question-mark
Stuck on an issue?

Lightrun Answers was designed to reduce the constant googling that comes with debugging 3rd party libraries. It collects links to all the places you might be looking at while hunting down a tough bug.

And, if you’re still stuck at the end, we’re happy to hop on a call to see how we can help out.

It looks like there are a couple of additions to account for.

https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#070-early-access-final-release-march-21th-2017

0.7.0 (Early Access; final release March 21th, 2017)

SECURITY:

  • Common name not being validated when exclude_cn_from_sans option used in pki backend: When using a role in the pki backend that specified the exclude_cn_from_sans option, the common name would not then be properly validated against the role’s constraints. This has been fixed. We recommend any users of this feature to upgrade to 0.7 as soon as feasible.

DEPRECATIONS/CHANGES:

  • List Operations Always Use Trailing Slash: Any list operation, whether via the GET or LIST HTTP verb, will now internally canonicalize the path to have a trailing slash. This makes policy writing more predictable, as it means clients will no longer work or fail based on which client they’re using or which HTTP verb they’re using. However, it also means that policies allowing list capability must be carefully checked to ensure that they contain a trailing slash; some policies may need to be split into multiple stanzas to accommodate.
  • PKI Defaults to Unleased Certificates: When issuing certificates from the PKI backend, by default, no leases will be issued. If you want to manually revoke a certificate, its serial number can be used with the pki/revoke endpoint. Issuing leases is still possible by enabling the generate_lease toggle in PKI role entries (this will default to true for upgrades, to keep existing behavior), which will allow using lease IDs to revoke certificates. For installations issuing large numbers of certificates (tens to hundreds of thousands, or millions), this will significantly improve Vault startup time since leases associated with these certificates will not have to be loaded; however note that it also means that revocation of a token used to issue certificates will no longer add these certificates to a CRL. If this behavior is desired or needed, consider keeping leases enabled and ensuring lifetimes are reasonable, and issue long-lived certificates via a different role with leases disabled.

FEATURES:

  • Replication (Enterprise): Vault Enterprise now has support for creating a multi-datacenter replication set between clusters. The current replication offering is based on an asynchronous primary/secondary (1:N) model that replicates static data while keeping dynamic data (leases, tokens) cluster-local, focusing on horizontal scaling for high-throughput and high-fanout deployments.
  • Response Wrapping & Replication in the Vault Enterprise UI: Vault Enterprise UI now supports looking up and rotating response wrapping tokens, as well as creating tokens with arbitrary values inside. It also now supports replication functionality, enabling the configuration of a replication set in the UI.
  • Expanded Access Control Policies: Access control policies can now specify allowed and denied parameters – and, optionally, their values – to control what a client can and cannot submit during an API call. Policies can also specify minimum/maximum response wrapping TTLs to both enforce the use of response wrapping and control the duration of resultant wrapping tokens. See the policies concepts page for more information.
  • SSH Backend As Certificate Authority: The SSH backend can now be configured to sign host and user certificates. Each mount of the backend acts as an independent signing authority. The CA key pair can be configured for each mount and the public key is accessible via an unauthenticated API call; additionally, the backend can generate a public/private key pair for you. We recommend using separate mounts for signing host and user certificates.

IMPROVEMENTS:

  • api/request: Passing username and password information in API request [GH-2469]
  • audit: Logging the token’s use count with authentication response and logging the remaining uses of the client token with request [GH-2437]
  • auth/approle: Support for restricting the number of uses on the tokens issued [GH-2435]
  • auth/aws-ec2: AWS EC2 auth backend now supports constraints for VPC ID, Subnet ID and Region [GH-2407]
  • auth/ldap: Use the value of the LOGNAME or USER env vars for the username if not explicitly set on the command line when authenticating [GH-2154]
  • audit: Support adding a configurable prefix (such as @cee) before each line [GH-2359]
  • core: Canonicalize list operations to use a trailing slash [GH-2390]
  • core: Add option to disable caching on a per-mount level [GH-2455]
  • core: Add ability to require valid client certs in listener config [GH-2457]
  • physical/dynamodb: Implement a session timeout to avoid having to use recovery mode in the case of an unclean shutdown, which makes HA much safer [GH-2141]
  • secret/pki: O (Organization) values can now be set to role-defined values for issued/signed certificates [GH-2369]
  • secret/pki: Certificates issued/signed from PKI backend do not generate leases by default [GH-2403]
  • secret/pki: When using DER format, still return the private key type [GH-2405]
  • secret/pki: Add an intermediate to the CA chain even if it lacks an authority key ID [GH-2465]
  • secret/pki: Add role option to use CSR SANs [GH-2489]
  • secret/ssh: SSH backend as CA to sign user and host certificates [GH-2208]
  • secret/ssh: Support reading of SSH CA public key from config/ca endpoint and also return it when CA key pair is generated [GH-2483]

BUG FIXES:

  • audit: When auditing headers use case-insensitive comparisons [GH-2362]
  • auth/aws-ec2: Return role period in seconds and not nanoseconds [GH-2374]
  • auth/okta: Fix panic if user had no local groups and/or policies set [GH-2367]
  • command/server: Fix parsing of redirect address when port is not mentioned [GH-2354]
  • physical/postgresql: Fix listing returning incorrect results if there were multiple levels of children [GH-2393]

Issue Analytics

  • State:closed
  • Created 7 years ago
  • Comments:10 (5 by maintainers)

github_iconTop GitHub Comments

1reaction
rajanadarcommented, Aug 17, 2018

@arledesma @dwoldo @dimula @CumpsD @pvandervelde @SeriousM

Thanks for your patience. The latest version of VaultSharp is out with all the goodness of Vault 0.10.x. Do check it out.

Read more comments on GitHub >

github_iconTop Results From Across the Web

Update 0.7.0 | Minecraft Bedrock Wiki - Fandom
Update 0.7.0 was an update for Minecraft, released on June 6th, 2013 for iOS and Android devices. Online Multiplayer via Pocket Realms New...
Read more >
Upgrading to Vault 0.7.0 - Guides
This page contains the list of deprecations and important or breaking changes for Vault 0.7.0 compared to the most recent release. Please read...
Read more >
Installing Neovim 0.7 on Ubuntu?
Just curious why I was able to update to 0.7.0 with Brew on mac? are they separate repos? – Vinn. May 11, 2022...
Read more >
Minecraft Pocket Edition 0.7.0 Update Review [Gameplay - Bugs
Overall, this is a great update, and when realms multiplayer come in in ... Minecraft Pocket Edition 0.7.0 Update Review [Gameplay - Bugs ......
Read more >
0.7.0 - The forever develop release
From now on, MultiMC will always use the develop channel. Some selected changes. Remove concept of switching update channels; Improve path ...
Read more >

github_iconTop Related Medium Post

No results found

github_iconTop Related StackOverflow Question

No results found

github_iconTroubleshoot Live Code

Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start Free

github_iconTop Related Reddit Thread

No results found

github_iconTop Related Hackernoon Post

No results found

github_iconTop Related Tweet

No results found

github_iconTop Related Dev.to Post

No results found

github_iconTop Related Hashnode Post

No results found