Skip to content

Commit 79c8bce

Browse files
authored
Update CHANGELOG.md for 1.20.3 1.19.9 1.18.14 and 1.16.25 (#31527)
1 parent bfd2e54 commit 79c8bce

File tree

1 file changed

+115
-0
lines changed

1 file changed

+115
-0
lines changed

CHANGELOG.md

Lines changed: 115 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,44 @@
33
- [v1.0.0 - v1.9.10](CHANGELOG-pre-v1.10.md)
44
- [v0.11.6 and earlier](CHANGELOG-v0.md)
55

6+
## 1.20.3
7+
### August 28, 2025
8+
9+
SECURITY:
10+
11+
* core: Update github.com/hashicorp/go-getter to fix security vulnerability GHSA-wjrx-6529-hcj3. ([8b3a9ce1](https://github.com/hashicorp/vault/commit/8b3a9ce1f651932559a129a7889243d24127cee2))
12+
13+
CHANGES:
14+
15+
* core: Bump Go version to 1.24.6. ([ce56e14e](https://github.com/hashicorp/vault/commit/ce56e14e7466ae80e05d11a83c8f41db0f4653be))
16+
* http: Add JSON configurable limits to HTTP handling for JSON payloads: `max_json_depth`, `max_json_string_value_length`, `max_json_object_entry_count`, `max_json_array_element_count`. [[GH-31069](https://github.com/hashicorp/vault/pull/31069)]
17+
* sdk: Upgrade to go-secure-stdlib/[email protected], which also bumps github.com/docker/docker to v28.3.3+incompatible ([8f172169](https://github.com/hashicorp/vault/commit/8f1721697bba123117f4f98dae4154ef9fe614e5))
18+
* secrets/openldap (enterprise): update plugin to v0.16.1
19+
20+
IMPROVEMENTS:
21+
22+
* auth/ldap: add explicit logging to rotations in ldap [[GH-31401](https://github.com/hashicorp/vault/pull/31401)]
23+
* core (enterprise): improve rotation manager logging to include specific lines for rotation success and failure
24+
* secrets/database: log password rotation success (info) and failure (error). Some relevant log lines have been updated to include "path" fields. [[GH-31402](https://github.com/hashicorp/vault/pull/31402)]
25+
* secrets/transit: add logging on both success and failure of key rotation [[GH-31420](https://github.com/hashicorp/vault/pull/31420)]
26+
* ui: Use the Helios Design System Code Block component for all readonly code editors and use its Code Editor component for all other code editors [[GH-30188](https://github.com/hashicorp/vault/pull/30188)]
27+
28+
BUG FIXES:
29+
30+
* core (enterprise): fix a bug where issuing a token in a namespace used root auth configuration instead of namespace auth configuration
31+
* core/metrics: Add service name prefix for core HA metrics to avoid duplicate, zero-value metrics. ([91e5f443](https://github.com/hashicorp/vault/commit/91e5f44315fb52c37b54e8b0eece1b4390665cc3))
32+
* core/seal: When Seal-HA is enabled, make it an error to persist the barrier
33+
keyring when not all seals are healthy. This prevents the possibility of
34+
failing to unseal when a different subset of seals are healthy than were
35+
healthy at last write. ([bbe64227](https://github.com/hashicorp/vault/commit/bbe64227c586cb34f73d9ae8025398f24aa7e12d))
36+
* raft (enterprise): auto-join will now work in regions that do not support dual-stack ([c66baf5e](https://github.com/hashicorp/vault/commit/c66baf5ee1ee9320daa6af5528cb2f250f2a0f3a))
37+
* raft/autopilot: Fixes an issue with enterprise redundancy zones where, if the leader was in a redundancy zone and that leader becomes unavailable, the node would become an unzoned voter. This can artificially inflate the required number of nodes for quorum, leading to a situation where the cluster cannot recover if another leader subsequently becomes unavailable. Vault will now keep an unavailable node in its last known redundancy zone as a non-voter. [[GH-31443](https://github.com/hashicorp/vault/pull/31443)]
38+
* replication (enterprise): Fix bug where group updates fail when processed on a
39+
standby node in a PR secondary cluster.
40+
* secrets-sync (enterprise): GCP locational KMS keys are no longer incorrectly removed when the location name is all lowercase.
41+
* secrets/database/postgresql: Support for multiline statements in the `rotation_statements` field. [[GH-31442](https://github.com/hashicorp/vault/pull/31442)]
42+
* ui: Fix DR secondary view from not loading/transitioning. [[GH-31478](https://github.com/hashicorp/vault/pull/31478)]
43+
644
## 1.20.2
745
### August 06, 2025
846

@@ -240,6 +278,45 @@ intermediate certificates. [[GH-30034](https://github.com/hashicorp/vault/pull/3
240278
* ui: MFA methods now display the namespace path instead of the namespace id. [[GH-29588](https://github.com/hashicorp/vault/pull/29588)]
241279
* ui: Redirect users authenticating with Vault as an OIDC provider to log in again when token expires. [[GH-30838](https://github.com/hashicorp/vault/pull/30838)]
242280

281+
## 1.19.9
282+
### August 28, 2025
283+
284+
**Enterprise LTS:** Vault Enterprise 1.19 is a [Long-Term Support (LTS)](https://developer.hashicorp.com/vault/docs/enterprise/lts) release.
285+
286+
SECURITY:
287+
288+
* core: Update github.com/hashicorp/go-getter to fix security vulnerability GHSA-wjrx-6529-hcj3.
289+
290+
CHANGES:
291+
292+
* core: Bump Go version to 1.24.6.
293+
* http: Add JSON configurable limits to HTTP handling for JSON payloads: `max_json_depth`, `max_json_string_value_length`, `max_json_object_entry_count`, `max_json_array_element_count`.
294+
* sdk: Upgrade to go-secure-stdlib/[email protected], which also bumps github.com/docker/docker to v28.3.3+incompatible
295+
* secrets/openldap: update plugin to v0.15.5
296+
297+
IMPROVEMENTS:
298+
299+
* auth/ldap: add explicit logging to rotations in ldap
300+
* core (enterprise): improve rotation manager logging to include specific lines for rotation success and failure
301+
* secrets/database: log password rotation success (info) and failure (error). Some relevant log lines have been updated to include "path" fields.
302+
* secrets/transit: add logging on both success and failure of key rotation
303+
* ui: Use the Helios Design System Code Block component for all readonly code editors and use its Code Editor component for all other code editors
304+
305+
BUG FIXES:
306+
307+
* core (enterprise): fix a bug where issuing a token in a namespace used root auth configuration instead of namespace auth configuration
308+
* core/metrics: Add service name prefix for core HA metrics to avoid duplicate, zero-value metrics.
309+
* core/seal: When Seal-HA is enabled, make it an error to persist the barrier
310+
keyring when not all seals are healthy. This prevents the possibility of
311+
failing to unseal when a different subset of seals are healthy than were
312+
healthy at last write.
313+
* raft (enterprise): auto-join will now work in regions that do not support dual-stack
314+
* raft/autopilot: Fixes an issue with enterprise redundancy zones where, if the leader was in a redundancy zone and that leader becomes unavailable, the node would become an unzoned voter. This can artificially inflate the required number of nodes for quorum, leading to a situation where the cluster cannot recover if another leader subsequently becomes unavailable. Vault will now keep an unavailable node in its last known redundancy zone as a non-voter.
315+
* replication (enterprise): Fix bug where group updates fail when processed on a
316+
standby node in a PR secondary cluster.
317+
* secrets-sync (enterprise): GCP locational KMS keys are no longer incorrectly removed when the location name is all lowercase.
318+
* secrets/database/postgresql: Support for multiline statements in the `rotation_statements` field.
319+
243320
## 1.19.8 Enterprise
244321
### August 06, 2025
245322

@@ -682,6 +759,26 @@ Unblocks customers that were stuck in a failing loop when attempting to rotate s
682759
* ui: No longer running decodeURIComponent on KVv2 list view allowing percent encoded data-octets in path name. [[GH-28698](https://github.com/hashicorp/vault/pull/28698)]
683760
* vault/diagnose: Fix time to expiration reporting within the TLS verification to not be a month off. [[GH-29128](https://github.com/hashicorp/vault/pull/29128)]
684761

762+
## 1.18.14
763+
### August 28, 2025
764+
765+
CHANGES:
766+
767+
* core: Bump Go version to 1.23.12.
768+
* http: Add JSON configurable limits to HTTP handling for JSON payloads: `max_json_depth`, `max_json_string_value_length`, `max_json_object_entry_count`, `max_json_array_element_count`.
769+
* secrets/openldap: update plugin to v0.14.7
770+
771+
BUG FIXES:
772+
773+
* core (enterprise): fix a bug where issuing a token in a namespace used root auth configuration instead of namespace auth configuration
774+
* core/metrics: Add service name prefix for core HA metrics to avoid duplicate, zero-value metrics.
775+
* core/seal: When Seal-HA is enabled, make it an error to persist the barrier
776+
keyring when not all seals are healthy. This prevents the possibility of
777+
failing to unseal when a different subset of seals are healthy than were
778+
healthy at last write.
779+
* raft/autopilot: Fixes an issue with enterprise redundancy zones where, if the leader was in a redundancy zone and that leader becomes unavailable, the node would become an unzoned voter. This can artificially inflate the required number of nodes for quorum, leading to a situation where the cluster cannot recover if another leader subsequently becomes unavailable. Vault will now keep an unavailable node in its last known redundancy zone as a non-voter.
780+
* secrets/database/postgresql: Support for multiline statements in the `rotation_statements` field.
781+
685782
## 1.18.13 Enterprise
686783
### August 06, 2025
687784

@@ -1846,6 +1943,24 @@ autopilot to fail to discover new server versions and so not trigger an upgrade.
18461943
* ui: fixed a bug where the replication pages did not update display when navigating between DR and performance [[GH-26325](https://github.com/hashicorp/vault/pull/26325)]
18471944
* ui: fixes undefined start time in filename for downloaded client count attribution csv [[GH-26485](https://github.com/hashicorp/vault/pull/26485)]
18481945

1946+
## 1.16.25
1947+
### August 28, 2025
1948+
1949+
**Enterprise LTS:** Vault Enterprise 1.16 is a [Long-Term Support (LTS)](https://developer.hashicorp.com/vault/docs/enterprise/lts) release.
1950+
1951+
CHANGES:
1952+
1953+
* core: Bump Go version to 1.23.12
1954+
* http: Add JSON configurable limits to HTTP handling for JSON payloads: `max_json_depth`, `max_json_string_value_length`, `max_json_object_entry_count`, `max_json_array_element_count`.
1955+
1956+
BUG FIXES:
1957+
1958+
* core (enterprise): fix a bug where issuing a token in a namespace used root auth configuration instead of namespace auth configuration
1959+
* core/seal: When Seal-HA is enabled, make it an error to persist the barrier
1960+
keyring when not all seals are healthy. This prevents the possibility of
1961+
failing to unseal when a different subset of seals are healthy than were
1962+
healthy at last write.
1963+
18491964
## 1.16.24 Enterprise
18501965
### August 06, 2025
18511966

0 commit comments

Comments
 (0)