pkgsrc-Changes-HG archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
[pkgsrc/trunk]: pkgsrc/security/vault Update security/vault to 0.7.3.
details: https://anonhg.NetBSD.org/pkgsrc/rev/e99c2286fa7a
branches: trunk
changeset: 363618:e99c2286fa7a
user: fhajny <fhajny%pkgsrc.org@localhost>
date: Tue Jun 13 06:28:38 2017 +0000
description:
Update security/vault to 0.7.3.
## 0.7.3 (June 7th, 2017)
SECURITY:
- Cert auth backend now checks validity of individual certificates
- App-ID path salting was skipped in 0.7.1/0.7.2
DEPRECATIONS/CHANGES:
- Step-Down is Forwarded
FEATURES:
- ed25519 Signing/Verification in Transit with Key Derivation
- Key Version Specification for Encryption in Transit
- Replication Primary Discovery (Enterprise)
IMPROVEMENTS:
- api/health: Add Sys().Health()
- audit: Add auth information to requests that error out
- command/auth: Add `-no-store` option that prevents the auth command
from storing the returned token into the configured token helper
- core/forwarding: Request forwarding now heartbeats to prevent unused
connections from being terminated by firewalls or proxies
- plugins/databases: Add MongoDB as an internal database plugin
- storage/dynamodb: Add a method for checking the existence of
children, speeding up deletion operations in the DynamoDB storage backend
- storage/mysql: Add max_parallel parameter to MySQL backend
- secret/databases: Support listing connections
- secret/databases: Support custom renewal statements in Postgres
database plugin
- secret/databases: Use the role name as part of generated credentials
- ui (Enterprise): Transit key and secret browsing UI handle large
lists better
- ui (Enterprise): root tokens are no longer persisted
- ui (Enterprise): support for mounting Database and TOTP secret
backends
BUG FIXES:
- auth/app-id: Fix regression causing loading of salts to be skipped
- auth/aws: Improve EC2 describe instances performance
- auth/aws: Fix lookup of some instance profile ARNs
- auth/aws: Resolve ARNs to internal AWS IDs which makes lookup at
various points (e.g. renewal time) more robust
- auth/aws: Properly honor configured period when using IAM
authentication
- auth/aws: Check that a bound IAM principal is not empty (in the
current state of the role) before requiring it match the previously
authenticated client
- auth/cert: Fix panic on renewal
- auth/cert: Certificate verification for non-CA certs
- core/acl: Prevent race condition when compiling ACLs in some
scenarios
- secret/database: Increase wrapping token TTL; in a loaded scenario
it could be too short
- secret/generic: Allow integers to be set as the value of `ttl` field
as the documentation claims is supported
- secret/ssh: Added host key callback to ssh client config
- storage/s3: Avoid a panic when some bad data is returned
- storage/dynamodb: Fix list functions working improperly on Windows
- storage/file: Don't leak file descriptors in some error cases
- storage/swift: Fix pre-v3 project/tenant name reading
diffstat:
security/vault/Makefile | 4 ++--
security/vault/distinfo | 10 +++++-----
2 files changed, 7 insertions(+), 7 deletions(-)
diffs (27 lines):
diff -r 75f1e7d1cb94 -r e99c2286fa7a security/vault/Makefile
--- a/security/vault/Makefile Tue Jun 13 06:09:35 2017 +0000
+++ b/security/vault/Makefile Tue Jun 13 06:28:38 2017 +0000
@@ -1,6 +1,6 @@
-# $NetBSD: Makefile,v 1.12 2017/05/10 18:21:27 fhajny Exp $
+# $NetBSD: Makefile,v 1.13 2017/06/13 06:28:38 fhajny Exp $
-DISTNAME= vault-0.7.2
+DISTNAME= vault-0.7.3
CATEGORIES= security
MASTER_SITES= ${MASTER_SITE_GITHUB:=hashicorp/}
diff -r 75f1e7d1cb94 -r e99c2286fa7a security/vault/distinfo
--- a/security/vault/distinfo Tue Jun 13 06:09:35 2017 +0000
+++ b/security/vault/distinfo Tue Jun 13 06:28:38 2017 +0000
@@ -1,6 +1,6 @@
-$NetBSD: distinfo,v 1.7 2017/05/10 18:21:27 fhajny Exp $
+$NetBSD: distinfo,v 1.8 2017/06/13 06:28:38 fhajny Exp $
-SHA1 (vault-0.7.2.tar.gz) = e0482b7625b095a93fc6075c83988fda0738d45e
-RMD160 (vault-0.7.2.tar.gz) = 0b666498fcf4254ecd1b8194cf5762027c0c385a
-SHA512 (vault-0.7.2.tar.gz) = 3a811f1a3f7c318bf645bf93c66c15c6a9d06718806ca5dd7a5ff95eeafef6dc6e58bcb829373716172cf2fe863240d1f4fdd34f8dcc1d31a2e36f6917e533ba
-Size (vault-0.7.2.tar.gz) = 6547973 bytes
+SHA1 (vault-0.7.3.tar.gz) = 6cec196e3d4483aee896e6ca69993bebf856d142
+RMD160 (vault-0.7.3.tar.gz) = 2091b5f947579a7a715090164d8ccb2c805cb2b6
+SHA512 (vault-0.7.3.tar.gz) = 8632b4b721372cb0f5f684564ebe0749b7c1a9b5d0322b083773b3a2fd1734fb2eedee1aeb4b4c9431ce7f44c711ac0a95960c581165e1bac1a3754f8658e783
+Size (vault-0.7.3.tar.gz) = 6694636 bytes
Home |
Main Index |
Thread Index |
Old Index