Enterprise LTS: Vault Enterprise 1.19 is a Long-Term Support (LTS) release.
SECURITY:
CHANGES:
removedcode query parameter. [GH-28991]haunhealthycode query parameter. [GH-28991]FEATURES:
force_identity_deduplication activation flag. [GH-29356]IMPROVEMENTS:
/sys/config/auditing/request-headers/user-agent endpoint. [GH-28596]enable_metadata_on_failures to add client cert metadata on login failures to audit log and response [GH-29044]enable_reauth_on_new_credentials is enabled. [GH-28126]enable_reauth_on_new_credentials, supporting re-authentication when receiving new credential on certain auto-auth types [GH-28126]pprof-dump-dir [GH-27033]removed_from_cluster field to sys/seal-status and vault status output to indicate whether the node has been removed from the HA cluster. [GH-28938]enable_post_unseal_trace and post_unseal_trace_directory config options to generate Go traces during the post-unseal step for debug purposes. [GH-28895]/sys/config/state/sanitized output. [GH-29485]path event metadata field when authorizing a client's subscribe capability for consuming an event, instead of requiring data_path to be present in the event metadata.always_enforce_err within leaf_not_after_behavior to force the error in all circumstances such as CA issuance and ACME requests if requested TTL values are beyond the issuer's NotAfter. [GH-28907]serial_number_source option to PKI roles to control the source for the subject serial number. [GH-29369]BUG FIXES:
template_config is set in one of the config files. [GH-29680]allow_empty_principals in the read role api when key_type is "ca" [GH-28901]connection_url to fix database connection updates (i.e. editing connection config, deleting roles) failing when urls include template variables. [GH-29114]SECURITY:
CHANGES:
removedcode query parameter. [GH-28991]haunhealthycode query parameter. [GH-28991]FEATURES:
force_identity_deduplication activation flag. [GH-29356]IMPROVEMENTS:
/sys/config/auditing/request-headers/user-agent endpoint. [GH-28596]enable_metadata_on_failures to add client cert metadata on login failures to audit log and response [GH-29044]enable_reauth_on_new_credentials is enabled. [GH-28126]enable_reauth_on_new_credentials, supporting re-authentication when receiving new credential on certain auto-auth types [GH-28126]pprof-dump-dir [GH-27033]removed_from_cluster field to sys/seal-status and vault status output to indicate whether the node has been removed from the HA cluster. [GH-28938]enable_post_unseal_trace and post_unseal_trace_directory config options to generate Go traces during the post-unseal step for debug purposes. [GH-28895]/sys/config/state/sanitized output. [GH-29485]path event metadata field when authorizing a client's subscribe capability for consuming an event, instead of requiring data_path to be present in the event metadata.always_enforce_err within leaf_not_after_behavior to force the error in all circumstances such as CA issuance and ACME requests if requested TTL values are beyond the issuer's NotAfter. [GH-28907]serial_number_source option to PKI roles to control the source for the subject serial number. [GH-29369]BUG FIXES:
allow_empty_principals in the read role api when key_type is "ca" [GH-28901]connection_url to fix database connection updates (i.e. editing connection config, deleting roles) failing when urls include template variables. [GH-29114]CHANGES:
IMPROVEMENTS:
path event metadata field when authorizing a client's subscribe capability for consuming an event, instead of requiring data_path to be present in the event metadata.BUG FIXES:
CHANGES:
IMPROVEMENTS:
enable_post_unseal_trace and post_unseal_trace_directory config options to generate Go traces during the post-unseal step for debug purposes. [GH-28895]BUG FIXES:
connection_url to fix database connection updates (i.e. editing connection config, deleting roles) failing when urls include template variables. [GH-29114]SECURITY:
CHANGES:
FEATURES:
IMPROVEMENTS:
always_enforce_err within leaf_not_after_behavior to force the error in all circumstances such as CA issuance and ACME requests if requested TTL values are beyond the issuer's NotAfter. [GH-28907]BUG FIXES:
allow_empty_principals in the read role api when key_type is "ca" [GH-28901]CHANGES:
IMPROVEMENTS:
BUG FIXES:
CHANGES:
sudo ACL capability. [GH-27846]start_time and end_time. [GH-28064]-dev-three-node and -dev-four-cluster CLI options have been removed. [GH-27578]control group: could not find token, and control group: token is not a valid control group token.allow_empty_principals to allow keys or certs to apply to any user/principal. [GH-28466]FEATURES:
IMPROVEMENTS:
X-Vault-Namespace header or within the path) and all child namespaces. [GH-27846]/sys/internal/counters/activity will now include a warning if the specified usage period contains estimated client counts. [GH-28068]--dev-no-kv flag to prevent auto mounting a key-value secret backend when running a dev server [GH-16974]vault operator usage will now include a warning if the specified usage period contains estimated client counts. [GH-28068]disable_host_initial_lookup option to backend, allowing the disabling of initial host lookup. [GH-9733]service_meta config field. [GH-11084]GetMSIEndpoint, which supports more than just the metadata service. [GH-10624]vault/settings/secrets/configure/<backend> to vault/secrets/<backend>/configuration/edit [GH-27918]current_billing_period from dashboard activity log request [GH-27559]BUG FIXES:
max_lease_ttl tune value for tokens created via auth/token/create. [GH-28498]-address not being set when it is. [GH-27265]vault hcp connect where HCP resources with uppercase letters were inaccessible when entering the correct project name. [GH-27694]vault secrets move and vault auth move command will no longer attempt to write to storage on performance standby nodes. [GH-28059]sys/internal/ui/mounts for a mount prefixed by a namespace path when path filters are configured. [GH-27939]proxy_protocol_behavior with deny_unauthorized,
which causes the Vault TCP listener to close after receiving an untrusted upstream proxy connection. [GH-27589]allow_forwarding_via_header to be configured on the cluster. [GH-27891]//) in the mount path, when the token should otherwise have access.app_name and installation_id are setdefault_role input missing from oidc auth method configuration form [GH-28539]CHANGES:
allow_empty_principals to allow keys or certs to apply to any user/principal. [GH-28466]IMPROVEMENTS:
current_billing_period from dashboard activity log request [GH-27559]BUG FIXES:
app_name and installation_id are setCHANGES:
sudo ACL capability. [GH-27846]start_time and end_time. [GH-28064]-dev-three-node and -dev-four-cluster CLI options have been removed. [GH-27578]control group: could not find token, and control group: token is not a valid control group token.FEATURES:
IMPROVEMENTS:
X-Vault-Namespace header or within the path) and all child namespaces. [GH-27846]/sys/internal/counters/activity will now include a warning if the specified usage period contains estimated client counts. [GH-28068]--dev-no-kv flag to prevent auto mounting a key-value secret backend when running a dev server [GH-16974]vault operator usage will now include a warning if the specified usage period contains estimated client counts. [GH-28068]disable_host_initial_lookup option to backend, allowing the disabling of initial host lookup. [GH-9733]service_meta config field. [GH-11084]GetMSIEndpoint, which supports more than just the metadata service. [GH-10624]vault/settings/secrets/configure/<backend> to vault/secrets/<backend>/configuration/edit [GH-27918]current_billing_period from dashboard activity log request [GH-27559]BUG FIXES:
-address not being set when it is. [GH-27265]vault hcp connect where HCP resources with uppercase letters were inaccessible when entering the correct project name. [GH-27694]vault secrets move and vault auth move command will no longer attempt to write to storage on performance standby nodes. [GH-28059]sys/internal/ui/mounts for a mount prefixed by a namespace path when path filters are configured. [GH-27939]proxy_protocol_behavior with deny_unauthorized,
which causes the Vault TCP listener to close after receiving an untrusted upstream proxy connection. [GH-27589]allow_forwarding_via_header to be configured on the cluster. [GH-27891]app_name and installation_id are setSECURITY:
core/audit: fix regression where client tokens and token accessors were being displayed in the audit log in plaintext HCSEC-2024-18
BUG FIXES:
CHANGES:
IMPROVEMENTS:
/sys/internal/counters/activity will now include a warning if the specified usage period contains estimated client counts. [GH-28068]vault operator usage will now include a warning if the specified usage period contains estimated client counts. [GH-28068]BUG FIXES:
vault secrets move and vault auth move command will no longer attempt to write to storage on performance standby nodes. [GH-28059]CHANGES:
IMPROVEMENTS:
BUG FIXES:
sys/internal/ui/mounts for a mount prefixed by a namespace path when path filters are configured. [GH-27939]allow_forwarding_via_header to be configured on the cluster. [GH-27891]CHANGES:
FEATURES:
BUG FIXES:
vault hcp connect where HCP resources with uppercase letters were inaccessible when entering the correct project name. [GH-27694]proxy_protocol_behavior with deny_unauthorized,
which causes the Vault TCP listener to close after receiving an untrusted upstream proxy connection. [GH-27589]CHANGES:
IMPROVEMENTS:
BUG FIXES:
CHANGES:
enable_multiseal in configuration.namespace label on the vault.kmse.key.count metric.FEATURES:
IMPROVEMENTS:
lease_renewal_threshold, that controls the refresh rate of non-renewable leases in Agent's template engine. [GH-25212]api module. [GH-25744]static_secret_token_capability_refresh_behavior, to control the behavior when the capability refresh request receives an error from Vault.sys/internal/ui/mounts endpoint for auth mount configuration view [GH-26663]password_hash field. [GH-26577]DEPRECATIONS:
BUG FIXES:
vault.namespace no longer gets incorrectly overridden by auto_auth.namespace, if set [GH-26427]/sys/config/auditing)
will now force invalidation and be reloaded from storage when data is replicated
to other nodes.administrative_namespace_path config will now be canonicalized.redact_version listener parameter being ignored for some OpenAPI related endpoints. [GH-26607]chroot_namespace is active, Vault will no longer report that the configuration is invalid when Vault is sealedThis release is created to share the Vault Enterprise changelog and notify consumers of availability. The attached source and assets do not include Vault Enterprise code and should not be used in place of official Docker images or binaries.
CHANGES:
IMPROVEMENTS:
BUG FIXES:
This release is created to share the Vault Enterprise changelog and notify consumers of availability. The attached source and assets do not include Vault Enterprise code and should not be used in place of official Docker images or binaries.
CHANGES:
IMPROVEMENTS:
BUG FIXES:
CHANGES:
IMPROVEMENTS:
BUG FIXES:
redact_version listener parameter being ignored for some OpenAPI related endpoints. [GH-26607]