-
Notifications
You must be signed in to change notification settings - Fork 186
Spring Vault 3.1 Release Notes
Migrating from Spring Vault 3.0 to 3.1 should be a smooth experience as the changes introduced are source- and binary-compatible.
Spring Vault 3.1 builds on and requires Spring Framework 6.1.
Other Spring projects upgraded in this release include:
-
Spring Data 2023.1.0
-
Spring Security 6.2.0
Numerous third-party dependencies have also been updated, some of the more noteworthy of which are the following:
-
Reactor 2023.0.0
-
AWS Java SDK 2.21.5
-
Apache HTTP Client 5.2.1
-
Apache HTTP Core 5.2.3
-
Jackson 2.15.3
-
Jetty Reactive HTTP Client 4.0
-
Kotlin 1.8.22
-
Kotlin Coroutines 1.7.3
-
Mockito 5.6.0
-
Netty 4.1.101.Final
Secret backend leases are bound to the login token that has created the leases. When a login token expires, all associated leases are revoked regardless of their remaining TTL. To prevent a defunct application state because of revoked database or service credentials, we introduced AuthenticationEventMulticaster
to multicast authentication events. SecretLeaseContainer
consumes authentication events and can re-acquire leases for registered secrets once the login token expires. LifecycleAwareSessionManagerSupport
and its subclasses have published authentication events already, now the interface allows for a decoupled design.
AbstractVaultConfiguration
and AbstractReactiveVaultConfiguration
have been updated with the new design to propagate authentication events to SecretLeaseContainer
seamlessly.
We’ve migrated our documentation to Antora to provide an improved navigation experience along with a full text search. You can browse the new documentation site at https://docs.spring.io/spring-vault/reference/.
With this version, we introduced ReactiveVaultKeyValueOperations
for the key-value backends supporting versioned and non-versioned secrets. This API mirrors VaultKeyValueOperations
including support for ReactiveVaultKeyValueMetadataOperations
.
With this version, we introduced ReactiveVaultTransitOperations
for the transit backend. This API mirrors VaultKeyValueOperations
.
You can now use JWT authentication through JwtAuthentication
. The authentication mechanism uses a Supplier
to obtain a JWT Token and can be used for imperative and reactive authentication. Make sure to avoid blocking API usage in the JWT Supplier
when running the authentication on reactive infrastructure.