Vault 36585/update changelog 1.19.5 (#30792)

* added 1.19.5 changelog records to main

* added LTS notice

* added changelog record for other minor releases

* updated to use the correct record for each change log entry

---------

Co-authored-by: lursu <leland.ursu@hashicorp.com>
This commit is contained in:
Leland Ursu 2025-05-30 12:45:53 -04:00 committed by GitHub
parent 303c36e2c7
commit 6cba338f29
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194

View File

@ -3,6 +3,24 @@
- [v1.0.0 - v1.9.10](CHANGELOG-pre-v1.10.md)
- [v0.11.6 and earlier](CHANGELOG-v0.md)
## 1.19.5
### May 30, 2025
**Enterprise LTS:** Vault Enterprise 1.19 is a [Long-Term Support (LTS)](https://developer.hashicorp.com/vault/docs/enterprise/lts) release.
CHANGES:
* database/snowflake: Update plugin to v0.13.1 [[GH-30775](https://github.com/hashicorp/vault/pull/30775)]
IMPROVEMENTS:
* plugins: Support registration of CE plugins with extracted artifact directory. [[GH-30673](https://github.com/hashicorp/vault/pull/30673)]
BUG FIXES:
* ui: Fix broken link to Hashicorp Vault developer site in the Web REPL help. [[GH-30670](https://github.com/hashicorp/vault/pull/30670)]
## 1.19.4
### May 16, 2025
@ -352,6 +370,26 @@ Unblocks customers that were stuck in a failing loop when attempting to rotate s
* ui: No longer running decodeURIComponent on KVv2 list view allowing percent encoded data-octets in path name. [[GH-28698](https://github.com/hashicorp/vault/pull/28698)]
* vault/diagnose: Fix time to expiration reporting within the TLS verification to not be a month off. [[GH-29128](https://github.com/hashicorp/vault/pull/29128)]
## 1.18.10
### May 30, 2025
CHANGES:
* Update vault-plugin-auth-cf to v0.19.2
* auth/azure: Upgrade plugin to v0.19.4
* database/snowflake: Update plugin to v0.12.1
IMPROVEMENTS:
* ui: Replaces all instances of the deprecated event.keyCode with event.key [[GH-30493](https://github.com/hashicorp/vault/pull/30493)]
BUG FIXES:
* plugins (enterprise): Fix an issue where Enterprise plugins can't run on a standby node
when it becomes active because standby nodes don't extract the artifact when the plugin
is registered. Remove extracting from Vault and require the operator to place
the extracted artifact in the plugin directory before registration.
## 1.18.9 Enterprise
### April 30, 2025
@ -802,6 +840,26 @@ use versioned plugins. [[GH-27881](https://github.com/hashicorp/vault/pull/27881
* ui: fixes renew-self being called right after login for non-renewable tokens [[GH-28204](https://github.com/hashicorp/vault/pull/28204)]
* ui: fixes toast (flash) alert message saying "created" when deleting a kv v2 secret [[GH-28093](https://github.com/hashicorp/vault/pull/28093)]
## 1.17.17
### May 30, 2025
CHANGES:
* Update vault-plugin-auth-cf to v0.18.2
* auth/azure: Upgrade plugin to v0.18.3
* database/snowflake: Update plugin to v0.11.1
IMPROVEMENTS:
* ui: Replaces all instances of the deprecated event.keyCode with event.key [[GH-30493](https://github.com/hashicorp/vault/pull/30493)]
BUG FIXES:
* plugins (enterprise): Fix an issue where Enterprise plugins can't run on a standby node
when it becomes active because standby nodes don't extract the artifact when the plugin
is registered. Remove extracting from Vault and require the operator to place
the extracted artifact in the plugin directory before registration.
## 1.17.16 Enterprise
### April 30, 2025
@ -1397,6 +1455,22 @@ autopilot to fail to discover new server versions and so not trigger an upgrade.
* ui: fixed a bug where the replication pages did not update display when navigating between DR and performance [[GH-26325](https://github.com/hashicorp/vault/pull/26325)]
* ui: fixes undefined start time in filename for downloaded client count attribution csv [[GH-26485](https://github.com/hashicorp/vault/pull/26485)]
## 1.16.21
### May 30, 2025
CHANGES:
* Update vault-plugin-auth-cf to v0.18.2
* auth/azure: Upgrade plugin to v0.17.4
* database/snowflake: Update plugin to v0.10.2
BUG FIXES:
* plugins (enterprise): Fix an issue where Enterprise plugins can't run on a standby node
when it becomes active because standby nodes don't extract the artifact when the plugin
is registered. Remove extracting from Vault and require the operator to place
the extracted artifact in the plugin directory before registration.
## 1.16.20 Enterprise
### April 30, 2025