pkgsrc-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[pkgsrc/trunk]: pkgsrc/security/vault Update security/vault to 0.6.5.



details:   https://anonhg.NetBSD.org/pkgsrc/rev/48abf3340ca2
branches:  trunk
changeset: 358472:48abf3340ca2
user:      fhajny <fhajny%pkgsrc.org@localhost>
date:      Mon Feb 13 14:23:08 2017 +0000

description:
Update security/vault to 0.6.5.

FEATURES:

- Okta Authentication: A new Okta authentication backend allows you to use
  Okta usernames and passwords to authenticate to Vault. If provided with an
  appropriate Okta API token, group membership can be queried to assign
  policies; users and groups can be defined locally as well.
- RADIUS Authentication: A new RADIUS authentication backend allows using
  a RADIUS server to authenticate to Vault. Policies can be configured for
  specific users or for any authenticated user.
- Exportable Transit Keys: Keys in `transit` can now be marked as
  `exportable` at creation time. This allows a properly ACL'd user to retrieve
  the associated signing key, encryption key, or HMAC key. The `exportable`
  value is returned on a key policy read and cannot be changed, so if a key is
  marked `exportable` it will always be exportable, and if it is not it will
  never be exportable.
- Batch Transit Operations: `encrypt`, `decrypt` and `rewrap` operations
  in the transit backend now support processing multiple input items in one
  call, returning the output of each item in the response.
- Configurable Audited HTTP Headers: You can now specify headers that you
  want to have included in each audit entry, along with whether each header
  should be HMAC'd or kept plaintext. This can be useful for adding additional
  client or network metadata to the audit logs.
- Transit Backend UI (Enterprise): Vault Enterprise UI now supports the transit
  backend, allowing creation, viewing and editing of named keys as well as using
  those keys to perform supported transit operations directly in the UI.
- Socket Audit Backend A new socket audit backend allows audit logs to be sent
  through TCP, UDP, or UNIX Sockets.

IMPROVEMENTS:

- auth/aws-ec2: Add support for cross-account auth using STS
- auth/aws-ec2: Support issuing periodic tokens
- auth/github: Support listing teams and users
- auth/ldap: Support adding policies to local users directly, in addition to
  local groups
- command/server: Add ability to select and prefer server cipher suites
- core: Add a nonce to unseal operations as a check (useful mostly for
  support, not as a security principle)
- duo: Added ability to supply extra context to Duo pushes
- physical/consul: Add option for setting consistency mode on Consul gets
- physical/etcd: Full v3 API support; code will autodetect which API version
  to use. The v3 code path is significantly less complicated and may be much
  more stable.
- secret/pki: Allow specifying OU entries in generated certificate subjects
- secret mount ui (Enterprise): the secret mount list now shows all mounted
  backends even if the UI cannot browse them. Additional backends can now be
  mounted from the UI as well.

BUG FIXES:

- auth/token: Fix regression in 0.6.4 where using token store roles as a
  blacklist (with only `disallowed_policies` set) would not work in most
  circumstances
- physical/s3: Page responses in client so list doesn't truncate
- secret/cassandra: Stop a connection leak that could occur on active node
  failover
- secret/pki: When using `sign-verbatim`, don't require a role and use the
  CSR's common name

diffstat:

 security/vault/Makefile |   4 ++--
 security/vault/distinfo |  10 +++++-----
 2 files changed, 7 insertions(+), 7 deletions(-)

diffs (27 lines):

diff -r 0d12c0be5f63 -r 48abf3340ca2 security/vault/Makefile
--- a/security/vault/Makefile   Mon Feb 13 14:18:31 2017 +0000
+++ b/security/vault/Makefile   Mon Feb 13 14:23:08 2017 +0000
@@ -1,6 +1,6 @@
-# $NetBSD: Makefile,v 1.8 2017/01/03 07:44:01 fhajny Exp $
+# $NetBSD: Makefile,v 1.9 2017/02/13 14:23:08 fhajny Exp $
 
-DISTNAME=      vault-0.6.4
+DISTNAME=      vault-0.6.5
 CATEGORIES=    security
 MASTER_SITES=  ${MASTER_SITE_GITHUB:=hashicorp/}
 
diff -r 0d12c0be5f63 -r 48abf3340ca2 security/vault/distinfo
--- a/security/vault/distinfo   Mon Feb 13 14:18:31 2017 +0000
+++ b/security/vault/distinfo   Mon Feb 13 14:23:08 2017 +0000
@@ -1,6 +1,6 @@
-$NetBSD: distinfo,v 1.4 2017/01/03 07:44:01 fhajny Exp $
+$NetBSD: distinfo,v 1.5 2017/02/13 14:23:08 fhajny Exp $
 
-SHA1 (vault-0.6.4.tar.gz) = 788539891a2ad0d358b35aba9fddbac90a60b6f9
-RMD160 (vault-0.6.4.tar.gz) = d4b0dee5d372ece57ae21c307e460137cc575404
-SHA512 (vault-0.6.4.tar.gz) = 413d3072ce99cd3a7bb39523ee2791b7839fb3887511ab620390c18aa498c8cb0d4376846a6d57dca616e968f72b720b63745153c470b539d6ce6c4dcd218c5e
-Size (vault-0.6.4.tar.gz) = 5167905 bytes
+SHA1 (vault-0.6.5.tar.gz) = 2c80398d09436abfcb24a8abcda77ef5c00872d5
+RMD160 (vault-0.6.5.tar.gz) = adfd8ca147a73ac771423f113a548e6eed995dfc
+SHA512 (vault-0.6.5.tar.gz) = 3a135281a2135aae45e9a659b0492d37069b080f42956f8a1fdbf842a8a1e54b474b7c5b48c0e6170b206fdb52da7a718a9702d5a14d3aa99f8e560839268374
+Size (vault-0.6.5.tar.gz) = 5628341 bytes



Home | Main Index | Thread Index | Old Index