Skip to content

Commit 8056125

Browse files
calvntomhjp
andauthored
docs: add known issues section to 1.9.x upgrade guide (#13662)
* docs: add known issues section to 1.9.x upgrade guide * minor rephrasing on oidc known issue * use relative references for URLs * Update website/content/docs/upgrading/upgrade-to-1.9.x.mdx Co-authored-by: Tom Proctor <[email protected]> * update known issues section for id token Co-authored-by: Tom Proctor <[email protected]>
1 parent e2d713a commit 8056125

File tree

1 file changed

+15
-0
lines changed

1 file changed

+15
-0
lines changed

website/content/docs/upgrading/upgrade-to-1.9.x.mdx

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -95,3 +95,18 @@ respects the order of suites given in `tls_cipher_suites`.
9595

9696
See [this blog post](https://go.dev/blog/tls-cipher-suites) for more information.
9797

98+
## Known Issues
99+
100+
### Identity Token Backend Key Rotations
101+
102+
Existing Vault installations that use the [Identity Token
103+
backend](/api-docs/secret/identity/tokens) and have [named
104+
keys](/api-docs/secret/identity/tokens#create-a-named-key) generated will
105+
encounter a panic when any of those existing keys pass their
106+
`rotation_period`. This issue affects Vault 1.9.0, and is fixed in Vault 1.9.1.
107+
Users should upgrade directly to 1.9.1 or above in order to avoid this panic.
108+
109+
If a panic is encountered after an upgrade to Vault 1.9.0, the named key will be
110+
corrupted on storage and become unusable. In this case, the key will need to be
111+
deleted and re-created. A fix to fully mitigate this panic will be addressed on
112+
Vault 1.9.3.

0 commit comments

Comments
 (0)