pkgsrc-Changes-HG archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
[pkgsrc/trunk]: pkgsrc/security/vault Update security/vault to 0.6.5.
details: https://anonhg.NetBSD.org/pkgsrc/rev/48abf3340ca2
branches: trunk
changeset: 358472:48abf3340ca2
user: fhajny <fhajny%pkgsrc.org@localhost>
date: Mon Feb 13 14:23:08 2017 +0000
description:
Update security/vault to 0.6.5.
FEATURES:
- Okta Authentication: A new Okta authentication backend allows you to use
Okta usernames and passwords to authenticate to Vault. If provided with an
appropriate Okta API token, group membership can be queried to assign
policies; users and groups can be defined locally as well.
- RADIUS Authentication: A new RADIUS authentication backend allows using
a RADIUS server to authenticate to Vault. Policies can be configured for
specific users or for any authenticated user.
- Exportable Transit Keys: Keys in `transit` can now be marked as
`exportable` at creation time. This allows a properly ACL'd user to retrieve
the associated signing key, encryption key, or HMAC key. The `exportable`
value is returned on a key policy read and cannot be changed, so if a key is
marked `exportable` it will always be exportable, and if it is not it will
never be exportable.
- Batch Transit Operations: `encrypt`, `decrypt` and `rewrap` operations
in the transit backend now support processing multiple input items in one
call, returning the output of each item in the response.
- Configurable Audited HTTP Headers: You can now specify headers that you
want to have included in each audit entry, along with whether each header
should be HMAC'd or kept plaintext. This can be useful for adding additional
client or network metadata to the audit logs.
- Transit Backend UI (Enterprise): Vault Enterprise UI now supports the transit
backend, allowing creation, viewing and editing of named keys as well as using
those keys to perform supported transit operations directly in the UI.
- Socket Audit Backend A new socket audit backend allows audit logs to be sent
through TCP, UDP, or UNIX Sockets.
IMPROVEMENTS:
- auth/aws-ec2: Add support for cross-account auth using STS
- auth/aws-ec2: Support issuing periodic tokens
- auth/github: Support listing teams and users
- auth/ldap: Support adding policies to local users directly, in addition to
local groups
- command/server: Add ability to select and prefer server cipher suites
- core: Add a nonce to unseal operations as a check (useful mostly for
support, not as a security principle)
- duo: Added ability to supply extra context to Duo pushes
- physical/consul: Add option for setting consistency mode on Consul gets
- physical/etcd: Full v3 API support; code will autodetect which API version
to use. The v3 code path is significantly less complicated and may be much
more stable.
- secret/pki: Allow specifying OU entries in generated certificate subjects
- secret mount ui (Enterprise): the secret mount list now shows all mounted
backends even if the UI cannot browse them. Additional backends can now be
mounted from the UI as well.
BUG FIXES:
- auth/token: Fix regression in 0.6.4 where using token store roles as a
blacklist (with only `disallowed_policies` set) would not work in most
circumstances
- physical/s3: Page responses in client so list doesn't truncate
- secret/cassandra: Stop a connection leak that could occur on active node
failover
- secret/pki: When using `sign-verbatim`, don't require a role and use the
CSR's common name
diffstat:
security/vault/Makefile | 4 ++--
security/vault/distinfo | 10 +++++-----
2 files changed, 7 insertions(+), 7 deletions(-)
diffs (27 lines):
diff -r 0d12c0be5f63 -r 48abf3340ca2 security/vault/Makefile
--- a/security/vault/Makefile Mon Feb 13 14:18:31 2017 +0000
+++ b/security/vault/Makefile Mon Feb 13 14:23:08 2017 +0000
@@ -1,6 +1,6 @@
-# $NetBSD: Makefile,v 1.8 2017/01/03 07:44:01 fhajny Exp $
+# $NetBSD: Makefile,v 1.9 2017/02/13 14:23:08 fhajny Exp $
-DISTNAME= vault-0.6.4
+DISTNAME= vault-0.6.5
CATEGORIES= security
MASTER_SITES= ${MASTER_SITE_GITHUB:=hashicorp/}
diff -r 0d12c0be5f63 -r 48abf3340ca2 security/vault/distinfo
--- a/security/vault/distinfo Mon Feb 13 14:18:31 2017 +0000
+++ b/security/vault/distinfo Mon Feb 13 14:23:08 2017 +0000
@@ -1,6 +1,6 @@
-$NetBSD: distinfo,v 1.4 2017/01/03 07:44:01 fhajny Exp $
+$NetBSD: distinfo,v 1.5 2017/02/13 14:23:08 fhajny Exp $
-SHA1 (vault-0.6.4.tar.gz) = 788539891a2ad0d358b35aba9fddbac90a60b6f9
-RMD160 (vault-0.6.4.tar.gz) = d4b0dee5d372ece57ae21c307e460137cc575404
-SHA512 (vault-0.6.4.tar.gz) = 413d3072ce99cd3a7bb39523ee2791b7839fb3887511ab620390c18aa498c8cb0d4376846a6d57dca616e968f72b720b63745153c470b539d6ce6c4dcd218c5e
-Size (vault-0.6.4.tar.gz) = 5167905 bytes
+SHA1 (vault-0.6.5.tar.gz) = 2c80398d09436abfcb24a8abcda77ef5c00872d5
+RMD160 (vault-0.6.5.tar.gz) = adfd8ca147a73ac771423f113a548e6eed995dfc
+SHA512 (vault-0.6.5.tar.gz) = 3a135281a2135aae45e9a659b0492d37069b080f42956f8a1fdbf842a8a1e54b474b7c5b48c0e6170b206fdb52da7a718a9702d5a14d3aa99f8e560839268374
+Size (vault-0.6.5.tar.gz) = 5628341 bytes
Home |
Main Index |
Thread Index |
Old Index