FEATURES:
- Azure Secrets Engine: Add support for generating dynamic Azure credentials.
- AliCloud Auth Method: Support for AliCloud login tokens.
FEATURES:
- Secrets Engine: Key Value: Version 1: Add support for Writing & Deleting of secrets.
- Secrets Engine: Key Value: Version 2: Add support for Writing & Destroying of secrets.
BREAKING CHANGES:
- Secrets Engine: Key Value: The
ReadSecretPathListAsync
method name changes toReadSecretPathsAsync
. Apologies.
FEATURES:
-
Add support for Azure Auth method login.
-
Add support for GoogleCloud Auth method login.
-
Add support for JWT/OIDC Auth method login.
-
Add support for Kubernetes Auth method login.
-
Add support for Okta Auth method login.
-
Add support for RADIUS Auth method login.
-
Transit Secrets Engine: Add support for Encrypt & Decrypt including Batched input.
-
Active Directory Secrets Engine: Add support for offering credentials.
-
AWS Secrets Engine: Add support for generating dynamic IAM credentials & STS IAM credentials.
-
Cubbhole Secrets Engine: Add support for read secret, read paths, write secret and delete secret APIs.
-
Database Secrets Engine: Add support for generating dynamic DB credentials.
-
GoogleCloud Secrets Engine: Add support for generating OAuth2 Token & Service Account Key.
-
Nomad Secrets Engine: Add support for generating dynamic credentials.
-
RabbitMQ Secrets Engine: Add support for generating dynamic credentials.
-
SSH Secrets Engine: Add support for generating dynamic credentials.
-
TOTP Secrets Engine: Add support for generating and validating TOTP code.
-
Supports .Net Standard 1.3 and .NET Framework 4.5. This enables supports for a wide range of platforms.
BREAKING CHANGES:
- The
GenerateCredentialsAsync
method name changes toGetCredentialsAsync
. Apologies.
FEATURES:
- Add support for PKI dynamic credentials.
- Add support for GitHub auth method.
- Add support for Get, Renew and Revoke calling token info.
- Add docs for VaultSharp 0.6.x
- Add docs for current VaultSharp
BREAKING CHANGES:
- Changed the property names in VaultClient.V1 from SecretsEngine to just Secrets, AuthMethod to Auth and SystemBackend to System. Apologies.
FEATURES:
- Secret Engines: Consul, KeyValue, PKI for dynamic credentials
- Auth methods: AppRole, AWS, LDAP, TLS Certificates, Tokens, Username & password - Login method.
- System Backend Apis.
BREAKING CHANGES:
- VaultSharp has been redesigned from scratch to make the usage very intuitive and structured across the Secrets Engines, Auth Methods and Sys Apis.
MISC:
DEPRECATIONS/CHANGES:
FEATURES:
IMPROVEMENTS:
- Add nonce to
SealStatus
type to allow seeing if the operation has reset. [hashicorp/vault#2276] - Add support for batch Transit operations:
TransitEncryptAsync
BUG FIXES:
MISC:
- VaultSharp 0.6.4 is now cross-platform! It supports .NET Standard 1.4 along with .NET 4.5.x and .NET 4.6.x.
- VaultSharp 0.6.4 is also strongly named now. This means your previous NuGet package may not automatically upgrade. YOU MAY NEED TO MANUALLY UPGRADE THE VAULTSHARP NUGET PACKAGE ONCE.
- Basically the change logs for VaultSharp till 0.6.4 and follows the changelog for Vault here. (https://github.com/hashicorp/vault/blob/master/CHANGELOG.md)
- Some of the changes are called out below. But all of Vault 0.6.4 cumulative changes are supported by VaultSharp 0.6.4
- A major breaking change in VaultSharp 0.6.4 is STRONG NAMING of VaultSharp. Now both strong named and non-strong named assemblies can refer to VaultSharp. This does mean that Nuget will not detect any upgrade from VaultSharp less than 0.6.4 to 0.6.4. You need to do this MANUALLY!
DEPRECATIONS/CHANGES:
- VaultSharp 0.6.4 is also strongly named now. This means your previous NuGet package may not automatically upgrade. YOU MAY NEED TO MANUALLY UPGRADE THE VAULTSHARP NUGET PACKAGE ONCE.
- The
InitializeAsync
method now takes a single container object for all parameters, instead of primitive parameters. This single container object now has support for the additional recovery fields supported by Vault 0.6.2's initialization. - The File Audit backend path json key internally changed from
path
tofile_path
. - The
MongoDbGenerateDynamicCredentialsAsync
method now returnsMongoDbUsernamePasswordCredentials
instead ofUsernamePasswordCredentials
. This ensures you get thedatabase
field back as well. - The
MicrosoftSqlReadCredentialLeaseSettingsAsync
method now returns theCredentialTimeToLiveSettings
instead of the deprecatedCredentialTtlSettings
type. This is in alignment with Vault deprecatingttl_max
in favor ofmax_ttl
. - VaultSharp 0.6.4 is now strongly named. This breaks compatibility between VaultSharp 0.6.1 and 0.6.4. In fact, NuGet is going to treat them as 2 separate assemblies. I thought through a couple of options like releasing 2 NuGet packages and adding strongly named packages as part of a major version upgrade, but finally decided to just do it now and have just 1 Package. Because we are at the 0.x.x versions, I am thinking we can get away with this. :) A bit of pain now, for a lot less hassles later. (pretty much the whole conundrum of life!)
- The
GetCallingTokenInfoAsync
now returns a new response typeCallingTokenInfo
instead of the previousTokenInfo
. This supports the latest fields for Vault 0.6.4. [GH-18] - The
TransitCreateEncryptionKeyAsync
now supports thetransitKeyType
parameter to specify the type of key needed. - The
TransitGetEncryptionKeyInfoAsync
method now returnsTransitEncryptionKeyInfo
with a lot more fields likeKeyDerivationFunction
,ConvergentEncryptionVersion
, etc.
FEATURES:
- New
/sys/wrapping
Apis: Wrap, Rewrap, Lookup and Unwrap. - The
UnwrapWrappedResponseDataAsync
method also supports a generic return type to give you strongly typed data back. So if you wrappedAWSCredentials
, then you can unwrapSecret<AWSCredentials>
instead ofSecret<Dictionary<string, object>>
. And at any time if you need the non-generic method, you can always fallback to the non-generic version returning a dictionary. - Add support for stored shares, recovery parameters etc. during the initialization of Vault.
- Supports the new fields (
hmac_accessor
,jsonx
format etc.) for File and SysLog Audit Backends. - The
AWSGenerateDynamicCredentialsWithSecurityTokenAsync
method now supports thetimeToLive
parameter. - The
Consul
backend now supports the listing functionality to rolesConsulReadRoleListAsync
. (hashicorp/vault#2065) - The
Transit
backend now supports the new Apis forList of keys
,Random
,Hash
,Digest
,Sign
,Verify
etc. - All the secret backends now support wrapping of the secret into a cubbyhole token. Wrapping support added for:
- AWS Secret Backend
- Cassandra Secret Backend
- Consul Secret Backend
- Cubbyhole Secret Backend
- Generic Secret Backend
- MongoDB Secret Backend
- Microsoft SQL Secret Backend
- MySql Secret Backend
- TBD for PKI Secret Backend
- PostgreSQL Secret Backend
- RabbitMQ Secret Backend
- SSH Secret Backend
- Transit Secret Backend
IMPROVEMENTS:
- Overall intellisense comments are updated to match the Vault documentation site.
- The
CassandraRoleDefinition
now supports a consistency level parameter. (defaults toQuorum
) - The
MongoDbGenerateDynamicCredentialsAsync
now returns the database name as well, related to the credentials. - The
MySqlRoleDefinition
now supports theRevocationSql
parameter to revoke an user. - Added
RevocationSql
parameter on thePostgreSqlRoleDefinition
type to enable customization of user revocation SQL statements. - The WriteSecretAsync method now returns data if the underlying data allows for it. [GH-16]
BUG FIXES:
- Fixed a race condition in the API calls to add the Vault Client Token Header. A single call involves removal and addition of the client token header. Between the removal and addition, some other thread could make the API call, resulting in 401 errors. This is because the HttpClient is shared by all threads. The fallacy happens due to messing with Headers at the HttpClient level. The fix was to compose a per thread HttpRequestMessage and set its headers. GH-13
MISC:
- Basically the change log for VaultSharp 0.6.1 follows the changelog for Vault 0.6.1 here. (https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#061-august-22-2016)
- Some of the changes are called out below. But all of Vault 0.6.1 changes is supported by VaultSharp 0.6.1
DEPRECATIONS/CHANGES:
- AppId backend is now deprecated, but still supported. Use AppRole instead.
FEATURES:
- All the new Authentication backends are now supported: AppRole and AWS-EC2 based login.
- All the new Secret backends are now supported: MongoDB, MSSQL and RabbitMQ based secret backends
- All the List Apis are now supported.
- New Token Apis pertaining to token-roles are now supported.
- Advanced Health check Api changes
- Rekey Api changes for Nonce
- Add convergent encryption support
- Add support for step-down Api
- Add support for the capabilities Apis.
- Add support for the token accessor Apis.
IMPROVEMENTS:
- You can now provide a delegate for HttpClient to be executed. Use this to set proxy settings, message handlers etc.
- Upgraded the Json Package dependency to 9.
- Quick rekey Api is available now.
- Quick Mount Api is available now.
BUG FIXES:
- Fixed deadlock issue with Auth login. #5
IMPROVEMENTS:
- Added extensive XML documentation to the Apis.
This is a documentation-addition-only release; other than the version number there are no changes from 0.4.0.
- Initial release
- Parity with Hashicorp's Vault 0.4.1 Api features