft/autopilot: Fixes an issue with enterprise redundancy zones where, if the leader was in a redundancy zone and that leader becomes unavailable, the node would become an unzoned voter. This can artificially inflate the required number of nodes for quorum, leading to a situation where the cluster cannot recover if another leader subsequently becomes unavailable. Vault will now keep an unavailable node in its last known redundancy zone as a non-voter. [[GH-31443](https://github.com/hashicorp/vault/pull/31443)] |
| 38 | +* replication (enterprise): Fix bug where group updates fail when processed on a |
| 39 | +standby node in a PR secondary cluster. |
| 40 | +* secrets-sync (enterprise): GCP locational KMS keys are no longer incorrectly removed when the location name is all lowercase. |
| 41 | +* secrets/database/postgresql: Support for multiline statements in the `rotation_statements` field. [[GH-31442](https://github.com/hashicorp/vault/pull/31442)] |
| 42 | +* ui: Fix DR secondary view from not loading/transitioning. [[GH-31478](https://github.com/hashicorp/vault/pull/31478)] |
| 43 | + |
6 | 44 | ## 1.20.2
|
7 | 45 | ### August 06, 2025
|
8 | 46 |
|
@@ -240,6 +278,45 @@ intermediate certificates. [[GH-30034](https://github.com/hashicorp/vault/pull/3
|
240 | 278 | * ui: MFA methods now display the namespace path instead of the namespace id. [[GH-29588](https://github.com/hashicorp/vault/pull/29588)]
|
241 | 279 | * ui: Redirect users authenticating with Vault as an OIDC provider to log in again when token expires. [[GH-30838](https://github.com/hashicorp/vault/pull/30838)]
|
242 | 280 |
|
| 281 | +## 1.19.9 |
| 282 | +### August 28, 2025 |
| 283 | + |
| 284 | +**Enterprise LTS:** Vault Enterprise 1.19 is a [Long-Term Support (LTS)](https://developer.hashicorp.com/vault/docs/enterprise/lts) release. |
| 285 | + |
| 286 | +SECURITY: |
| 287 | + |
| 288 | +* core: Update github.com/hashicorp/go-getter to fix security vulnerability GHSA-wjrx-6529-hcj3. |
| 289 | + |
| 290 | +CHANGES: |
| 291 | + |
| 292 | +* core: Bump Go version to 1.24.6. |
| 293 | +* http: Add JSON configurable limits to HTTP handling for JSON payloads: `max_json_depth`, `max_json_string_value_length`, `max_json_object_entry_count`, `max_json_array_element_count`. |
| 294 | +* sdk: Upgrade to go-secure-stdlib/ [email protected], which also bumps github.com/docker/docker to v28.3.3+incompatible |
| 295 | +* secrets/openldap: update plugin to v0.15.5 |
| 296 | + |
| 297 | +IMPROVEMENTS: |
| 298 | + |
| 299 | +* auth/ldap: add explicit logging to rotations in ldap |
| 300 | +* core (enterprise): improve rotation manager logging to include specific lines for rotation success and failure |
| 301 | +* secrets/database: log password rotation success (info) and failure (error). Some relevant log lines have been updated to include "path" fields. |
| 302 | +* secrets/transit: add logging on both success and failure of key rotation |
| 303 | +* ui: Use the Helios Design System Code Block component for all readonly code editors and use its Code Editor component for all other code editors |
| 304 | + |
| 305 | +BUG FIXES: |
| 306 | + |
| 307 | +* core (enterprise): fix a bug where issuing a token in a namespace used root auth configuration instead of namespace auth configuration |
| 308 | +* core/metrics: Add service name prefix for core HA metrics to avoid duplicate, zero-value metrics. |
| 309 | +* core/seal: When Seal-HA is enabled, make it an error to persist the barrier |
| 310 | +keyring when not all seals are healthy. This prevents the possibility of |
| 311 | +failing to unseal when a different subset of seals are healthy than were |
| 312 | +healthy at last write. |
| 313 | +* raft (enterprise): auto-join will now work in regions that do not support dual-stack |
| 314 | +* raft/autopilot: Fixes an issue with enterprise redundancy zones where, if the leader was in a redundancy zone and that leader becomes unavailable, the node would become an unzoned voter. This can artificially inflate the required number of nodes for quorum, leading to a situation where the cluster cannot recover if another leader subsequently becomes unavailable. Vault will now keep an unavailable node in its last known redundancy zone as a non-voter. |
| 315 | +* replication (enterprise): Fix bug where group updates fail when processed on a |
| 316 | +standby node in a PR secondary cluster. |
| 317 | +* secrets-sync (enterprise): GCP locational KMS keys are no longer incorrectly removed when the location name is all lowercase. |
| 318 | +* secrets/database/postgresql: Support for multiline statements in the `rotation_statements` field. |
| 319 | + |
243 | 320 | ## 1.19.8 Enterprise
|
244 | 321 | ### August 06, 2025
|
245 | 322 |
|
@@ -682,6 +759,26 @@ Unblocks customers that were stuck in a failing loop when attempting to rotate s
|
682 | 759 | * ui: No longer running decodeURIComponent on KVv2 list view allowing percent encoded data-octets in path name. [[GH-28698](https://github.com/hashicorp/vault/pull/28698)]
|
683 | 760 | * vault/diagnose: Fix time to expiration reporting within the TLS verification to not be a month off. [[GH-29128](https://github.com/hashicorp/vault/pull/29128)]
|
684 | 761 |
|
| 762 | +## 1.18.14 |
| 763 | +### August 28, 2025 |
| 764 | + |
| 765 | +CHANGES: |
| 766 | + |
| 767 | +* core: Bump Go version to 1.23.12. |
| 768 | +* http: Add JSON configurable limits to HTTP handling for JSON payloads: `max_json_depth`, `max_json_string_value_length`, `max_json_object_entry_count`, `max_json_array_element_count`. |
| 769 | +* secrets/openldap: update plugin to v0.14.7 |
| 770 | + |
| 771 | +BUG FIXES: |
| 772 | + |
| 773 | +* core (enterprise): fix a bug where issuing a token in a namespace used root auth configuration instead of namespace auth configuration |
| 774 | +* core/metrics: Add service name prefix for core HA metrics to avoid duplicate, zero-value metrics. |
| 775 | +* core/seal: When Seal-HA is enabled, make it an error to persist the barrier |
| 776 | +keyring when not all seals are healthy. This prevents the possibility of |
| 777 | +failing to unseal when a different subset of seals are healthy than were |
| 778 | +healthy at last write. |
| 779 | +* raft/autopilot: Fixes an issue with enterprise redundancy zones where, if the leader was in a redundancy zone and that leader becomes unavailable, the node would become an unzoned voter. This can artificially inflate the required number of nodes for quorum, leading to a situation where the cluster cannot recover if another leader subsequently becomes unavailable. Vault will now keep an unavailable node in its last known redundancy zone as a non-voter. |
| 780 | +* secrets/database/postgresql: Support for multiline statements in the `rotation_statements` field. |
| 781 | + |
685 | 782 | ## 1.18.13 Enterprise
|
686 | 783 | ### August 06, 2025
|
687 | 784 |
|
@@ -1846,6 +1943,24 @@ autopilot to fail to discover new server versions and so not trigger an upgrade.
|
1846 | 1943 | * ui: fixed a bug where the replication pages did not update display when navigating between DR and performance [[GH-26325](https://github.com/hashicorp/vault/pull/26325)]
|
1847 | 1944 | * ui: fixes undefined start time in filename for downloaded client count attribution csv [[GH-26485](https://github.com/hashicorp/vault/pull/26485)]
|
1848 | 1945 |
|
| 1946 | +## 1.16.25 |
| 1947 | +### August 28, 2025 |
| 1948 | + |
| 1949 | +**Enterprise LTS:** Vault Enterprise 1.16 is a [Long-Term Support (LTS)](https://developer.hashicorp.com/vault/docs/enterprise/lts) release. |
| 1950 | + |
| 1951 | +CHANGES: |
| 1952 | + |
| 1953 | +* core: Bump Go version to 1.23.12 |
| 1954 | +* http: Add JSON configurable limits to HTTP handling for JSON payloads: `max_json_depth`, `max_json_string_value_length`, `max_json_object_entry_count`, `max_json_array_element_count`. |
| 1955 | + |
| 1956 | +BUG FIXES: |
| 1957 | + |
| 1958 | +* core (enterprise): fix a bug where issuing a token in a namespace used root auth configuration instead of namespace auth configuration |
| 1959 | +* core/seal: When Seal-HA is enabled, make it an error to persist the barrier |
| 1960 | +keyring when not all seals are healthy. This prevents the possibility of |
| 1961 | +failing to unseal when a different subset of seals are healthy than were |
| 1962 | +healthy at last write. |
| 1963 | + |
1849 | 1964 | ## 1.16.24 Enterprise
|
1850 | 1965 | ### August 06, 2025
|
1851 | 1966 |
|
|
0 commit comments