pkgsrc-WIP-changes archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
vault: Update to 1.4.0
Module Name: pkgsrc-wip
Committed By: Iku Iwasa <iku.iwasa%gmail.com@localhost>
Pushed By: iquiw
Date: Sat Apr 11 10:49:41 2020 +0900
Changeset: 9e849789c47e2ba92952825044123eb772a7e94c
Modified Files:
vault/Makefile
vault/distinfo
Log Message:
vault: Update to 1.4.0
CHANGES:
* cli: The raft configuration command has been renamed to list-peers to
avoid confusion.
FEATURES:
* Kerberos Authentication: Vault now supports Kerberos authentication using
a SPNEGO token. Login can be performed using the Vault CLI, API, or agent.
* Kubernetes Service Discovery: A new Kubernetes service discovery feature
where, if configured, Vault will tag Vault pods with their current health
status. For more, see #8249.
* MongoDB Atlas Secrets: Vault can now generate dynamic credentials for
both MongoDB Atlas databases as well as the Atlas programmatic interface.
* OpenLDAP Secrets Engine: We now support password management of existing
OpenLDAP user entries. For more, see #8360.
* Redshift Database Secrets Engine: The database secrets engine now
supports static and dynamic secrets for the Amazon Web Services (AWS)
Redshift service.
* Service Registration Config: A newly introduced service_registration
configuration stanza, that allows for service registration to be configured
separately from the storage backend. For more, see #7887.
* Transform Secrets Engine (Enterprise): A new secrets engine that handles
secure data transformation and tokenization against provided input value.
* Integrated Storage: Promoted out of beta and into general availability
for both open-source and enterprise workloads.
IMPROVEMENTS:
* agent: add option to force the use of the auth-auth token, and ignore the
Vault token in the request [GH-8101]
* api: Restore and fix DNS SRV Lookup [GH-8520]
* audit: HMAC http_raw_body in audit log; this ensures that large
authenticated Prometheus metrics responses get replaced with short HMAC
values [GH-8130]
* audit: Generate-root, generate-recovery-token, and
generate-dr-operation-token requests and responses are now
audited. [GH-8301]
* auth/aws: Reduce the number of simultaneous STS client credentials needed
[GH-8161]
* auth/azure: subscription ID, resource group, vm and vmss names are now
stored in alias metadata [GH-30]
* auth/jwt: Additional OIDC callback parameters available for CLI logins
[GH-80 & GH-86]
* auth/jwt: Bound claims may be optionally configured using globs [GH-89]
* auth/jwt: Timeout during OIDC CLI login if process doesn't complete
within 2 minutes [GH-97]
* auth/jwt: Add support for the form_post response mode [GH-98]
* auth/jwt: add optional client_nonce to authorization flow [GH-104]
* auth/okta: Upgrade okta sdk lib, which should improve handling of groups
[GH-8143]
* aws: Add support for v2 of the instance metadata service (see issue 7924
for all linked PRs)
* core: Separate out service discovery interface from storage interface to
allow new types of service discovery not coupled to storage [GH-7887]
* core: Add support for telemetry option metrics_prefix [GH-8340]
* core: Entropy Augmentation can now be used with AWS KMS and Vault Transit
seals
* core: Allow tls_min_version to be set to TLS 1.3 [GH-8305]
* cli: Incorrect TLS configuration will now correctly fail [GH-8025]
* identity: Allow specifying a custom client_id for identity tokens
[GH-8165]
* metrics/prometheus: improve performance with high volume of metrics
updates [GH-8507]
* replication (enterprise): Fix race condition causing clusters with high
throughput writes to sometimes fail to enter streaming-wal mode
* replication (enterprise): Secondary clusters can now perform an extra
gRPC call to all nodes in a primary cluster in an attempt to resolve the
active node's address
* replication (enterprise): The replication status API now outputs
last_performance_wal, last_dr_wal, and connection_state values
* replication (enterprise): DR secondary clusters can now be recovered by
the replication/dr/secondary/recover API
* replication (enterprise): We now allow for an alternate means to create a
Disaster Recovery token, by using a batch token that is created with an ACL
that allows for access to one or more of the DR endpoints.
* secrets/database/mongodb: Switched internal MongoDB driver to
mongo-driver [GH-8140]
* secrets/database/mongodb: Add support for x509 client authorization to
MongoDB [GH-8329]
* secrets/database/oracle: Add support for static credential rotation
[GH-26]
* secrets/consul: Add support to specify TLS options per Consul backend
[GH-4800]
* secrets/gcp: Allow specifying the TTL for a service key [GH-54]
* secrets/gcp: Add support for rotating root keys [GH-53]
* secrets/gcp: Handle version 3 policies for Resource Manager IAM requests
[GH-77]
* secrets/nomad: Add support to specify TLS options per Nomad backend
[GH-8083]
* secrets/ssh: Allowed users can now be templated with identity information
[GH-7548]
* secrets/transit: Adding RSA3072 key support [GH-8151]
* storage/consul: Vault returns now a more descriptive error message when
only a client cert or a client key has been provided [GH-4930]
* storage/raft: Nodes in the raft cluster can all be given possible leader
addresses for them to continuously try and join one of them, thus
automating the process of join to a greater extent [GH-7856]
* storage/raft: Fix a potential deadlock that could occur on leadership
transition [GH-8547]
* storage/raft: Refresh TLS keyring on snapshot restore [GH-8546]
* storage/etcd: Bumped etcd client API SDK [GH-7931 & GH-4961 & GH-4349 &
GH-7582]
* ui: Make Transit Key actions more prominent [GH-8304]
* ui: Add Core Usage Metrics [GH-8347]
* ui: Add refresh Namespace list on the Namespace dropdown, and redesign of
Namespace dropdown menu [GH-8442]
* ui: Update transit actions to codeblocks & automatically encode plaintext
unless indicated [GH-8462]
* ui: Display the results of transit key actions in a modal window
[GH-8462]
* ui: Transit key version styling updates & ability to copy key from
dropdown [GH-8480]
BUG FIXES:
* agent: Fix issue where TLS options are ignored for agent template feature
[GH-7889]
* auth/jwt: Use lower case role names for default_role to match the role
case convention [GH-100]
* auth/ldap: Fix a bug where the UPNDOMAIN parameter was wrongly used to
lookup the group membership of the given user [GH-6325]
* cli: Support autocompletion for nested mounts [GH-8303]
* cli: Fix CLI namespace autocompletion [GH-8315]
* identity: Fix incorrect caching of identity token JWKS responses
[GH-8412]
* metrics/stackdriver: Fix issue that prevents the stackdriver metrics
library to create unnecessary stackdriver descriptors [GH-8073]
* replication: Fix issue causing cubbyholes in namespaces on performance
secondaries to not work.
* seal (enterprise): Fix seal migration when transactional seal wrap
backend is in use.
* secrets/database/influxdb: Fix potential panic if connection to the
InfluxDB database cannot be established [GH-8282]
* secrets/database/mysql: Ensures default static credential rotation
statements are used [GH-8240]
* secrets/database/mysql: Fix inconsistent query parameter names: {{name}}
or {{username}} for different queries. Now it allows for either for
backwards compatibility [GH-8240]
* secrets/database/postgres: Fix inconsistent query parameter names:
{{name}} or {{username}} for different queries. Now it allows for either
for backwards compatibility [GH-8240]
* secrets/pki: Support FQDNs in DNS Name [GH-8288]
* storage/raft: Allow seal migration to be performed on Vault clusters
using raft storage [GH-8103]
* telemetry: Prometheus requests on standby nodes will now return an error
instead of forwarding the request to the active node [GH-8280]
* ui: Fix broken popup menu on the transit secrets list page [GH-8348]
* ui: Update headless Chrome flag to fix yarn run test:oss [GH-8035]
* ui: Update CLI to accept empty strings as param value to reset
previously-set values
* ui: Fix bug where error states don't clear when moving between action
tabs on Transit [GH-8354]
To see a diff of this commit:
https://wip.pkgsrc.org/cgi-bin/gitweb.cgi?p=pkgsrc-wip.git;a=commitdiff;h=9e849789c47e2ba92952825044123eb772a7e94c
Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.
diffstat:
vault/Makefile | 2 +-
vault/distinfo | 8 ++++----
2 files changed, 5 insertions(+), 5 deletions(-)
diffs:
diff --git a/vault/Makefile b/vault/Makefile
index c90bc460ac..80142407ce 100644
--- a/vault/Makefile
+++ b/vault/Makefile
@@ -1,6 +1,6 @@
# $NetBSD$
-DISTNAME= vault-1.3.4
+DISTNAME= vault-1.4.0
CATEGORIES= security
MASTER_SITES= ${MASTER_SITE_GITHUB:=hashicorp/}
diff --git a/vault/distinfo b/vault/distinfo
index 1ebefd284d..a0a9923ee0 100644
--- a/vault/distinfo
+++ b/vault/distinfo
@@ -1,8 +1,8 @@
$NetBSD$
-SHA1 (vault-1.3.4.tar.gz) = 6f9afae2d5b6a462d3021dee6ab226143aa92b23
-RMD160 (vault-1.3.4.tar.gz) = 1910fae1d6b003d88de536d103a24f00adbcb007
-SHA512 (vault-1.3.4.tar.gz) = efae914ef76fb314d4652246fab468970f7b57d66af38453e3a0c74444f1879d049811cc09b7e059e1d9ea2b82c0b71de81cf54dce51778c8300247157d9a7c2
-Size (vault-1.3.4.tar.gz) = 31120568 bytes
+SHA1 (vault-1.4.0.tar.gz) = bf0826b737fc1c829ff76fbbf7aa98fe7b75d5cc
+RMD160 (vault-1.4.0.tar.gz) = de972aef35a0500aa69f4c277e83c1baec0be67d
+SHA512 (vault-1.4.0.tar.gz) = 13c1fb901fe577d91f2734f8a0ae5e51083e1307e7fc32a4388a1be48f2c46cd3d121432fa7450d6f9b439285d3ad5819b123631f41bb347e8d75ce683d24a7e
+Size (vault-1.4.0.tar.gz) = 33097110 bytes
SHA1 (patch-vendor_github.com_ory_dockertest_docker_pkg_system_stat__netbsd.go) = 723ce00bc56771008074e5d77efd465501fda2bb
SHA1 (patch-vendor_github.com_ory_dockertest_docker_pkg_term_termios__bsd.go) = 9696daf0158de14d8756748b0dc5398be9ff64f4
Home |
Main Index |
Thread Index |
Old Index