pkgsrc-WIP-changes archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

vault: Update to 1.3.2

Module Name:	pkgsrc-wip
Committed By:	Iku Iwasa <>
Pushed By:	iquiw
Date:		Sun Jan 26 10:23:14 2020 +0900
Changeset:	59d3e10dcfd176761688eab55c27185ae1a2c25e

Modified Files:

Log Message:
vault: Update to 1.3.2


* When deleting a namespace on Vault Enterprise, in certain circumstances,
  the deletion process will fail to revoke dynamic secrets for a mount in
  that namespace. This will leave any dynamic secrets in remote systems alive
  and will fail to clean them up. This vulnerability, CVE-2020-7220, affects
  Vault Enterprise 0.11.0 and newer.


* auth/aws: Add aws metadata to identity alias [GH-7975]
* auth/kubernetes: Allow both names and namespaces to be set to "*" [GH-78]


* auth/azure: Fix Azure compute client to use correct base URL [AZURE-27]
* auth/ldap: Fix renewal of tokens without cofigured policies that are
  generated by an LDAP login [GH-8072]
* auth/okta: Fix renewal of tokens without configured policies that are
  generated by an Okta login [GH-8072]
* core: Fix seal migration error when attempting to migrate from auto
  unseal to shamir [GH-8172]
* core: Fix seal migration config issue when migrating from auto unseal to
  auto unseal [GH-8172]
* plugin: Fix issue where a plugin unwrap request potentially used an
  expired token [GH-8058]
* replication: Fix issue where a forwarded request from a
  performance/standby node could run into a timeout
* secrets/database: Fix issue where a manual static role rotation could
  potentially panic [GH-8098]
* secrets/database: Fix issue where a manual root credential rotation
  request is not forwarded to the primary node [GH-8125]
* secrets/database: Fix issue where a manual static role rotation request
  is not forwarded to the primary node [GH-8126]
* secrets/database/mysql: Fix issue where special characters for a MySQL
  password were encoded [GH-8040]
* ui: Fix deleting namespaces [GH-8132]
* ui: Fix Error handler on kv-secret edit and kv-secret view pages
* ui: Fix OIDC callback to check storage [GH-7929].
* ui: Change .box-radio height to min-height to prevent overflow issues

To see a diff of this commit:;a=commitdiff;h=59d3e10dcfd176761688eab55c27185ae1a2c25e

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

 vault/Makefile | 3 +--
 vault/distinfo | 8 ++++----
 2 files changed, 5 insertions(+), 6 deletions(-)

diff --git a/vault/Makefile b/vault/Makefile
index e941b97cd7..6bc14f57a4 100644
--- a/vault/Makefile
+++ b/vault/Makefile
@@ -1,7 +1,6 @@
 # $NetBSD$
-DISTNAME=	vault-1.3.1
+DISTNAME=	vault-1.3.2
 CATEGORIES=	security
diff --git a/vault/distinfo b/vault/distinfo
index c22ffc86f0..daf4ba2f54 100644
--- a/vault/distinfo
+++ b/vault/distinfo
@@ -1,8 +1,8 @@
-SHA1 (vault-1.3.1.tar.gz) = 6928209d3760003babeed6852a7cd4c800bdf3b8
-RMD160 (vault-1.3.1.tar.gz) = 51c28b46abe211c91a2330a4b677f9c1b9a277f4
-SHA512 (vault-1.3.1.tar.gz) = 082833136d4fd4ab0986243dc36c5b39786ab379eb30d21096412bd68a4f5024b24ebc9ebd07cbcf6ef65e3a6753774dd4f38c57b071ce6b126d54ef53c100bb
-Size (vault-1.3.1.tar.gz) = 31112300 bytes
+SHA1 (vault-1.3.2.tar.gz) = 0842c52a74908c92ecc2930def564f47b6b72d79
+RMD160 (vault-1.3.2.tar.gz) = 0d5ea75cabc52cd6e85cc8de8f2c5e888ebafdc2
+SHA512 (vault-1.3.2.tar.gz) = 7335be2e16a1b39e94d0d8c32537cc8401f5f449b9cd6936cd72fe9f8da68e5c1c7521bd51f32eedd39ee67e637a04387388e34b78ef701cf16a96a66071577a
+Size (vault-1.3.2.tar.gz) = 31119205 bytes
 SHA1 (patch-vendor_github.com_ory_dockertest_docker_pkg_system_stat__netbsd.go) = 723ce00bc56771008074e5d77efd465501fda2bb
 SHA1 (patch-vendor_github.com_ory_dockertest_docker_pkg_term_termios__bsd.go) = 9696daf0158de14d8756748b0dc5398be9ff64f4

Home | Main Index | Thread Index | Old Index