pkgsrc-WIP-changes archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

vault: update to version 1.12.2.



Module Name:	pkgsrc-wip
Committed By:	Havard Eidnes <he%NetBSD.org@localhost>
Pushed By:	he
Date:		Thu Dec 1 14:01:13 2022 +0100
Changeset:	343340604a1ff1c2f0051725f39f5d19d1e0f1ae

Modified Files:
	vault/Makefile
	vault/distinfo
	vault/go-modules.mk

Log Message:
vault: update to version 1.12.2.

Pkgsrc changes:
 * Only version number, go-modules.mk and checksums.

Upstream changes:

1.12.2
November 30, 2022

CHANGES:
 * core: Bump Go version to 1.19.3.
 * plugins: Mounts can no longer be pinned to a specific builtin
   version. Mounts previously pinned to a specific builtin version
   will now automatically upgrade to the latest builtin version, and
   may now be overridden if an unversioned plugin of the same name
   and type is registered. Mounts using plugin versions without
   builtin in their metadata remain unaffected. [GH-18051]

IMPROVEMENTS:
 * secrets/pki: Allow issuer creation, import to change default
   issuer via default_follows_latest_issuer. [GH-17824]
 * storage/raft: Add retry_join_as_non_voter config option. [GH-18030]

BUG FIXES:
 * auth/okta: fix a panic for AuthRenew in Okta [GH-18011]
 * auth: Deduplicate policies prior to ACL generation [GH-17914]
 * cli: Fix issue preventing kv commands from executing properly
   when the mount path provided by -mount flag and secret key path
   are the same. [GH-17679]
 * core (enterprise): Supported storage check in vault server
   command will no longer prevent startup. Instead, a warning will
   be logged if configured to use storage backend other than raft
   or consul.
 * core/quotas (enterprise): Fix a lock contention issue that could
   occur and cause Vault to become unresponsive when creating,
   changing, or deleting lease count quotas.
 * core: Fix potential deadlock if barrier ciphertext is less than
   4 bytes. [GH-17944]
 * core: fix a start up race condition where performance standbys
   could go into a mount loop if default policies are not yet synced
   from the active node. [GH-17801]
 * plugins: Only report deprecation status for builtin plugins. [GH-17816]
 * plugins: Vault upgrades will no longer fail if a mount has been
   created using an explicit builtin plugin version. [GH-18051]
 * secret/pki: fix bug with initial legacy bundle migration (from
   < 1.11 into 1.11+) and missing issuers from ca_chain [GH-17772]
 * secrets/azure: add WAL to clean up role assignments if errors
   occur [GH-18086]
 * secrets/gcp: Fixes duplicate service account key for rotate root
   on standby or secondary [GH-18111]
 * secrets/pki: Fix upgrade of missing expiry, delta_rebuild_interval
   by setting them to the default. [GH-17693]
 * ui: Fixes issue with not being able to download raft snapshot
   via service worker [GH-17769]
 * ui: fix entity policies list link to policy show page [GH-17950]

To see a diff of this commit:
https://wip.pkgsrc.org/cgi-bin/gitweb.cgi?p=pkgsrc-wip.git;a=commitdiff;h=343340604a1ff1c2f0051725f39f5d19d1e0f1ae

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

diffstat:
 vault/Makefile      |  2 +-
 vault/distinfo      | 30 +++++++++++++++---------------
 vault/go-modules.mk |  8 ++++----
 3 files changed, 20 insertions(+), 20 deletions(-)

diffs:
diff --git a/vault/Makefile b/vault/Makefile
index d1b2f7341d..cee402d48d 100644
--- a/vault/Makefile
+++ b/vault/Makefile
@@ -1,6 +1,6 @@
 # $NetBSD$
 
-DISTNAME=	vault-1.12.1
+DISTNAME=	vault-1.12.2
 CATEGORIES=	security
 MASTER_SITES=	${MASTER_SITE_GITHUB:=hashicorp/}
 
diff --git a/vault/distinfo b/vault/distinfo
index 6014f0975b..8eebf8c2cb 100644
--- a/vault/distinfo
+++ b/vault/distinfo
@@ -3300,18 +3300,18 @@ Size (github.com_hashicorp_vault-plugin-secrets-alicloud_@v_v0.13.0.mod) = 582 b
 BLAKE2s (github.com_hashicorp_vault-plugin-secrets-alicloud_@v_v0.13.0.zip) = 999663a37513447300bea76c6f473c4100ab8dc1be6cfb3bf5f3b85bcd238636
 SHA512 (github.com_hashicorp_vault-plugin-secrets-alicloud_@v_v0.13.0.zip) = ed4d6fb18d72bcbffc71b5c225d1ed15f6283a17b44a76efb266dda803f6f2b6f513724b4f42334f2915fb36d234801a4aa80e4ce2502f8d00cfa6b256cb6718
 Size (github.com_hashicorp_vault-plugin-secrets-alicloud_@v_v0.13.0.zip) = 50789 bytes
-BLAKE2s (github.com_hashicorp_vault-plugin-secrets-azure_@v_v0.14.0.mod) = edcd567a15f61029617c6e13c75984b39352aa273c9b1c3ff68cd8e8b4416e21
-SHA512 (github.com_hashicorp_vault-plugin-secrets-azure_@v_v0.14.0.mod) = eb74244fd35674275e34540d2ce7127d862517f83547187a5d8ac9bc8a3b0875b9a4316113d536ba58df875e16d9ed8cb12c9f96c362b18b54c17b5b077b3b30
-Size (github.com_hashicorp_vault-plugin-secrets-azure_@v_v0.14.0.mod) = 920 bytes
-BLAKE2s (github.com_hashicorp_vault-plugin-secrets-azure_@v_v0.14.0.zip) = 225ddc9b731c94233f1e214beb5da48c8e6fea0564747635e4d5a8ce15935fa8
-SHA512 (github.com_hashicorp_vault-plugin-secrets-azure_@v_v0.14.0.zip) = d1d9adf9e8f8647f468df5a2f8bb9bd00619859c4654347cab9dfdcd83d2a507bf3dd7f2dd8ec75e611cc0db55cd14e675e204fc9f060eb3d04e39b245ecce98
-Size (github.com_hashicorp_vault-plugin-secrets-azure_@v_v0.14.0.zip) = 89360 bytes
-BLAKE2s (github.com_hashicorp_vault-plugin-secrets-gcp_@v_v0.14.0.mod) = 5631c61831e3beadec0a9d578cce654259a0f4b8b314d22061cc207b7d37cf38
-SHA512 (github.com_hashicorp_vault-plugin-secrets-gcp_@v_v0.14.0.mod) = 2f450f9ddd69970c848e0e4899a1babd1e95e1b95ae890c22d5b97855baff08b1756668f4ce58dc08f09eb0a578d764cf417068fc0a145df89b5bce499fa6fed
-Size (github.com_hashicorp_vault-plugin-secrets-gcp_@v_v0.14.0.mod) = 675 bytes
-BLAKE2s (github.com_hashicorp_vault-plugin-secrets-gcp_@v_v0.14.0.zip) = ebb3ad3244507d1df5cbccfe2839a42f7b99e8de76fc4936f72af116fe401b16
-SHA512 (github.com_hashicorp_vault-plugin-secrets-gcp_@v_v0.14.0.zip) = aef1106bc3f8580cc7fc0f47b5af7b675579b609cc4f10e48f466454d25c2f8223cd14b957094edce116eadb31c09a7c64b69dbbebaf6aad5c36f8846bfa105d
-Size (github.com_hashicorp_vault-plugin-secrets-gcp_@v_v0.14.0.zip) = 133373 bytes
+BLAKE2s (github.com_hashicorp_vault-plugin-secrets-azure_@v_v0.14.1.mod) = edcd567a15f61029617c6e13c75984b39352aa273c9b1c3ff68cd8e8b4416e21
+SHA512 (github.com_hashicorp_vault-plugin-secrets-azure_@v_v0.14.1.mod) = eb74244fd35674275e34540d2ce7127d862517f83547187a5d8ac9bc8a3b0875b9a4316113d536ba58df875e16d9ed8cb12c9f96c362b18b54c17b5b077b3b30
+Size (github.com_hashicorp_vault-plugin-secrets-azure_@v_v0.14.1.mod) = 920 bytes
+BLAKE2s (github.com_hashicorp_vault-plugin-secrets-azure_@v_v0.14.1.zip) = b6758cc9a7d6151d589f2eb8aca02538c76f2bd7ccf4bd8ab5e6bf2a2904f495
+SHA512 (github.com_hashicorp_vault-plugin-secrets-azure_@v_v0.14.1.zip) = 883d48034ca76b90cb56f45e93fb1b47858202ba031f469afc6623577a467c2ab03b594774ec1d50e95596a7e2bb6a4fe37af581582f51d84222460c439b0c3f
+Size (github.com_hashicorp_vault-plugin-secrets-azure_@v_v0.14.1.zip) = 91016 bytes
+BLAKE2s (github.com_hashicorp_vault-plugin-secrets-gcp_@v_v0.14.1.mod) = 5631c61831e3beadec0a9d578cce654259a0f4b8b314d22061cc207b7d37cf38
+SHA512 (github.com_hashicorp_vault-plugin-secrets-gcp_@v_v0.14.1.mod) = 2f450f9ddd69970c848e0e4899a1babd1e95e1b95ae890c22d5b97855baff08b1756668f4ce58dc08f09eb0a578d764cf417068fc0a145df89b5bce499fa6fed
+Size (github.com_hashicorp_vault-plugin-secrets-gcp_@v_v0.14.1.mod) = 675 bytes
+BLAKE2s (github.com_hashicorp_vault-plugin-secrets-gcp_@v_v0.14.1.zip) = 7fff3d574562634710a2cbb0628976fac814fd2ad1292508e6b5309abd854963
+SHA512 (github.com_hashicorp_vault-plugin-secrets-gcp_@v_v0.14.1.zip) = 8af83b57d5b5e92343b42641194ab6964042f44be426eaa2d3001dfb64294ac7b193fb2754d453afa13438e8851902b8a722893b6d163a80abb4c9c1696a5269
+Size (github.com_hashicorp_vault-plugin-secrets-gcp_@v_v0.14.1.zip) = 133469 bytes
 BLAKE2s (github.com_hashicorp_vault-plugin-secrets-gcpkms_@v_v0.13.0.mod) = e5ed1e3f4849572049a9473e5d1e3b234f7d0abbbbb254b69a5052eccc86acda
 SHA512 (github.com_hashicorp_vault-plugin-secrets-gcpkms_@v_v0.13.0.mod) = 2d3015f7ed5ed8c68ed9bb387bb85c6a63647710fdb3e9568fbf5024c924a95e51849595360b7b54aa1778ae1b07470655455dd9c2c5b22fa25e7eca62cc7945
 Size (github.com_hashicorp_vault-plugin-secrets-gcpkms_@v_v0.13.0.mod) = 1053 bytes
@@ -7851,6 +7851,6 @@ Size (sigs.k8s.io_yaml_@v_v1.2.0.mod) = 106 bytes
 BLAKE2s (sigs.k8s.io_yaml_@v_v1.2.0.zip) = 196614bfe35a861524f0dd2e2e0b63fbd650b889bab18114f167720f05506b70
 SHA512 (sigs.k8s.io_yaml_@v_v1.2.0.zip) = 52a52b3d380ae6e2cbe1b2c849d3089f74aa876fb3fadfbd02eada97446e0f2cf387f10ddb527f2dfefd57dccba8c82b0b349efbecaa0e6e3d00dc2b5d4fc21e
 Size (sigs.k8s.io_yaml_@v_v1.2.0.zip) = 20937 bytes
-BLAKE2s (vault-1.12.1.tar.gz) = 58f0f6a7178ee843d478cc19cda28c885bebbee4c4a9d49a3e1e9eb11551d6c8
-SHA512 (vault-1.12.1.tar.gz) = deed26c9a8effc196e4714d31c774d58a4353f6066cb1d54203c5ab194b93d3fed822dfbe4490aab3e55f9ee0b650d7105b6c654f53e4610f1202cca5c718144
-Size (vault-1.12.1.tar.gz) = 30132130 bytes
+BLAKE2s (vault-1.12.2.tar.gz) = 365418a576018f90ed203cc69239f669a841c789ce87d883c206cf15aa422add
+SHA512 (vault-1.12.2.tar.gz) = 83d48defca869624c1e0dbd6d37f1d83d0aec355bf9a83dee557c42f2b534f14d7db5293d3292b6765eef6d5f06d74df30142e5fd460397561283e4e37aee3a4
+Size (vault-1.12.2.tar.gz) = 30153275 bytes
diff --git a/vault/go-modules.mk b/vault/go-modules.mk
index 25b6ab1b04..4b9f69499d 100644
--- a/vault/go-modules.mk
+++ b/vault/go-modules.mk
@@ -1100,10 +1100,10 @@ GO_MODULE_FILES+=	github.com/hashicorp/vault-plugin-secrets-ad/@v/v0.14.0.mod
 GO_MODULE_FILES+=	github.com/hashicorp/vault-plugin-secrets-ad/@v/v0.14.0.zip
 GO_MODULE_FILES+=	github.com/hashicorp/vault-plugin-secrets-alicloud/@v/v0.13.0.mod
 GO_MODULE_FILES+=	github.com/hashicorp/vault-plugin-secrets-alicloud/@v/v0.13.0.zip
-GO_MODULE_FILES+=	github.com/hashicorp/vault-plugin-secrets-azure/@v/v0.14.0.mod
-GO_MODULE_FILES+=	github.com/hashicorp/vault-plugin-secrets-azure/@v/v0.14.0.zip
-GO_MODULE_FILES+=	github.com/hashicorp/vault-plugin-secrets-gcp/@v/v0.14.0.mod
-GO_MODULE_FILES+=	github.com/hashicorp/vault-plugin-secrets-gcp/@v/v0.14.0.zip
+GO_MODULE_FILES+=	github.com/hashicorp/vault-plugin-secrets-azure/@v/v0.14.1.mod
+GO_MODULE_FILES+=	github.com/hashicorp/vault-plugin-secrets-azure/@v/v0.14.1.zip
+GO_MODULE_FILES+=	github.com/hashicorp/vault-plugin-secrets-gcp/@v/v0.14.1.mod
+GO_MODULE_FILES+=	github.com/hashicorp/vault-plugin-secrets-gcp/@v/v0.14.1.zip
 GO_MODULE_FILES+=	github.com/hashicorp/vault-plugin-secrets-gcpkms/@v/v0.13.0.mod
 GO_MODULE_FILES+=	github.com/hashicorp/vault-plugin-secrets-gcpkms/@v/v0.13.0.zip
 GO_MODULE_FILES+=	github.com/hashicorp/vault-plugin-secrets-kubernetes/@v/v0.2.0.mod


Home | Main Index | Thread Index | Old Index