pkgsrc-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[pkgsrc/trunk]: pkgsrc/security/vault security/vault: Update to 0.11.1.



details:   https://anonhg.NetBSD.org/pkgsrc/rev/1b28d523cca6
branches:  trunk
changeset: 384949:1b28d523cca6
user:      fhajny <fhajny%pkgsrc.org@localhost>
date:      Thu Sep 06 20:41:53 2018 +0000

description:
security/vault: Update to 0.11.1.

SECURITY:

- Random Byte Reading in Barrier: Prior to this release, Vault was not
  properly checking the error code when reading random bytes for the IV for
  AES operations in its cryptographic barrier. Specifically, this means that
  such an IV could potentially be zero multiple times, causing nonce re-use
  and weakening the security of the key. On most platforms this should never
  happen because reading from kernel random sources is non-blocking and always
  successful, but there may be platform-specific behavior that has not been
  accounted for. (Vault has tests to check exactly this, and the tests have
  never seen nonce re-use.)

FEATURES:

- AliCloud Agent Support: Vault Agent can now authenticate against the
  AliCloud auth method.
- UI: Enable AliCloud auth method and Azure secrets engine via the UI.

IMPROVEMENTS:

- core: Logging level for most logs (not including secrets/auth plugins) can
  now be changed on-the-fly via `SIGHUP`, reading the desired value from
  Vault's config file

BUG FIXES:

- core: Ensure we use a background context when stepping down
- core: Properly check error return from random byte reading
- core: Re-add `sys/` top-route injection for now
- core: Properly store the replication checkpoint file if it's larger than the
  storage engine's per-item limit
- identity: Update MemDB with identity group alias while loading groups
- secrets/database: Fix nil pointer when revoking some leases
- secrets/pki: Fix sign-verbatim losing extra Subject attributes
- secrets/pki: Remove certificates from store when tidying revoked
  certificates and simplify API
- ui: JSON editor will not coerce input to an object, and will now show an
  error about Vault expecting an object
- ui: authentication form will now default to any methods that have been tuned
  to show up for unauthenticated users

diffstat:

 security/vault/Makefile |   4 ++--
 security/vault/distinfo |  10 +++++-----
 2 files changed, 7 insertions(+), 7 deletions(-)

diffs (27 lines):

diff -r 6467bbccd786 -r 1b28d523cca6 security/vault/Makefile
--- a/security/vault/Makefile   Thu Sep 06 19:07:12 2018 +0000
+++ b/security/vault/Makefile   Thu Sep 06 20:41:53 2018 +0000
@@ -1,6 +1,6 @@
-# $NetBSD: Makefile,v 1.31 2018/09/03 18:59:08 fhajny Exp $
+# $NetBSD: Makefile,v 1.32 2018/09/06 20:41:53 fhajny Exp $
 
-DISTNAME=      vault-0.11.0
+DISTNAME=      vault-0.11.1
 CATEGORIES=    security
 MASTER_SITES=  ${MASTER_SITE_GITHUB:=hashicorp/}
 
diff -r 6467bbccd786 -r 1b28d523cca6 security/vault/distinfo
--- a/security/vault/distinfo   Thu Sep 06 19:07:12 2018 +0000
+++ b/security/vault/distinfo   Thu Sep 06 20:41:53 2018 +0000
@@ -1,6 +1,6 @@
-$NetBSD: distinfo,v 1.20 2018/09/03 18:59:08 fhajny Exp $
+$NetBSD: distinfo,v 1.21 2018/09/06 20:41:53 fhajny Exp $
 
-SHA1 (vault-0.11.0.tar.gz) = bcccb2ffca44f0d746fb9ce0384bffbab5d8e243
-RMD160 (vault-0.11.0.tar.gz) = 0086bd162d55e3a681bd2b494e7451f0371d7667
-SHA512 (vault-0.11.0.tar.gz) = 33e1e76a0e16803a8d0d6ed8ec0b6d1f8876d54ecf35a70bc4969404bd7991ef0cc5986eae958885d288bb316396e0594a5571b7a11f8b052b22b445388f03c7
-Size (vault-0.11.0.tar.gz) = 24430984 bytes
+SHA1 (vault-0.11.1.tar.gz) = 06bcc72f2f4cbcc03ce9f3be6e986e75be481681
+RMD160 (vault-0.11.1.tar.gz) = ccfb2809b2ab0245a9a7cd834cea13b32e094747
+SHA512 (vault-0.11.1.tar.gz) = b9cbd8862d6bfe4f6e41f6fb916497af0429dde3ce15bb8c808cd57ca6c0e52e95ba165f4d57fd7051a611ac869e54d7b5758f6fc059ad6474c93353a4b14201
+Size (vault-0.11.1.tar.gz) = 24595293 bytes



Home | Main Index | Thread Index | Old Index