Skip to content

Commit 19cbff8

Browse files
Merge branch 'main' into aws-auto-join-fixed-versions-update
2 parents 8ff5cb8 + ebfd2dc commit 19cbff8

File tree

17 files changed

+213
-30
lines changed

17 files changed

+213
-30
lines changed

content/terraform-docs-common/docs/cloud-docs/users-teams-organizations/users.mdx

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -127,8 +127,16 @@ To leave an organization, click the ellipses (**...**) next to the organization
127127

128128
Click **Password** in the sidebar to change your password. You cannot manage your HCP Terraform password directly if you linked your account to GitHub or HashiCorp Cloud Platform (HCP). Instead, manage your password through the linked service.
129129

130-
-> **Note:** Password management is not available if your Terraform Enterprise instance uses [SAML single sign on](/terraform/enterprise/saml/configuration).
131-
-> **Note:** Passwords must be at least 10 characters in length, and you can use any type of character. Password management is not available if your Terraform Enterprise instance uses [SAML single sign on](/terraform/enterprise/saml/configuration).
130+
<Note>
131+
Passwords must be at least eight characters long, and contain at least three of the following:
132+
133+
* Lowercase letters (a-z)
134+
* Uppercase letters (A-Z)
135+
* Numbers (0-9)
136+
* Special characters (!@#$%^&*)
137+
138+
Password management is not available if your Terraform Enterprise instance uses [SAML single sign on](/terraform/enterprise/saml/configuration).
139+
</Note>
132140

133141
### Two-factor authentication
134142

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
1-
<Note>
1+
<Warning>
22

3-
Policy checks are deprecated and will be permanently removed in August 2025. We recommend that you start using policy evaluations to avoid disruptions.
3+
Policy checks support Sentinel versions up to 0.40.x, and do not support newer Sentinel versions. We recommend using [policy evaluations](/terraform/enterprise/policy-enforcement/manage-policy-sets#policy-evaluations) to avoid disruptions.
44

5-
</Note>
5+
</Warning>
Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
1-
<Note>
1+
<Warning>
22

3-
Policy checks are deprecated and will be permanently removed in August 2025. We recommend that you start using policy evaluations to avoid disruptions.
3+
Policy checks support Sentinel versions up to 0.40.x, and do not support newer Sentinel versions. We recommend using [policy evaluations](/terraform/enterprise/policy-enforcement/manage-policy-sets#policy-evaluations) to avoid disruptions.
44

5-
</Note>
5+
</Warning>

content/vault/global/partials/important-changes/summary-tables/1_16.mdx

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,7 @@ Introduced | Recommendations | Edition | Change
1919
1.16.0 | **Yes** | All | [Secrets Sync cannot be activated from chroot namespace](/vault/docs/v1.16.x/updates/important-changes#secrets-sync-cannot-be-activated-from-chroot-namespace)
2020
1.16.0 | No | Enterprise | [Secrets Sync now requires setting a one-time flag before use](/vault/docs/v1.16.x/updates/important-changes#secrets-sync-now-requires-setting-a-one-time-flag-before-use)
2121
1.16.18 | No | All | [Strict validation for Azure auth login requests](/vault/docs/v1.16.x/updates/important-changes#strict-azure)
22+
1.16.25 | No | All | [JSON Payload Limits](/vault/docs/v1.16.x/updates/important-changes#json-limits)
2223

2324

2425
### Known issues

content/vault/global/partials/important-changes/summary-tables/1_18.mdx

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,7 @@ Introduced | Recommendations | Edition | Change
1919
1.18.0 | **Yes** | All | [Docker image no longer contains curl](/vault/docs/v1.18.x/updates/important-changes#docker-image-no-longer-contains-curl)
2020
1.18.2 | **Yes** | All | [Anonymous product usage metrics collection](/vault/docs/v1.18.x/updates/important-changes#product-usage-reporting)
2121
1.18.7 | No | All | [Strict validation for Azure auth login requests](/vault/docs/v1.18.x/updates/important-changes#azure-auth-plugin-requires-resource_group_name-vm_name-and-vmss_name-to-match-the-jwt-claims-on-login)
22+
1.18.14 | No | All | [JSON Payload Limits](/vault/docs/v1.18.x/updates/important-changes#json-limits)
2223

2324

2425
### Known issues

content/vault/global/partials/important-changes/summary-tables/1_19.mdx

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,7 @@ Introduced | Recommendations | Edition | Change
2222
1.19.0 | No | All | [RADIUS authentication is no longer case sensitive](/vault/docs/v1.19.x/updates/important-changes#case-sensitive)
2323
1.19.0 | No | All | [Transit support for Ed25519ph and Ed25519ctx signatures](/vault/docs/v1.19.x/updates/important-changes#ed25519)
2424
1.19.1 | **Yes** | All | [Strict validation for Azure auth login requests](/vault/docs/v1.19.x/updates/important-changes#strict-azure)
25+
1.19.9 | No | All | [JSON Payload Limits](/vault/docs/v1.19.x/updates/important-changes#json-limits)
2526

2627

2728
### Known issues

content/vault/global/partials/important-changes/summary-tables/1_20.mdx

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,8 @@ Introduced | Recommendations | Edition | Change
1414
---------- | --------------- | ---------- | ------
1515
1.20.0 | **Yes** | All | [Key pair authentication for Snowflake DB secrets engine](/vault/docs/v1.20.x/updates/important-changes#snowflake-keypair-auth)
1616
1.20.0 | **Yes** | All | [Audience warning for Kubernetes authentication roles](#k8-audience-warning)
17+
1.20.3 | No | All | [JSON Payload Limits](/vault/docs/v1.20.x/updates/important-changes#json-limits)
18+
1719

1820

1921
### Known issues

content/vault/v1.16.x/content/api-docs/index.mdx

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -316,4 +316,19 @@ A maximum request size of 32MB is imposed to prevent a denial of service attack
316316
with arbitrarily large requests; this can be tuned per `listener` block in
317317
Vault's server configuration file.
318318
319+
Vault also supports several listener options to enforce payload size limits for to incoming JSON
320+
request bodies.
321+
322+
You can configure the payload limits individullly on each listener and give
323+
administrators granular control over the:
324+
325+
- maximum allowed nesting depth of a JSON object or array (`max_json_depth`).
326+
- maximum allowed length for any single string value in the payload (`max_json_string_value_length`.)
327+
- maximum number of key-value pairs allowed in a single JSON object (`max_json_object_entry_count`).
328+
- maximum number of elements permitted in a single JSON array `max_json_array_element_count`.
329+
330+
The configuration defaults provide intentionally generous limits to accommodate
331+
a wide range of legitimate use cases while still guarding against most malicious
332+
or malformed requests.
333+
319334
[proxy]: /vault/docs/agent-and-proxy/proxy#listener-stanza

content/vault/v1.18.x/content/api-docs/index.mdx

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -340,4 +340,19 @@ A maximum request size of 32MB is imposed to prevent a denial of service attack
340340
with arbitrarily large requests; this can be tuned per `listener` block in
341341
Vault's server configuration file.
342342
343+
Vault also supports several listener options to enforce payload size limits for to incoming JSON
344+
request bodies.
345+
346+
You can configure the payload limits individullly on each listener and give
347+
administrators granular control over the:
348+
349+
- maximum allowed nesting depth of a JSON object or array (`max_json_depth`).
350+
- maximum allowed length for any single string value in the payload (`max_json_string_value_length`.)
351+
- maximum number of key-value pairs allowed in a single JSON object (`max_json_object_entry_count`).
352+
- maximum number of elements permitted in a single JSON array `max_json_array_element_count`.
353+
354+
The configuration defaults provide intentionally generous limits to accommodate
355+
a wide range of legitimate use cases while still guarding against most malicious
356+
or malformed requests.
357+
343358
[proxy]: /vault/docs/agent-and-proxy/proxy#listener-stanza

content/vault/v1.18.x/content/docs/upgrading/upgrade-to-1.16.x.mdx

Lines changed: 42 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
layout: docs
33
page_title: Upgrade to Vault 1.16.x - Guides
44
description: |-
5-
Deprecations, important or breaking changes, and remediation recommendations
6-
for anyone upgrading to 1.16.x from Vault 1.15.x.
5+
Deprecations, important or breaking changes, and remediation recommendations
6+
for anyone upgrading to 1.16.x from Vault 1.15.x.
77
---
88

99
# Overview
@@ -18,6 +18,31 @@ Vault 1.15. **Please read carefully**.
1818

1919
## Important changes
2020

21+
### JSON Payload Limits ((#json-limits))
22+
23+
| Change | Affected version | Vault edition |
24+
|--------------|----------------------------------|---------------|
25+
| New behavior | 1.16.25, 1.18.14, 1.19.9, 1.20.3 | All |
26+
| | | |
27+
| | | |
28+
29+
To guard against potential Denial-of-Service (DoS) attacks, Vault now supports
30+
several listener options to enforce payload size limits for to incoming JSON
31+
request bodies.
32+
33+
You can configure the payload limits individullly on each listener and give
34+
administrators granular control over the:
35+
36+
- maximum allowed nesting depth of a JSON object or array (`max_json_depth`).
37+
- maximum allowed length for any single string value in the payload (`max_json_string_value_length`.)
38+
- maximum number of key-value pairs allowed in a single JSON object (`max_json_object_entry_count`).
39+
- maximum number of elements permitted in a single JSON array `max_json_array_element_count`.
40+
41+
The configuration defaults provide intentionally generous limits to accommodate
42+
a wide range of legitimate use cases while still guarding against most malicious
43+
or malformed requests.
44+
45+
2146
### Strict validation for Azure auth login requests ((#strict-azure))
2247

2348
| Change | Affected version
@@ -54,9 +79,9 @@ more details on plugin environment variables.
5479

5580
<Highlight title="Avoid conflicts with containerized plugins">
5681

57-
Containerized plugins do not inherit system-defined environment variables. As
58-
a result, containerized plugins cannot have conflicts with Vault environment
59-
variables.
82+
Containerized plugins do not inherit system-defined environment variables. As
83+
a result, containerized plugins cannot have conflicts with Vault environment
84+
variables.
6085

6186
</Highlight>
6287

@@ -73,10 +98,10 @@ $ export VAULT_PLUGIN_USE_LEGACY_ENV_LAYERING=true
7398
Setting `VAULT_PLUGIN_USE_LEGACY_ENV_LAYERING` to `true` tells Vault to:
7499

75100
1. prioritize environment variables from the Vault server environment whenever
76-
the system detects a variable conflict.
101+
the system detects a variable conflict.
77102
1. report on plugin variable conflicts during the unseal process by printing
78-
warnings for plugins with conflicting environment variables or logging an
79-
informational entry when there are no conflicts.
103+
warnings for plugins with conflicting environment variables or logging an
104+
informational entry when there are no conflicts.
80105

81106
For example, assume you set `VAULT_PLUGIN_USE_LEGACY_ENV_LAYERING` to `true`
82107
and have an environment variable `SOURCE=parent`.
@@ -136,14 +161,14 @@ endpoint, will result in the following warning from Vault:
136161

137162
<CodeBlockConfig hideClipboard>
138163

139-
```shell-session
164+
```shell-session
140165
141-
WARNING! The following warnings were returned from Vault:
166+
WARNING! The following warnings were returned from Vault:
142167
143-
* default_report_months is deprecated: defaulting to billing start time
168+
* default_report_months is deprecated: defaulting to billing start time
144169
145170
146-
```
171+
```
147172

148173
</CodeBlockConfig>
149174

@@ -155,14 +180,15 @@ Attempts to set `current_billing_period` will result in the following warning fr
155180

156181
<CodeBlockConfig hideClipboard>
157182

158-
```shell-session
183+
```shell-session
159184
160-
WARNING! The following warnings were returned from Vault:
185+
WARNING! The following warnings were returned from Vault:
161186
162-
* current_billing_period is deprecated; unless otherwise specified, all requests will default to the current billing period
187+
* current_billing_period is deprecated; unless otherwise specified, all requests will default to the current billing
188+
period
163189
164190
165-
```
191+
```
166192

167193
</CodeBlockConfig>
168194

0 commit comments

Comments
 (0)