pkgsrc-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[pkgsrc/trunk]: pkgsrc/security/vault security/vault: Update to 0.11.1.

branches:  trunk
changeset: 312574:4bdbc0610ee3
user:      fhajny <>
date:      Thu Sep 06 20:41:53 2018 +0000

security/vault: Update to 0.11.1.


- Random Byte Reading in Barrier: Prior to this release, Vault was not
  properly checking the error code when reading random bytes for the IV for
  AES operations in its cryptographic barrier. Specifically, this means that
  such an IV could potentially be zero multiple times, causing nonce re-use
  and weakening the security of the key. On most platforms this should never
  happen because reading from kernel random sources is non-blocking and always
  successful, but there may be platform-specific behavior that has not been
  accounted for. (Vault has tests to check exactly this, and the tests have
  never seen nonce re-use.)


- AliCloud Agent Support: Vault Agent can now authenticate against the
  AliCloud auth method.
- UI: Enable AliCloud auth method and Azure secrets engine via the UI.


- core: Logging level for most logs (not including secrets/auth plugins) can
  now be changed on-the-fly via `SIGHUP`, reading the desired value from
  Vault's config file


- core: Ensure we use a background context when stepping down
- core: Properly check error return from random byte reading
- core: Re-add `sys/` top-route injection for now
- core: Properly store the replication checkpoint file if it's larger than the
  storage engine's per-item limit
- identity: Update MemDB with identity group alias while loading groups
- secrets/database: Fix nil pointer when revoking some leases
- secrets/pki: Fix sign-verbatim losing extra Subject attributes
- secrets/pki: Remove certificates from store when tidying revoked
  certificates and simplify API
- ui: JSON editor will not coerce input to an object, and will now show an
  error about Vault expecting an object
- ui: authentication form will now default to any methods that have been tuned
  to show up for unauthenticated users


 security/vault/Makefile |   4 ++--
 security/vault/distinfo |  10 +++++-----
 2 files changed, 7 insertions(+), 7 deletions(-)

diffs (27 lines):

diff -r a3bd1ddbd52f -r 4bdbc0610ee3 security/vault/Makefile
--- a/security/vault/Makefile   Thu Sep 06 19:07:12 2018 +0000
+++ b/security/vault/Makefile   Thu Sep 06 20:41:53 2018 +0000
@@ -1,6 +1,6 @@
-# $NetBSD: Makefile,v 1.31 2018/09/03 18:59:08 fhajny Exp $
+# $NetBSD: Makefile,v 1.32 2018/09/06 20:41:53 fhajny Exp $
-DISTNAME=      vault-0.11.0
+DISTNAME=      vault-0.11.1
 CATEGORIES=    security
diff -r a3bd1ddbd52f -r 4bdbc0610ee3 security/vault/distinfo
--- a/security/vault/distinfo   Thu Sep 06 19:07:12 2018 +0000
+++ b/security/vault/distinfo   Thu Sep 06 20:41:53 2018 +0000
@@ -1,6 +1,6 @@
-$NetBSD: distinfo,v 1.20 2018/09/03 18:59:08 fhajny Exp $
+$NetBSD: distinfo,v 1.21 2018/09/06 20:41:53 fhajny Exp $
-SHA1 (vault-0.11.0.tar.gz) = bcccb2ffca44f0d746fb9ce0384bffbab5d8e243
-RMD160 (vault-0.11.0.tar.gz) = 0086bd162d55e3a681bd2b494e7451f0371d7667
-SHA512 (vault-0.11.0.tar.gz) = 33e1e76a0e16803a8d0d6ed8ec0b6d1f8876d54ecf35a70bc4969404bd7991ef0cc5986eae958885d288bb316396e0594a5571b7a11f8b052b22b445388f03c7
-Size (vault-0.11.0.tar.gz) = 24430984 bytes
+SHA1 (vault-0.11.1.tar.gz) = 06bcc72f2f4cbcc03ce9f3be6e986e75be481681
+RMD160 (vault-0.11.1.tar.gz) = ccfb2809b2ab0245a9a7cd834cea13b32e094747
+SHA512 (vault-0.11.1.tar.gz) = b9cbd8862d6bfe4f6e41f6fb916497af0429dde3ce15bb8c808cd57ca6c0e52e95ba165f4d57fd7051a611ac869e54d7b5758f6fc059ad6474c93353a4b14201
+Size (vault-0.11.1.tar.gz) = 24595293 bytes

Home | Main Index | Thread Index | Old Index