pkgsrc-Changes-HG archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
[pkgsrc/trunk]: pkgsrc/security/vault security/vault: Update to 0.11.1.
details: https://anonhg.NetBSD.org/pkgsrc/rev/4bdbc0610ee3
branches: trunk
changeset: 312574:4bdbc0610ee3
user: fhajny <fhajny%pkgsrc.org@localhost>
date: Thu Sep 06 20:41:53 2018 +0000
description:
security/vault: Update to 0.11.1.
SECURITY:
- Random Byte Reading in Barrier: Prior to this release, Vault was not
properly checking the error code when reading random bytes for the IV for
AES operations in its cryptographic barrier. Specifically, this means that
such an IV could potentially be zero multiple times, causing nonce re-use
and weakening the security of the key. On most platforms this should never
happen because reading from kernel random sources is non-blocking and always
successful, but there may be platform-specific behavior that has not been
accounted for. (Vault has tests to check exactly this, and the tests have
never seen nonce re-use.)
FEATURES:
- AliCloud Agent Support: Vault Agent can now authenticate against the
AliCloud auth method.
- UI: Enable AliCloud auth method and Azure secrets engine via the UI.
IMPROVEMENTS:
- core: Logging level for most logs (not including secrets/auth plugins) can
now be changed on-the-fly via `SIGHUP`, reading the desired value from
Vault's config file
BUG FIXES:
- core: Ensure we use a background context when stepping down
- core: Properly check error return from random byte reading
- core: Re-add `sys/` top-route injection for now
- core: Properly store the replication checkpoint file if it's larger than the
storage engine's per-item limit
- identity: Update MemDB with identity group alias while loading groups
- secrets/database: Fix nil pointer when revoking some leases
- secrets/pki: Fix sign-verbatim losing extra Subject attributes
- secrets/pki: Remove certificates from store when tidying revoked
certificates and simplify API
- ui: JSON editor will not coerce input to an object, and will now show an
error about Vault expecting an object
- ui: authentication form will now default to any methods that have been tuned
to show up for unauthenticated users
diffstat:
security/vault/Makefile | 4 ++--
security/vault/distinfo | 10 +++++-----
2 files changed, 7 insertions(+), 7 deletions(-)
diffs (27 lines):
diff -r a3bd1ddbd52f -r 4bdbc0610ee3 security/vault/Makefile
--- a/security/vault/Makefile Thu Sep 06 19:07:12 2018 +0000
+++ b/security/vault/Makefile Thu Sep 06 20:41:53 2018 +0000
@@ -1,6 +1,6 @@
-# $NetBSD: Makefile,v 1.31 2018/09/03 18:59:08 fhajny Exp $
+# $NetBSD: Makefile,v 1.32 2018/09/06 20:41:53 fhajny Exp $
-DISTNAME= vault-0.11.0
+DISTNAME= vault-0.11.1
CATEGORIES= security
MASTER_SITES= ${MASTER_SITE_GITHUB:=hashicorp/}
diff -r a3bd1ddbd52f -r 4bdbc0610ee3 security/vault/distinfo
--- a/security/vault/distinfo Thu Sep 06 19:07:12 2018 +0000
+++ b/security/vault/distinfo Thu Sep 06 20:41:53 2018 +0000
@@ -1,6 +1,6 @@
-$NetBSD: distinfo,v 1.20 2018/09/03 18:59:08 fhajny Exp $
+$NetBSD: distinfo,v 1.21 2018/09/06 20:41:53 fhajny Exp $
-SHA1 (vault-0.11.0.tar.gz) = bcccb2ffca44f0d746fb9ce0384bffbab5d8e243
-RMD160 (vault-0.11.0.tar.gz) = 0086bd162d55e3a681bd2b494e7451f0371d7667
-SHA512 (vault-0.11.0.tar.gz) = 33e1e76a0e16803a8d0d6ed8ec0b6d1f8876d54ecf35a70bc4969404bd7991ef0cc5986eae958885d288bb316396e0594a5571b7a11f8b052b22b445388f03c7
-Size (vault-0.11.0.tar.gz) = 24430984 bytes
+SHA1 (vault-0.11.1.tar.gz) = 06bcc72f2f4cbcc03ce9f3be6e986e75be481681
+RMD160 (vault-0.11.1.tar.gz) = ccfb2809b2ab0245a9a7cd834cea13b32e094747
+SHA512 (vault-0.11.1.tar.gz) = b9cbd8862d6bfe4f6e41f6fb916497af0429dde3ce15bb8c808cd57ca6c0e52e95ba165f4d57fd7051a611ac869e54d7b5758f6fc059ad6474c93353a4b14201
+Size (vault-0.11.1.tar.gz) = 24595293 bytes
Home |
Main Index |
Thread Index |
Old Index