pkgsrc-WIP-changes archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

vault: Update to 1.5.0



Module Name:	pkgsrc-wip
Committed By:	Iku Iwasa <iku.iwasa%gmail.com@localhost>
Pushed By:	iquiw
Date:		Thu Jul 23 13:47:31 2020 +0900
Changeset:	ad65954614ba6e9eb176a9a2e49b884b811386fa

Modified Files:
	vault/Makefile
	vault/distinfo
Added Files:
	vault/patches/patch-vendor_github.com_docker_docker_client_client__unix.go
	vault/patches/patch-vendor_github.com_docker_docker_pkg_system_stat__netbsd.go

Log Message:
vault: Update to 1.5.0

July 21st, 2020

CHANGES:

* audit: Token TTL and issue time are now provided in the auth portion of
  audit logs. [GH-9091]
* auth/gcp: Changes the default name of the entity alias that gets created
  to be the role ID for both IAM and GCE authentication. [GH-99]
* core: Remove the addition of newlines to parsed configuration when using
  integer/boolean values [GH-8928]
* cubbyhole: Reject reads and writes to an empty ("") path. [GH-8971]
* storage/gcs: The credentials_file config option has been removed. The
  GOOGLE_APPLICATION_CREDENTIALS environment variable or default
  credentials may be used instead [GH-9424]
* storage/raft: The storage configuration now accepts a new max_entry_size
  config that will limit the total size in bytes of any entry committed via
  raft. It defaults to "1048576" (1MiB). [GH-9027]
* token: Token creation with custom token ID via id will no longer allow
  periods (.) as part of the input string. The final generated token value
  may contain periods, such as the s. prefix for service token
  indication. [GH-8646]
* token: Token renewals will now return token policies within the
  token_policies , identity policies within identity_policies, and the full
  policy set within policies. [GH-8535]

FEATURES:

* Monitoring: We have released a Splunk App [9] for Enterprise
  customers. The app is accompanied by an updated monitoring guide and a
  few new metrics to enable OSS users to effectively monitor Vault.
* Password Policies: Allows operators to customize how passwords are
  generated for select secret engines (OpenLDAP, Active Directory, Azure,
  and RabbitMQ).
* Replication UI Improvements: We have redesigned the replication UI to
  highlight the state and relationship between primaries and secondaries
  and improved management workflows, enabling a more holistic understanding
  of multiple Vault clusters.
* Resource Quotas: As of 1.5, Vault supports specifying a quota to rate
  limit requests on OSS and Enterprise. Enterprise customers also have
  access to set quotas on the number of leases that can be generated on a
  path.
* OpenShift Support: We have updated the Helm charts to allow users to
  install Vault onto their OpenShift clusters.
* Seal Migration: We have made updates to allow migrations from auto unseal
  to Shamir unseal on Enterprise.
* AWS Auth Web Identity Support: We've added support for AWS Web
  Identities, which will be used in the credentials chain if present.
* Vault Monitor: Similar to the monitor command for Consul and Nomad, we
  have added the ability for Vault to stream logs from other Vault servers
  at varying log levels.
* AWS Secrets Groups Support: IAM users generated by Vault may now be added
  to IAM Groups.
* Integrated Storage as HA Storage: In Vault 1.5, it is possible to use
  Integrated Storage as HA Storage with a different storage backend as
  regular storage.
* OIDC Auth Provider Extensions: We've added support to OIDC Auth to
  incorporate IdP-specific extensions. Currently this includes expanded
  Azure AD groups support.
* GCP Secrets: Support BigQuery dataset ACLs in absence of IAM endpoints.

IMPROVEMENTS:

* audit: Replication status requests are no longer audited. [GH-8877]
* audit: Added mount_type field to requests and responses. [GH-9167]
* auth/aws: Add support for Web Identity credentials [GH-7738]
* auth/jwt: Support users that are members of more than 200 groups on Azure
  [GH-120]
* auth/kerberos: Support identities without userPrincipalName [GH-44]
* auth/kubernetes: Allow disabling iss validation [GH-91]
* auth/kubernetes: Try reading the ca.crt and TokenReviewer JWT from the
  default service account [GH-83]
* cli: Support reading TLS parameters from file for the vault operator raft
  join command. [GH-9060]
* cli: Add a new subcommand, vault monitor, for tailing server logs in the
  console. [GH-8477]
* core: Add the Go version used to build a Vault binary to the server
  message output. [GH-9078]
* core: Added Password Policies for user-configurable password generation
  [GH-8637]
* core: New telemetry metrics covering token counts, token creation, KV
  secret counts, lease creation. [GH-9239] [GH-9250] [GH-9244] [GH-9052]
* physical/gcs: The storage backend now uses a dedicated client for HA lock
  updates to prevent lock table update failures when flooded by other
  client requests. [GH-9424]
* physical/spanner: The storage backend now uses a dedicated client for HA
  lock updates to prevent lock table update failures when flooded by other
  client requests. [GH-9423]
* plugin: Add SDK method, Sys.ReloadPlugin, and CLI command, vault plugin
  reload, for reloading plugins. [GH-8777]
* plugin (enterprise): Add a scope field to plugin reload, which when
  global, reloads the plugin anywhere in a cluster. [GH-9347]
* sdk/framework: Support accepting TypeFloat parameters over the API
  [GH-8923]
* secrets/aws: Add iam_groups parameter to role create/update [GH-8811]
* secrets/database: Add static role rotation for MongoDB Atlas database
  plugin [GH-11]
* secrets/database: Add static role rotation for MSSQL database plugin
  [GH-9062]
* secrets/database: Allow InfluxDB to use insecure TLS without cert bundle
  [GH-8778]
* secrets/gcp: Support BigQuery dataset ACLs in absence of IAM endpoints
  [GH-78]
* secrets/pki: Allow 3072-bit RSA keys [GH-8343]
* secrets/ssh: Add a CA-mode role option to specify signing algorithm
  [GH-9096]
* secrets/ssh: The Vault SSH Helper can now be configured to reference a
  mount in a namespace [GH-44]
* secrets/transit: Transit requests that make use of keys now include a new
  field key_version in their responses [GH-9100]
* secrets/transit: Improving transit batch encrypt and decrypt latencies
  [GH-8775]
* sentinel: Add a sentinel config section, and
  "additional_enabled_modules", a list of Sentinel modules that may be
  imported in addition to the defaults.
* ui: Update TTL picker styling on SSH secret engine [GH-8891]
* ui: Only render the JWT input field of the Vault login form on mounts
  configured for JWT auth [GH-8952]
* ui: Add replication dashboards. Improve replication management
  workflows. [GH-8705].
* ui: Update alert banners to match design systems black text. [GH-9463].

BUG FIXES:

* auth/oci: Fix issue where users of the Oracle Cloud Infrastructure (OCI)
  auth method could not authenticate when the plugin backend was mounted at
  a non-default path. [GH-7]
* core: Extend replicated cubbyhole fix in 1.4.0 to cover case where a
  performance primary is also a DR primary [GH-9148]
* seal/awskms: fix AWS KMS auto-unseal when AWS_ROLE_SESSION_NAME not set
  [GH-9416]
* sentinel: fix panic due to concurrent map access when rules iterate over
  metadata maps
* secrets/aws: Fix issue where performance standbys weren't able to
  generate STS credentials after an IAM access key rotation in AWS and root
  IAM credential update in Vault [GH-9186]
* secrets/database: Fix issue where rotating root database credentials
  while Vault's storage backend is unavailable causes Vault to lose access
  to the database [GH-8782]
* secrets/database: Fix issue that prevents performance standbys from
  connecting to databases after a root credential rotation [GH-9129]
* secrets/gcp: Fix issue were updates were not being applied to the
  token_scopes of a roleset. [GH-90]
* secrets/kv: Return the value of delete_version_after when reading
  kv/config, even if it is set to the default. [GH-42]
* ui: Add Toggle component into core addon so it is available in KMIP and
  other Ember Engines.[GH-8913]
* ui: Disallow max versions value of large than 9999999999999999 on kv2
  secrets engine. [GH-9242]
* ui: Add and upgrade missing dependencies to resolve a failure with make
  static-dist. [GH-9277]

To see a diff of this commit:
https://wip.pkgsrc.org/cgi-bin/gitweb.cgi?p=pkgsrc-wip.git;a=commitdiff;h=ad65954614ba6e9eb176a9a2e49b884b811386fa

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

diffstat:
 vault/Makefile                                       |  2 +-
 vault/distinfo                                       | 10 ++++++----
 ...r_github.com_docker_docker_client_client__unix.go | 12 ++++++++++++
 ...thub.com_docker_docker_pkg_system_stat__netbsd.go | 20 ++++++++++++++++++++
 4 files changed, 39 insertions(+), 5 deletions(-)

diffs:
diff --git a/vault/Makefile b/vault/Makefile
index a40072608f..ca2bd7eec2 100644
--- a/vault/Makefile
+++ b/vault/Makefile
@@ -1,6 +1,6 @@
 # $NetBSD$
 
-DISTNAME=	vault-1.4.3
+DISTNAME=	vault-1.5.0
 CATEGORIES=	security
 MASTER_SITES=	${MASTER_SITE_GITHUB:=hashicorp/}
 
diff --git a/vault/distinfo b/vault/distinfo
index ad8ebdd60d..40e49330df 100644
--- a/vault/distinfo
+++ b/vault/distinfo
@@ -1,8 +1,10 @@
 $NetBSD$
 
-SHA1 (vault-1.4.3.tar.gz) = b78225f2d06a4c9bb7c7e0136254de7b79c4503a
-RMD160 (vault-1.4.3.tar.gz) = f50a00f8ac67f4a9821b8269af850f89b96add8a
-SHA512 (vault-1.4.3.tar.gz) = 638bdeaaee122263d8f8c44b6db48b0f10869dd6f2cd6d35bcefb96e8b25dde4596a4a41f287d065f0cece01c5e75f9a4ae220864dddc381365fe57faeb2efe2
-Size (vault-1.4.3.tar.gz) = 33169383 bytes
+SHA1 (vault-1.5.0.tar.gz) = 8128f8ab999db6eafdd02e11bb32973b6f6bb65a
+RMD160 (vault-1.5.0.tar.gz) = 628ec25d71fe3e76bdac0f7949388b876e41ec2c
+SHA512 (vault-1.5.0.tar.gz) = 245d5ea837f561d6c3832a0cb28d851dabe908fac2be7e53d3fd466689778d67b2cd5d9ea8c297f8daceb003c571a9768254a7e27d1fbeb1a376ac75e3c6edfb
+Size (vault-1.5.0.tar.gz) = 34940170 bytes
+SHA1 (patch-vendor_github.com_docker_docker_client_client__unix.go) = 51a400f6adaa6abe4cd42c31cfba4f037d9d81e5
+SHA1 (patch-vendor_github.com_docker_docker_pkg_system_stat__netbsd.go) = 125e35b6f5e9a0cdec8c0a5e0b7c67cc326467ea
 SHA1 (patch-vendor_github.com_ory_dockertest_docker_pkg_system_stat__netbsd.go) = 723ce00bc56771008074e5d77efd465501fda2bb
 SHA1 (patch-vendor_github.com_ory_dockertest_docker_pkg_term_termios__bsd.go) = 9696daf0158de14d8756748b0dc5398be9ff64f4
diff --git a/vault/patches/patch-vendor_github.com_docker_docker_client_client__unix.go b/vault/patches/patch-vendor_github.com_docker_docker_client_client__unix.go
new file mode 100644
index 0000000000..0d603a6c24
--- /dev/null
+++ b/vault/patches/patch-vendor_github.com_docker_docker_client_client__unix.go
@@ -0,0 +1,12 @@
+$NetBSD$
+
+Build client_unix.go for NetBSD.
+
+--- vendor/github.com/docker/docker/client/client_unix.go.orig	2020-07-18 02:21:10.000000000 +0000
++++ vendor/github.com/docker/docker/client/client_unix.go
+@@ -1,4 +1,4 @@
+-// +build linux freebsd openbsd darwin solaris illumos
++// +build linux freebsd openbsd netbsd darwin solaris illumos
+ 
+ package client // import "github.com/docker/docker/client"
+ 
diff --git a/vault/patches/patch-vendor_github.com_docker_docker_pkg_system_stat__netbsd.go b/vault/patches/patch-vendor_github.com_docker_docker_pkg_system_stat__netbsd.go
new file mode 100644
index 0000000000..6e6938219e
--- /dev/null
+++ b/vault/patches/patch-vendor_github.com_docker_docker_pkg_system_stat__netbsd.go
@@ -0,0 +1,20 @@
+$NetBSD$
+
+Provides stat conversion function for NetBSD.
+
+--- vendor/github.com/docker/docker/pkg/system/stat_netbsd.go.orig	2020-07-23 04:42:05.263335746 +0000
++++ vendor/github.com/docker/docker/pkg/system/stat_netbsd.go
+@@ -0,0 +1,13 @@
++package system
++
++import "syscall"
++
++// fromStatT converts a syscall.Stat_t type to a system.Stat_t type
++func fromStatT(s *syscall.Stat_t) (*StatT, error) {
++	return &StatT{size: s.Size,
++		mode: uint32(s.Mode),
++		uid:  s.Uid,
++		gid:  s.Gid,
++		rdev: uint64(s.Rdev),
++		mtim: s.Mtimespec}, nil
++}


Home | Main Index | Thread Index | Old Index