From 40334714ddb4d177a9aaea421a996f4e9453b96a Mon Sep 17 00:00:00 2001 From: Jeff Mitchell Date: Tue, 14 Nov 2017 06:08:56 -0500 Subject: [PATCH] Prep for 0.9.0 --- CHANGELOG.md | 21 +++++++++++++++++++-- terraform/aws/variables.tf | 2 +- version/version_base.go | 2 +- website/config.rb | 2 +- 4 files changed, 22 insertions(+), 5 deletions(-) diff --git a/CHANGELOG.md b/CHANGELOG.md index 114754a7410d..f9173e8686e1 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -1,4 +1,4 @@ -## 0.8.4 (Unreleased) +## 0.9.0 (November 14th, 2017) DEPRECATIONS/CHANGES: @@ -25,7 +25,24 @@ DEPRECATIONS/CHANGES: FEATURES: - * ** RSA Support for Transit Backend**: Transit backend can now generate RSA + * **Identity System**: Now in open source and with significant enhancements, + Identity is an integrated system for understanding users across tokens and + enabling easier management of users directly and via groups. + * **External Groups in Identity**: Vault can now automatically assign users + and systems to groups in Identity based on their membership in external + groups. + * **Seal Wrap / FIPS 140-2 Compatibility (Enterprise)**: Vault can now take + advantage of FIPS 140-2-certified HSMs to ensure that Critical Security + Parameters are protected in a compliant fashion. Vault's implementation has + received a statement of compliance from Leidos. + * **Control Groups (Enterprise)**: Require multiple members of an Identity + group to authorize a requested action before it is allowed to run. + * **Cloud Auto-Unseal (Enterprise)**: Automatically unseal Vault using AWS KMS + and GCP CKMS. + * **Sentinel Integration (Enterprise)**: Take advantage of HashiCorp Sentinel + to create extremely flexible access control policies -- even on + unauthenticated endpoints. + * **RSA Support for Transit Backend**: Transit backend can now generate RSA keys which can be used for encryption and signing. [GH-3489] IMPROVEMENTS: diff --git a/terraform/aws/variables.tf b/terraform/aws/variables.tf index cef400287138..f7e4b228abd6 100644 --- a/terraform/aws/variables.tf +++ b/terraform/aws/variables.tf @@ -3,7 +3,7 @@ //------------------------------------------------------------------- variable "download-url" { - default = "https://releases.hashicorp.com/vault/0.8.3/vault_0.8.3_linux_amd64.zip" + default = "https://releases.hashicorp.com/vault/0.9.0/vault_0.9.0_linux_amd64.zip" description = "URL to download Vault" } diff --git a/version/version_base.go b/version/version_base.go index 50c5a5fc2663..429fecec5f1b 100644 --- a/version/version_base.go +++ b/version/version_base.go @@ -2,7 +2,7 @@ package version func init() { // The main version number that is being run at the moment. - Version = "0.8.3" + Version = "0.9.0" // A pre-release marker for the version. If this is "" (empty string) // then it means that it is a final release. Otherwise, this is a pre-release diff --git a/website/config.rb b/website/config.rb index a9617531df53..fd36dc493a86 100644 --- a/website/config.rb +++ b/website/config.rb @@ -2,7 +2,7 @@ activate :hashicorp do |h| h.name = "vault" - h.version = "0.8.3" + h.version = "0.9.0" h.github_slug = "hashicorp/vault" h.website_root = "website" end