-
Notifications
You must be signed in to change notification settings - Fork 4.2k
Issues: hashicorp/vault
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Author
Label
Projects
Milestones
Assignee
Sort
Issues list
Vault 1.16.x helm deployment with MySQL storage: pods are being in separate groups
ecosystem
helmchart
Helm chart for deploying Vault on Kubernetes. Also consider hashicorp/vault-helm
#27301
opened May 31, 2024 by
ValeriiVozniuk
Configure Vault rotate to automatically AWS root credentials periodically
enhancement
secret/aws
#27294
opened May 30, 2024 by
ebarrett-Ocient
Update to 1.16.x - Authentication failed: ldap.(Client).Authenticate: failed to get user attributes: ldap.(Client).getUserAttributes: missing user dn: invalid parameter
auth/ldap
bug
Used to indicate a potential bug
#27276
opened May 30, 2024 by
makrelas
The openapi spec is not defining some response objects
bug
Used to indicate a potential bug
core/openapi
#27269
opened May 29, 2024 by
r00ta
Add Friendly Name or Common Name in PKI Module Certificate List
enhancement
secret/pki
ui
#27249
opened May 28, 2024 by
anastas001
Hexadecimal certificate serial number in entity alias metadata would be great
auth/cert
Authentication - certificates
enhancement
#27248
opened May 28, 2024 by
stormshield-gt
Implement Post Quantum algorithms for PKI
enhancement
secret/pki
#27239
opened May 26, 2024 by
sycured
Tidy and revoke error out on certificates with duplicate extension
cryptosec
secret/pki
#27219
opened May 24, 2024 by
Garagoth
Can static role autorotation be disabled and only manual api rotation work?
auth/approle
enhancement
#27165
opened May 21, 2024 by
mikebell90
Vault on IPv6 only Kubernetes cluster context canceled
bug
Used to indicate a potential bug
secret/k8s
Kubernetes Secrets Engine
#27150
opened May 20, 2024 by
shanerenshawaus
hashicorp fixation with 1344px
bug
Used to indicate a potential bug
reproduced
This issue has been reproduced by a Vault engineer
ui
#27124
opened May 19, 2024 by
infowolfe
vault start, get such error: [WARN] storage migration check error: error="Get \"http://%2Fconsul-unix-socket%2Fconsul-client.sock/v1/kv/vault/core/migration\": http: invalid Host header"
bug
Used to indicate a potential bug
storage/consul
#27101
opened May 17, 2024 by
qiangliabcd
[Plugin Portal] Plugin Submission - neo4j-vault-database-plugin
ecosystem/plugin
#26979
opened May 13, 2024 by
laocoon2525
Listener for non-sensitive endpoints (e.g. CRLs)
core/http
enhancement
feature-request
#26927
opened May 10, 2024 by
kwohlfahrt
Allow setting ENVs for the cluster using NewTestDockerCluster
feature-request
test
#26852
opened May 7, 2024 by
gkoutsoumpakis-form3
Vault 1.16.2 OpenBSD 7.5 incompatibility
bug
Used to indicate a potential bug
core
Issues and Pull-Requests specific to Vault Core
release/build
reproduced
This issue has been reproduced by a Vault engineer
#26829
opened May 5, 2024 by
KzyKor
Update dependent Prometheus library versions
dependencies
Pull requests that update a dependency file
#26792
opened May 2, 2024 by
shawnm14
Missing retry logic when using GCS backend might lead to cluster unavailable
bug
Used to indicate a potential bug
storage/gcs
#26673
opened Apr 27, 2024 by
fcrespofastly
Broken rotation of cert/key generated/used by Vault for Consul secrets engine backend
bug
Used to indicate a potential bug
ecosystem
secret/consul
#26670
opened Apr 26, 2024 by
cheeseburgermotivated
Allow aws engine to create orphaned credentials
auth/aws
ttl
#26641
opened Apr 25, 2024 by
Shocktrooper
DynamoDB backed HA fails to release locks
storage/dynamodb
#26580
opened Apr 22, 2024 by
dhumphries-sainsburys
add remove_roots_from_chain to more endpoints
reproduced
This issue has been reproduced by a Vault engineer
secret/pki
#26571
opened Apr 22, 2024 by
stormshield-gt
ProTip!
Add no:assignee to see everything that’s not assigned.