Skip to content

Commit d39e743

Browse files
github-actions[bot]schavisShaelielliesternerakshya96
authored
[PUBLISH] vault/1.21.x (#1077)
* Create 1.21 docset * Rename 1.21 folder to mark it as an rc docset * Add documentation for new secret list parameter * Add role count product usage metrics * Add docs for client first used time * Add api-docs field description and docs feature explanation * Change description for token creation time * Add docs for AES-CBC * Add api docs for derivedkeys * Add field documentation and info * Fix LDAP docs referencing Azure by mistake * Add reference * Add more info about setting up CMEK for GCP sync * Add section to api docs on batch-fetch certificates. * VAULT-37634, VAULT-36946: Census metrics for recover capability and auto snapshot config counts (#864) * VAULT-37633: Database static role recover (#884) * VAULT-38654: Docs for autoloading snapshots (#890) * Update gcpsm.mdx * Add docs & api-docs for Azure Secrets Static Roles * VAULT-37037 docs for Vault proxy update (#923) * Add docs for KV v2 Version Attribution * [VAULT-39627] Add GUI steps for Secret Engine mount tune. * Prep update docs for 1.21 * Add missing version table * Add SPIFFE auth plugin docs * add docs to Setup login MFA * cumulative api docs * add missing partial * Correct partial paths for summary tables * Add metrics docs changes * add documentation for oracle * add TOTP support to login MFA types * create a partial alert for tech preview, add another sample request and response * Add missing important change info and remove empty release notes * [VAULT] GA to RC sync 20251002 (#1052) * Fix endpoint_url description within https_spiffe_bundle section in API docs * Clarify only one enforcement can be configured for web UI self-enroll * Update metadata docs * Final pre-publication sync (#1076) * Fix important changes pages --------- Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com> Co-authored-by: Eleonore Carpentier <shaeli@github.com> Co-authored-by: Ellie Sterner <ellie.sterner@hashicorp.com> Co-authored-by: akshya96 <araghavan@hashicorp.com> Co-authored-by: robmonte <17119716+robmonte@users.noreply.github.com> Co-authored-by: akshya96 <87045294+akshya96@users.noreply.github.com> Co-authored-by: rculpepper <rculpepper@hashicorp.com> Co-authored-by: Kit Haines <khaines@mit.edu> Co-authored-by: Rachel Culpepper <84159930+rculpepper@users.noreply.github.com> Co-authored-by: miagilepner <miagilepner@gmail.com> Co-authored-by: Milena Zlaticanin <Milena.Zlaticanin@ibm.com> Co-authored-by: Zlaticanin <60530402+Zlaticanin@users.noreply.github.com> Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com> Co-authored-by: Yoko Hyakuna <yoko.hyakuna1@ibm.com> Co-authored-by: Mike Palmiotto <mike.palmiotto@hashicorp.com> Co-authored-by: Jaired Jawed <jaired.jawed@hashicorp.com> Co-authored-by: Jaired Jawed <me@jairedjawed.com> Co-authored-by: Vinay Gopalan <vinay@hashicorp.com> Co-authored-by: vinay-gopalan <86625824+vinay-gopalan@users.noreply.github.com> Co-authored-by: Shannon Roberts <shannon.roberts@hashicorp.com> Co-authored-by: Steven Clark <steven.clark@hashicorp.com> Co-authored-by: Shannon Roberts (Beagin) <beagins@users.noreply.github.com> Co-authored-by: claire bontempo <cbontempo@hashicorp.com> Co-authored-by: Jenny Deng <jenny.deng@hashicorp.com> Co-authored-by: Kuba Wieczorek <kuba.wieczorek@hashicorp.com> Co-authored-by: Guilherme Santos <157053549+gsantos-hc@users.noreply.github.com> Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com> Co-authored-by: divyaac <divya.chandrasekaran@hashicorp.com>
1 parent 4e16eac commit d39e743

File tree

1,817 files changed

+162354
-12
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,817 files changed

+162354
-12
lines changed

content/vault/global/partials/important-changes/summary-tables/1_20.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,6 @@ Found | Fixed | Workaround | Edition | Issue
3030
1.20.0 | 1.20.1 | **Yes** | All | [GUI navigation error for KV v2 secret paths containing underscores](/vault/docs/v1.20.x/updates/important-changes#ui-kvv2-underscore-secrets)
3131
1.18.4 | No | **Yes** | All | [Failing credential refresh for Snowflake DB secrets engine key pair authentication](/vault/docs/v1.20.x/updates/important-changes#snowflake-keypair-refresh)
3232
1.20.0 | 1.20.1 | **Yes** | All | [Duplicate LDAP password rotations on standby node check-in](/vault/docs/v1.20.x/updates/important-changes#ldap-checkin)
33-
1.19.0 | No | No | All | [Writing configuration to local auth mount (ldap, aws, gcp, azure) ignores local flag](/vault/docs/v1.20.x/updates/important-changes#local-auth-known-issue)
34-
1.19.0 | No | **Yes** | Enterprise | [Missed events with multiple event clients](/vault/docs/v1.20.x/updates/important-changes#missed-events)
33+
1.20.0 | No | No | All | [Writing configuration to local auth mount (ldap, aws, gcp, azure) ignores local flag](/vault/docs/v1.20.x/updates/important-changes#local-auth-known-issue)
34+
1.20.0 | No | **Yes** | Enterprise | [Missed events with multiple event clients](/vault/docs/v1.20.x/updates/important-changes#missed-events)
3535
1.20.0 | No | No | Enterprise | [Full seal rewraps occur on DR/PR failover with multi-seal enabled](/vault/docs/v1.20.x/updates/important-changes#multi-seal-rewrap)
Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
### Breaking changes
2+
3+
Introduced | Recommendations | Edition | Change
4+
---------- | --------------- | ---------- | ------
5+
1.21.0 | **Yes** | All | [Audiences required for Kubernetes authentication roles](/vault/docs/v1.21.x/updates/important-changes#k8-audience-required)
6+
7+
8+
### New behavior
9+
10+
None.
11+
12+
### Known issues
13+
14+
Found | Fixed | Workaround | Edition | Issue
15+
------ |--------| ---------- | ---------- | -----
16+
1.21.0 | No | **Yes** | Enterprise | [Missed events with multiple event clients](/vault/docs/v1.21.x/updates/important-changes#missed-events)

content/vault/v1.18.x/content/docs/auth/login-mfa/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -254,7 +254,7 @@ $ vault write identity/mfa/method/totp \
254254
digits=6
255255
```
256256

257-
Using the TOTP `method_id` and an `entity_id` from after a sucessful MFA login. Use these to generate a QR code.
257+
Vault generates an `entity_id` for users after a successful login. Use the TOTP `method_id` and the `entity_id` of the target user to generate a QR code.
258258

259259
```shell-session
260260
$ vault write -field=barcode \

content/vault/v1.19.x/content/docs/auth/ldap.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -230,7 +230,7 @@ of the root credential until the field is reset to `false`. If you use
230230
`rotation_period`, setting `disable_automated_rotation` also resets the credential
231231
TTL.
232232

233-
For more details on rotating root credentials in the Azure plugin, refer to the
233+
For more details on rotating root credentials in the LDAP plugin, refer to the
234234
[Root credential rotation](/vault/api-docs/auth/ldap#rotate-root) API docs.
235235

236236
@include 'rotation-manager-logging.mdx'

content/vault/v1.19.x/content/docs/auth/login-mfa/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -258,7 +258,7 @@ $ vault write identity/mfa/method/totp \
258258
digits=6
259259
```
260260

261-
Using the TOTP `method_id` and an `entity_id` from after a sucessful MFA login. Use these to generate a QR code.
261+
Vault generates an `entity_id` for users after a successful login. Use the TOTP `method_id` and the `entity_id` of the target user to generate a QR code.
262262

263263
```shell-session
264264
$ vault write -field=barcode \

content/vault/v1.19.x/content/docs/secrets/ldap.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -155,7 +155,7 @@ of the root credential until the field is reset to `false`. If you use
155155
`rotation_period`, setting `disable_automated_rotation` also resets the credential
156156
TTL.
157157

158-
For more details on rotating root credentials in the Azure plugin, refer to the
158+
For more details on rotating root credentials in the LDAP plugin, refer to the
159159
[Root credential rotation](/vault/api-docs/secret/ldap#rotate-root) API docs.
160160

161161
@include 'rotation-manager-logging.mdx'

content/vault/v1.20.x/content/api-docs/system/secrets-sync.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -403,7 +403,7 @@ This endpoint creates a destination to synchronize secrets with the GCP Secret M
403403
store replicated secrets. Note that secrets remain globally readable regardless of the selected locations.
404404

405405
- `locational_kms_keys` `(map<string|string>: nil)` - A map of location names to KMS key names to leverage customer-managed encryption keys for
406-
encryption at rest. Each pair follows the format `location_name=encryption_key_resource_ID`. Refer to the
406+
encryption at rest. Each pair follows the format `location_name=encryption_key_resource_name`. Refer to the
407407
[sample payloads](#sample-payloads) for more details.
408408

409409
- `secret_name_template` `(string: "")` - Template to use when generating the secret names on the external system.

content/vault/v1.20.x/content/docs/auth/ldap.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -240,7 +240,7 @@ of the root credential until the field is reset to `false`. If you use
240240
`rotation_period`, setting `disable_automated_rotation` also resets the credential
241241
TTL.
242242

243-
For more details on rotating root credentials in the Azure plugin, refer to the
243+
For more details on rotating root credentials in the LDAP plugin, refer to the
244244
[Root credential rotation](/vault/api-docs/auth/ldap#rotate-root) API docs.
245245

246246
@include 'rotation-manager-logging.mdx'

content/vault/v1.20.x/content/docs/auth/login-mfa/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -258,7 +258,7 @@ $ vault write identity/mfa/method/totp \
258258
digits=6
259259
```
260260

261-
Using the TOTP `method_id` and an `entity_id` from after a sucessful MFA login. Use these to generate a QR code.
261+
Vault generates an `entity_id` for users after a successful login. Use the TOTP `method_id` and the `entity_id` of the target user to generate a QR code.
262262

263263
```shell-session
264264
$ vault write -field=barcode \

content/vault/v1.20.x/content/docs/license/product-usage-reporting.mdx

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -169,9 +169,15 @@ All of these metrics are numerical, and contain no sensitive values or additiona
169169
| `vault.secret.engine.activedirectory.count` | The total number of Active Directory secret engines in Vault. |
170170
| `vault.secret.engine.alicloud.count` | The total number of Alicloud secret engines in Vault. |
171171
| `vault.secret.engine.aws.count` | The total number of AWS secret engines in Vault. |
172+
| `vault.secret.engine.aws.dynamic.role.count` | The total number of AWS dynamic roles in Vault. |
173+
| `vault.secret.engine.aws.static.role.count` | The total number of AWS static roles in Vault. |
172174
| `vault.secret.engine.azure.count` | The total number of Azure secret engines in Vault. |
175+
| `vault.secret.engine.azure.dynamic.role.count` | The total number of Azure dynamic roles in Vault. |
173176
| `vault.secret.engine.consul.count` | The total number of Consul secret engines in Vault. |
174177
| `vault.secret.engine.gcp.count` | The total number of GCP secret engines in Vault. |
178+
| `vault.secret.engine.gcp.impersonated.account.count` | The total number of GCP impersonated accounts in Vault. |
179+
| `vault.secret.engine.gcp.roleset.count` | The total number of GCP rolesets in Vault. |
180+
| `vault.secret.engine.gcp.static.role.count` | The total number of GCP static roles in Vault. |
175181
| `vault.secret.engine.gcpkms.count` | The total number of GCPKMS secret engines in Vault. |
176182
| `vault.secret.engine.kubernetes.count` | The total number of Kubernetes secret engines in Vault. |
177183
| `vault.secret.engine.cassandra.count` | The total number of Cassandra secret engines in Vault. |
@@ -181,11 +187,15 @@ All of these metrics are numerical, and contain no sensitive values or additiona
181187
| `vault.secret.engine.mongodb.count` | The total number of MongoDB secret engines in Vault. |
182188
| `vault.secret.engine.mongodbatlas.count` | The total number of MongoDBAtlas secret engines in Vault. |
183189
| `vault.secret.engine.mssql.count` | The total number of MSSql secret engines in Vault. |
184-
| `vault.secret.engine.mysql.count` | The total number of MySQL secret engines in Vault. |
190+
| `vault.secret.engine.mysql.count` | The total number of MySQL secret engines in Vault. |
185191
| `vault.secret.engine.postgresql.count` | The total number of Postgresql secret engines in Vault. |
186192
| `vault.secret.engine.nomad.count` | The total number of Nomad secret engines in Vault. |
187193
| `vault.secret.engine.ldap.count` | The total number of LDAP secret engines in Vault. |
194+
| `vault.secret.engine.ldap.dynamic.role.count` | The total number of LDAP dynamic roles in Vault. |
195+
| `vault.secret.engine.ldap.static.role.count` | The total number of LDAP static roles in Vault. |
188196
| `vault.secret.engine.openldap.count` | The total number of OpenLDAP secret engines in Vault. |
197+
| `vault.secret.engine.openldap.dynamic.role.count` | The total number of OpenLDAP dynamic roles in Vault. |
198+
| `vault.secret.engine.openldap.static.role.count` | The total number of OpenLDAP static roles in Vault. |
189199
| `vault.secret.engine.pki.count` | The total number of PKI secret engines in Vault. |
190200
| `vault.secret.engine.rabbitmq.count` | The total number of RabbitMQ secret engines in Vault. |
191201
| `vault.secret.engine.ssh.count` | The total number of SSH secret engines in Vault. |
@@ -194,6 +204,8 @@ All of these metrics are numerical, and contain no sensitive values or additiona
194204
| `vault.secret.engine.transform.count` | The total number of Transform secret engines in Vault. |
195205
| `vault.secret.engine.transit.count` | The total number of Transit secret engines in Vault. |
196206
| `vault.secret.engine.database.count` | The total number of Database secret engines in Vault. |
207+
| `vault.secret.engine.database.dynamic.role.count` | The total number of Database dynamic roles in Vault. |
208+
| `vault.secret.engine.database.static.role.count` | The total number of Database static roles in Vault. |
197209
| `vault.secret.engine.plugin.count` | The total number of custom plugin secret engines in Vault. |
198210
| `vault.secretsync.sources.count` | The total number of secret sources configured for secret sync. |
199211
| `vault.secretsync.destinations.count` | The total number of secret destinations configured for secret sync. |

0 commit comments

Comments
 (0)