8000 Bump the all group across 1 directory with 3 updates by dependabot[bot] · Pull Request #1608 · lingrino/vaku · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

Bump the all group across 1 directory with 3 updates #1608

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 4 commits into from
Jun 16, 2025

Conversation

dependabot[bot]
Copy link
Contributor
@dependabot dependabot bot commented on behalf of github Jun 9, 2025

Bumps the all group with 3 updates in the / directory: github.com/hashicorp/vault/api, github.com/hashicorp/vault/sdk and golang.org/x/sync.

Updates github.com/hashicorp/vault/api from 1.16.0 to 1.20.0

Release notes

Sourced from github.com/hashicorp/vault/api's releases.

v1.19.5

1.19.5

May 30, 2025

Enterprise LTS: Vault Enterprise 1.19 is a Long-Term Support (LTS) release.

CHANGES:

  • database/snowflake: Update plugin to v0.13.1 [GH-30775]

IMPROVEMENTS:

  • plugins: Support registration of CE plugins with extracted artifact directory. [GH-30673]

BUG FIXES:

  • ui: Fix broken link to Hashicorp Vault developer site in the Web REPL help. [GH-30670]

v1.19.4

1.19.4

May 16, 2025

CHANGES:

  • Update vault-plugin-auth-cf to v0.20.1 [GH-30586]
  • auth/azure: Update plugin to v0.20.4 [GH-30543]
  • core: Bump Go version to 1.24.3.

IMPROVEMENTS:

  • Namespaces (enterprise): allow a root token to relock a namespace
  • core (enterprise): update to FIPS 140-3 cryptographic module in the FIPS builds.
  • core: Updated code and documentation to support FIPS 140-3 compliant algorithms. [GH-30576]
  • core: support for X25519MLKEM768 (post quantum key agreement) in the Go TLS stack. [GH-30603]
  • ui: Replaces all instances of the deprecated event.keyCode with event.key [GH-30493]

BUG FIXES:

  • core (enterprise): fix a bug where plugin automated root rotations would stop after seal/unseal operations
  • plugins (enterprise): Fix an issue where Enterprise plugins can't run on a standby node when it becomes active because standby nodes don't extract the artifact when the plugin is registered. Remove extracting from Vault and require the operator to place the extracted artifact in the plugin directory before registration.

v1.19.3

1.19.3

April 30, 2025

CHANGES:

... (truncated)

Changelog

Sourced from github.com/hashicorp/vault/api's changelog.

Previous versions

1.19.5

May 30, 2025

Enterprise LTS: Vault Enterprise 1.19 is a Long-Term Support (LTS) release.

CHANGES:

  • database/snowflake: Update plugin to v0.13.1 [GH-30775]

IMPROVEMENTS:

  • plugins: Support registration of CE plugins with extracted artifact directory. [GH-30673]

BUG FIXES:

  • ui: Fix broken link to Hashicorp Vault developer site in the Web REPL help. [GH-30670]

1.19.4

May 16, 2025

Enterprise LTS: Vault Enterprise 1.19 is a Long-Term Support (LTS) release.

CHANGES:

  • Update vault-plugin-auth-cf to v0.20.1 [GH-30586]
  • auth/azure: Update plugin to v0.20.4 [GH-30543]
  • core: Bump Go version to 1.24.3.

IMPROVEMENTS:

  • Namespaces (enterprise): allow a root token to relock a namespace
  • core (enterprise): update to FIPS 140-3 cryptographic module in the FIPS builds.
  • core: Updated code and documentation to support FIPS 140-3 compliant algorithms. [GH-30576]
  • core: support for X25519MLKEM768 (post quantum key agreement) in the Go TLS stack. [GH-30603]
  • ui: Replaces all instances of the deprecated event.keyCode with event.key [GH-30493]

BUG FIXES:

  • core (enterprise): fix a bug where plugin automated root rotations would stop after seal/unseal operations
  • plugins (enterprise): Fix an issue where Enterprise plugins can't run on a standby node when it becomes active because standby nodes don't extract the artifact when the plugin is registered. Remove extracting from Vault and require the operator to place the extracted artifact in the plugin directory before registration.

... (truncated)

Commits
  • 71ca099 Update vault-plugin-secrets-gcp to v0.22.0 (#30846)
  • 51ec0db Update vault-plugin-auth-kerberos to v0.15.0 (#30845)
  • 38cc2c9 Update vault-plugin-auth-cf to v0.21.0 (#30842)
  • 36aa49b enos(fips1403): simplify semver constraint to only consider currently mixed r...
  • 407c297 Update vault-plugin-secrets-openldap to v0.16.0 (#30844)
  • a725087 VAULT-36495 CE changes (#30807)
  • d19e946 Update vault-plugin-auth-oci to v0.19.0 (#30841)
  • d9ecd5b PostgreSQL backend passwordless authentication in cloud (#30681)
  • 636524e Update vault-plugin-database-couchbase to v0.14.0 (#30836)
  • befafd5 [VAULT-35682] build(cgo): Build CGO binaries in a container (#30834)
  • Additional commits viewable in compare view

Updates github.com/hashicorp/vault/sdk from 0.15.2 to 0.18.0

Changelog

Sourced from github.com/hashicorp/vault/sdk's changelog.

1.15.16 Enterprise

October 09, 2024

SECURITY:

  • secrets/identity: A privileged Vault operator with write permissions to the root namespace's identity endpoint could escalate their privileges to Vault's root policy (CVE-2024-9180) HCSEC-2024-21

IMPROVEMENTS:

  • core: log at level ERROR rather than INFO when all seals are unhealthy. [GH-28564]

BUG FIXES:

  • auth/cert: When using ocsp_ca_certificates, an error was produced though extra certs validation succeeded. [GH-28597]
  • auth/token: Fix token TTL calculation so that it uses max_lease_ttl tune value for tokens created via auth/token/create. [GH-28498]

1.15.15 Enterprise

September 25, 2024

SECURITY:

CHANGES:

  • core: Bump Go version to 1.22.7.
  • secrets/ssh: Add a flag, allow_empty_principals to allow keys or certs to apply to any user/principal. [GH-28466]

BUG FIXES:

  • secret/aws: Fixed potential panic after step-down and the queue has not repopulated. [GH-28330]
  • auth/cert: During certificate validation, OCSP requests are debug logged even if Vault's log level is above DEBUG. [GH-28450]
  • auth/cert: ocsp_ca_certificates field was not honored when validating OCSP responses signed by a CA that did not issue the certificate. [GH-28309]
  • auth: Updated error handling for missing login credentials in AppRole and UserPass auth methods to return a 400 error instead of a 500 error. [GH-28441]
  • core: Fixed an issue where maximum request duration timeout was not being added to all requests containing strings sys/monitor and sys/events. With this change, timeout is now added to all requests except monitor and events endpoint. [GH-28230]

1.15.14 Enterprise

August 29, 2024

CHANGES:

  • activity (enterprise): filter all fields in client count responses by the request namespace [GH-27790]
  • core: Bump Go version to 1.22.6

IMPROVEMENTS:

  • activity log: Changes how new client counts in the current month are estimated, in order to return more visibly sensible totals. [GH-27547]
  • activity: /sys/internal/counters/activity will now include a warning if the specified usage period contains estimated client counts. [GH-28068]
  • cli: vault operator usage will now include a warning if the specified usage period contains estimated client counts. [GH-28068]
  • core/activity: Ensure client count queries that include the current month return consistent results by sorting the clients before performing estimation [GH-28062]

... (truncated)

Commits
  • 6bcb72a update vault auth submodules to api/v1.20.0 (#30851)
  • 318f858 VAULT-36229: Nonce for rekey cancellations (#30794)
  • 7f64b68 Update vault-plugin-secrets-kubernetes to v0.11.0 (#30855)
  • d65ec12 Update vault-plugin-database-mongodbatlas to v0.15.0 (#30856)
  • bbfaf6f UI: Fix error handling so users are redirected to log in when token expires i...
  • 3f84ada Add 192 to the list of key sizes supported in the docs. (#30718)
  • 71ca099 Update vault-plugin-secrets-gcp to v0.22.0 (#30846)
  • 51ec0db Update vault-plugin-auth-kerberos to v0.15.0 (#30845)
  • 38cc2c9 Update vault-plugin-auth-cf to v0.21.0 (#30842)
  • 36aa49b enos(fips1403): simplify semver constraint to only consider currently mixed r...
  • Additional commits viewable in compare view

Updates golang.org/x/sync from 0.12.0 to 0.15.0

Commits
  • 8a14946 errgroup: remove duplicated comment
  • 1869c69 all: replace deprecated ioutil
  • d1ac909 sync/errgroup: PanicError.Error print stack trace
  • 506c70f errgroup: propagate panic and Goexit through Wait
  • 396f3a0 errgroup: document calling Go before Wait
  • See full diff in compare view

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore <dependency name> major version will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)
  • @dependabot ignore <dependency name> minor version will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)
  • @dependabot ignore <dependency name> will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)
  • @dependabot unignore <dependency name> will remove all of the ignore conditions of the specified dependency
  • @dependabot unignore <dependency name> <ignore condition> will remove the ignore condition of the specified dependency and ignore conditions

Bumps the all group with 3 updates in the / directory: [github.com/hashicorp/vault/api](https://github.com/hashicorp/vault), [github.com/hashicorp/vault/sdk](https://github.com/hashicorp/vault) and [golang.org/x/sync](https://github.com/golang/sync).


Updates `github.com/hashicorp/vault/api` from 1.16.0 to 1.20.0
- [Release notes](https://github.com/hashicorp/vault/releases)
- [Changelog](https://github.com/hashicorp/vault/blob/main/CHANGELOG.md)
- [Commits](hashicorp/vault@v1.16.0...api/v1.20.0)

Updates `github.com/hashicorp/vault/sdk` from 0.15.2 to 0.18.0
- [Release notes](https://github.com/hashicorp/vault/releases)
- [Changelog](https://github.com/hashicorp/vault/blob/main/CHANGELOG-v1.10-v1.15.md)
- [Commits](hashicorp/vault@sdk/v0.15.2...sdk/v0.18.0)

Updates `golang.org/x/sync` from 0.12.0 to 0.15.0
- [Commits](golang/sync@v0.12.0...v0.15.0)

---
updated-dependencies:
- dependency-name: github.com/hashicorp/vault/api
  dependency-version: 1.20.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: all
- dependency-name: github.com/hashicorp/vault/sdk
  dependency-version: 0.18.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: all
- dependency-name: golang.org/x/sync
  dependency-version: 0.15.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: all
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot requested a review from lingrino June 9, 2025 15:28
@dependabot dependabot bot added dependencies Pull requests that update a dependency file go Pull requests that update Go code labels Jun 9, 2025
@dependabot @github
Copy link
Contributor Author
dependabot bot commented on behalf of github Jun 9, 2025

The reviewers field in the dependabot.yml file will be removed soon. Please use the code owners file to specify reviewers for Dependabot PRs. For more information, see this blog post.

Copy link
cloudflare-workers-and-pages bot commented Jun 9, 2025

Deploying vaku with  Cloudflare Pages  Cloudflare Pages

Latest commit: 1db38e8
Status: ✅  Deploy successful!
Preview URL: https://0c755705.vaku.pages.dev
Branch Preview URL: https://dependabot-go-modules-all-58.vaku.pages.dev

View logs

@lingrino lingrino enabled auto-merge (squash) June 16, 2025 03:38
@lingrino lingrino merged commit a37ebbe into main Jun 16, 2025
7 checks passed
@lingrino lingrino deleted the dependabot/go_modules/all-5864cd4a2e branch June 16, 2025 05:14
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file go Pull requests that update Go code
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant
0