pkgsrc-WIP-changes archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

vault: Update to 1.5.4



Module Name:	pkgsrc-wip
Committed By:	Iku Iwasa <iku.iwasa%gmail.com@localhost>
Pushed By:	iquiw
Date:		Sat Sep 26 14:04:33 2020 +0900
Changeset:	d0ddae968fdc4a403e98dc6a6ff0fc53cc763226

Modified Files:
	vault/Makefile
	vault/distinfo

Log Message:
vault: Update to 1.5.4

SECURITY:

* Batch Token Expiry: We addressed an issue where batch token leases could
  outlive their TTL because we were not scheduling the expiration time
  correctly. This vulnerability affects Vault OSS and Vault Enterprise 1.0
  and newer and is fixed in 1.4.7 and 1.5.4 (CVE-2020-25816).

IMPROVEMENTS:

* secrets/pki: Handle expiration of a cert not in storage as a success
  [GH-9880]
* auth/kubernetes: Add an option to disable defaulting to the local CA cert
  and service account JWT when running in a Kubernetes pod [GH-97]
* secrets/gcp: Add check for 403 during rollback to prevent repeated
  deletion calls [GH-97]
* core: Disable usage metrics collection on performance standby
  nodes. [GH-9966]
* credential/aws: Added X-Amz-Content-Sha256 as a default STS request
  header [GH-10009]

BUG FIXES:

* agent: Fix disable_fast_negotiation not being set on the auth method when
  configured by user. [GH-9892]
* core (enterprise): Fix hang when cluster-wide plugin reload cleanup is
  slow on unseal
* core (enterprise): Fix an error in cluster-wide plugin reload cleanup
  following such a reload
* core: Fix crash when metrics collection encounters zero-length keys in KV
  store [GH-9811]
* mfa (enterprise): Fix incorrect handling of PingID responses that could
  result in auth requests failing
* replication (enterprise): Improve race condition when using a newly
  created token on a performance standby node
* replication (enterprise): Only write failover cluster addresses if
  they've changed
* ui: fix bug where dropdown for identity/entity management is not
  reflective of actual policy [GH-9958]

To see a diff of this commit:
https://wip.pkgsrc.org/cgi-bin/gitweb.cgi?p=pkgsrc-wip.git;a=commitdiff;h=d0ddae968fdc4a403e98dc6a6ff0fc53cc763226

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

diffstat:
 vault/Makefile | 2 +-
 vault/distinfo | 8 ++++----
 2 files changed, 5 insertions(+), 5 deletions(-)

diffs:
diff --git a/vault/Makefile b/vault/Makefile
index 1dd20b676e..94a58543a8 100644
--- a/vault/Makefile
+++ b/vault/Makefile
@@ -1,6 +1,6 @@
 # $NetBSD$
 
-DISTNAME=	vault-1.5.3
+DISTNAME=	vault-1.5.4
 CATEGORIES=	security
 MASTER_SITES=	${MASTER_SITE_GITHUB:=hashicorp/}
 
diff --git a/vault/distinfo b/vault/distinfo
index 26eb6e1e94..514d63b822 100644
--- a/vault/distinfo
+++ b/vault/distinfo
@@ -1,9 +1,9 @@
 $NetBSD$
 
-SHA1 (vault-1.5.3.tar.gz) = ca11b81ffe657004023bd0388665bfe35ffe5962
-RMD160 (vault-1.5.3.tar.gz) = ad3b62e2e799c326dea17ea152b1a3b149fc10ea
-SHA512 (vault-1.5.3.tar.gz) = 2eaeabf939c20e914319f0038f7b2cea219618a5f830a7d250f4de447b1b7e9fab9fee611752fcd26086b67c3b5e32f403a88d4e7da1d94f34570e1a210bc4f8
-Size (vault-1.5.3.tar.gz) = 35123873 bytes
+SHA1 (vault-1.5.4.tar.gz) = 3ee6842614f41be471e9873ae80328c8f862788d
+RMD160 (vault-1.5.4.tar.gz) = 94c82a572a1e3b2f6483adf842d37a2ef1042732
+SHA512 (vault-1.5.4.tar.gz) = 9a3d4d30a61e89aeb5c622fa82dcbc0fed28ae17fce8c6f29c71cb47784aae57f08b0cad5532e18178683f823581e306b5a37e5d2391af7dec3bd9a6889ab75d
+Size (vault-1.5.4.tar.gz) = 35116452 bytes
 SHA1 (patch-vendor_github.com_docker_docker_client_client__unix.go) = 51a400f6adaa6abe4cd42c31cfba4f037d9d81e5
 SHA1 (patch-vendor_github.com_docker_docker_pkg_system_stat__netbsd.go) = 125e35b6f5e9a0cdec8c0a5e0b7c67cc326467ea
 SHA1 (patch-vendor_github.com_ory_dockertest_docker_pkg_system_stat__netbsd.go) = 723ce00bc56771008074e5d77efd465501fda2bb


Home | Main Index | Thread Index | Old Index