@@ -8,55 +8,26 @@ Versioning](https://semver.org/spec/v2.0.0.html).
88
99## [ Unreleased]
1010
11- ## [ 3.0.0-beta.5] - 2021-09-17
12-
13- ### Added
14-
15- * Add the option ` client_secrets ` to server configurations. When this is set to
16- a list, the plugin will attempt to use each secret in order until it receives
17- a successful provider response.
18-
19- ## [ 3.0.0-beta.4] - 2021-09-15
20-
21- ### Added
22-
23- * It is now possible to select a default server to use by setting the
24- ` default_server ` field in the plugin configuration. When upgrading from v2,
25- this field will be automatically set to maintain backward compatibility.
26- * Listing existing servers is now supported at the new ` servers ` endpoint.
27- * Add the new tuning option ` tune_reap_server_deleted_seconds ` to control how
28- long the plugin should wait before automatically deleting credentials that
29- refer to a nonexistent (deleted) server.
30-
31- ### Fixed
32-
33- * When refreshing an authorization code credential or attempting to acquire a
34- device code credential, missing servers will no longer produce scheduler
35- errors.
36-
37- ## [ 3.0.0-beta.3] - 2021-07-22
38-
39- ### Build
40-
41- * Remove darwin/386 from distribution as it is no longer supported by Go or
42- Vault.
43-
44- ## [ 3.0.0-beta.2] - 2021-07-22
45-
46- ### Build
47-
48- * Remove darwin/386 from distribution as it is no longer supported by Go or
49- Vault.
50-
51- ## [ 3.0.0-beta.1] - 2021-07-22
11+ ## [ 3.0.0] - 2021-09-20
5212
5313### Added
5414
5515* It is now possible to manage multiple authorization servers at the same time
5616 by writing separate provider configurations to the ` servers/:name ` endpoint.
17+ Listing servers is supported at the ` servers ` endpoint.
18+ * Additionally, server configurations support a new ` client_secrets ` field that
19+ was not present in the plugin configuration in v2. When this field is set to a
20+ list, the plugin will attempt to use each secret in order until it receives a
21+ successful provider response.
22+ * The plugin configuration supports selecting a default server to use by setting
23+ the ` default_server ` field. When upgrading from v2, this field will be
24+ automatically set to maintain backward compatibility.
5725* It is no longer necessary to explicitly specify a state when requesting an
5826 authorization code URL. The plugin will generate a random state and return it
5927 in the response.
28+ * Add the new tuning option ` tune_reap_server_deleted_seconds ` to control how
29+ long the plugin should wait before automatically deleting credentials that
30+ refer to a nonexistent (deleted) server.
6031
6132### Changed
6233
@@ -70,8 +41,6 @@ Versioning](https://semver.org/spec/v2.0.0.html).
7041 reading from an unconfigured path at the ` self/:name ` endpoint. Instead,
7142 initialize such an access token by writing to the ` self/:name ` endpoint with
7243 any necessary configuration first.
73- * [ BREAKING] When writing a credential, you must reference the server to use for
74- the desired flow by specifying the ` server ` parameter.
7544* The device code flow support library now sends an ` Accept: application/json `
7645 header to improve compatibility with legacy device code endpoints that support
7746 both JSON and form-encoded responses.
@@ -82,6 +51,11 @@ Versioning](https://semver.org/spec/v2.0.0.html).
8251 managing the device code flow no longer start on a Vault server configured as
8352 a performance secondary, performance standby, or disaster recovery secondary.
8453
54+ ### Build
55+
56+ * Remove darwin/386 from distribution as it is no longer supported by Go or
57+ Vault.
58+
8559## [ 2.2.0] - 2021-07-13
8660
8761### Added
@@ -266,12 +240,8 @@ Versioning](https://semver.org/spec/v2.0.0.html).
266240
267241* Initial release of the plugin.
268242
269- [ Unreleased ] : https://github.com/puppetlabs/vault-plugin-secrets-oauthapp/compare/v3.0.0-beta.5...HEAD
270- [ 3.0.0-beta.5 ] : https://github.com/puppetlabs/vault-plugin-secrets-oauthapp/compare/v3.0.0-beta.4...v3.0.0-beta.5
271- [ 3.0.0-beta.4 ] : https://github.com/puppetlabs/vault-plugin-secrets-oauthapp/compare/v3.0.0-beta.3...v3.0.0-beta.4
272- [ 3.0.0-beta.3 ] : https://github.com/puppetlabs/vault-plugin-secrets-oauthapp/compare/v3.0.0-beta.2...v3.0.0-beta.3
273- [ 3.0.0-beta.2 ] : https://github.com/puppetlabs/vault-plugin-secrets-oauthapp/compare/v3.0.0-beta.1...v3.0.0-beta.2
274- [ 3.0.0-beta.1 ] : https://github.com/puppetlabs/vault-plugin-secrets-oauthapp/compare/v2.2.0...v3.0.0-beta.1
243+ [ Unreleased ] : https://github.com/puppetlabs/vault-plugin-secrets-oauthapp/compare/v3.0.0...HEAD
244+ [ 3.0.0 ] : https://github.com/puppetlabs/vault-plugin-secrets-oauthapp/compare/v2.2.0...v3.0.0
275245[ 2.2.0 ] : https://github.com/puppetlabs/vault-plugin-secrets-oauthapp/compare/v2.1.1...v2.2.0
276246[ 2.1.1 ] : https://github.com/puppetlabs/vault-plugin-secrets-oauthapp/compare/v2.1.0...v2.1.1
277247[ 2.1.0 ] : https://github.com/puppetlabs/vault-plugin-secrets-oauthapp/compare/v2.0.0...v2.1.0
0 commit comments