Skip to content

Commit

Permalink
AU-dotnet: 2 updated
Browse files Browse the repository at this point in the history
[skip ci]
  • Loading branch information
flcdrg committed Jul 11, 2024
1 parent ecc10c9 commit 41bbe9a
Show file tree
Hide file tree
Showing 4 changed files with 30 additions and 6 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
<package xmlns="http://schemas.microsoft.com/packaging/2015/06/nuspec.xsd">
<metadata>
<id>microsoft-teams-new-bootstrapper</id>
<version>1.0.2411603</version>
<version>1.0.2414501</version>
<packageSourceUrl>https://github.com/flcdrg/au-packages/tree/master/microsoft-teams-new-bootstrapper</packageSourceUrl>
<owners>flcdrg</owners>
<title>Microsoft Teams (new client) Bootstrapper (Machine-Wide Install)</title>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ if ([Version] $osVersion -lt [version] $minimumOsVersion) {
Write-Error "Microsoft Teams New Client requires a minimum of Windows 10 20H1 version $minimumOsVersion. You have $osVersion"
}

$checksum32 = '42DAC6D247B4138AD9ED858892FB608C3A8A2FD5F49E55D61E0C3D700AA3A369'
$checksum32 = 'E7F8AA05BDF853212D5E978BDC2D46A58F47C8F96826192FA49FC4B0C78C3879'
$downloadPath = Join-Path $toolsDir "teamsbootstrapper.exe"

$pp = Get-PackageParameters
Expand Down
4 changes: 2 additions & 2 deletions vault/tools/chocolateyInstall.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -3,9 +3,9 @@
Url = "https://releases.hashicorp.com/vault/$($env:ChocolateyPackageVersion)/vault_$($env:ChocolateyPackageVersion)_windows_386.zip"
UnzipLocation = "$(Split-Path -parent $MyInvocation.MyCommand.Definition)"
Url64 = "https://releases.hashicorp.com/vault/$($env:ChocolateyPackageVersion)/vault_$($env:ChocolateyPackageVersion)_windows_amd64.zip"
Checksum = 'd18ec596de70200cd15f4e16c9164efc7ee9443da7b91536f5273f7426bf5c67'
Checksum = '9460548bf345379e17ac2f5993e1354ba982b4922356d88dcf02cfc101a4e03e'
ChecksumType = 'sha256'
Checksum64 = '743fad75333f0e0bc310c57332f4fdcd1378a6727971bfb2958373ba4ea62011'
Checksum64 = '7ed488aa8bbae5da75cbb909d454c5e86d7ac18389bdd9f844ce58007c6e3ac3'
version = $env:ChocolateyPackageVersion
}

Expand Down
28 changes: 26 additions & 2 deletions vault/vault.nuspec
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
<metadata>
<id>vault</id>
<title>Vault</title>
<version>1.17.1</version>
<version>1.17.2</version>
<authors>Mitchell Hashimoto, HashiCorp</authors>
<owners>flcdrg</owners>
<projectUrl>https://www.vaultproject.io/</projectUrl>
Expand Down Expand Up @@ -32,7 +32,31 @@ The key features of Vault are:
* **Revocation**: Vault has built-in support for secret revocation. Vault can revoke not only single secrets, but a tree of secrets, for example all secrets read by a specific user, or all secrets of a particular type. Revocation assists in key rolling as well as locking down systems in the case of an intrusion.

For more information, see the [introduction section](https://www.vaultproject.io/intro) of the Vault website.
</description><releaseNotes><![CDATA[]]></releaseNotes>
</description><releaseNotes><![CDATA[### 1.17.2
#### July 10, 2024
CHANGES:
* core: Bump Go version to 1.22.5
* secrets/azure: Update plugin to v0.19.2 [[GH-27652](https://github.com/hashicorp/vault/pull/27652)]
FEATURES:
* **AWS secrets engine STS session tags support**: Adds support for setting STS
session tags when generating temporary credentials using the AWS secrets
engine. [[GH-27620](https://github.com/hashicorp/vault/pull/27620)]
BUG FIXES:
* cli: Fixed issue with `vault hcp connect` where HCP resources with uppercase letters were inaccessible when entering the correct project name. [[GH-27694](https://github.com/hashicorp/vault/pull/27694)]
* core (enterprise): Fix HTTP redirects in namespaces to use the correct path and (in the case of event subscriptions) the correct URI scheme. [[GH-27660](https://github.com/hashicorp/vault/pull/27660)]
* core/config: fix issue when using `proxy_protocol_behavior` with `deny_unauthorized`,
which causes the Vault TCP listener to close after receiving an untrusted upstream proxy connection. [[GH-27589](https://github.com/hashicorp/vault/pull/27589)]
* core: Fixed an issue with performance standbys not being able to handle rotate root requests. [[GH-27631](https://github.com/hashicorp/vault/pull/27631)]
* secrets/transit (enterprise): Fix an issue that caused input data be returned as part of generated CMAC values.
* ui: Display an error and force a timeout when TOTP passcode is incorrect [[GH-27574](https://github.com/hashicorp/vault/pull/27574)]
* ui: Ensure token expired banner displays when batch token expires [[GH-27479](https://github.com/hashicorp/vault/pull/27479)]
]]></releaseNotes>

</metadata>
<files>
Expand Down

0 comments on commit 41bbe9a

Please sign in to comment.