pkgsrc-WIP-changes archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
vault: Update to 1.5.4
Module Name: pkgsrc-wip
Committed By: Iku Iwasa <iku.iwasa%gmail.com@localhost>
Pushed By: iquiw
Date: Sat Sep 26 14:04:33 2020 +0900
Changeset: d0ddae968fdc4a403e98dc6a6ff0fc53cc763226
Modified Files:
vault/Makefile
vault/distinfo
Log Message:
vault: Update to 1.5.4
SECURITY:
* Batch Token Expiry: We addressed an issue where batch token leases could
outlive their TTL because we were not scheduling the expiration time
correctly. This vulnerability affects Vault OSS and Vault Enterprise 1.0
and newer and is fixed in 1.4.7 and 1.5.4 (CVE-2020-25816).
IMPROVEMENTS:
* secrets/pki: Handle expiration of a cert not in storage as a success
[GH-9880]
* auth/kubernetes: Add an option to disable defaulting to the local CA cert
and service account JWT when running in a Kubernetes pod [GH-97]
* secrets/gcp: Add check for 403 during rollback to prevent repeated
deletion calls [GH-97]
* core: Disable usage metrics collection on performance standby
nodes. [GH-9966]
* credential/aws: Added X-Amz-Content-Sha256 as a default STS request
header [GH-10009]
BUG FIXES:
* agent: Fix disable_fast_negotiation not being set on the auth method when
configured by user. [GH-9892]
* core (enterprise): Fix hang when cluster-wide plugin reload cleanup is
slow on unseal
* core (enterprise): Fix an error in cluster-wide plugin reload cleanup
following such a reload
* core: Fix crash when metrics collection encounters zero-length keys in KV
store [GH-9811]
* mfa (enterprise): Fix incorrect handling of PingID responses that could
result in auth requests failing
* replication (enterprise): Improve race condition when using a newly
created token on a performance standby node
* replication (enterprise): Only write failover cluster addresses if
they've changed
* ui: fix bug where dropdown for identity/entity management is not
reflective of actual policy [GH-9958]
To see a diff of this commit:
https://wip.pkgsrc.org/cgi-bin/gitweb.cgi?p=pkgsrc-wip.git;a=commitdiff;h=d0ddae968fdc4a403e98dc6a6ff0fc53cc763226
Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.
diffstat:
vault/Makefile | 2 +-
vault/distinfo | 8 ++++----
2 files changed, 5 insertions(+), 5 deletions(-)
diffs:
diff --git a/vault/Makefile b/vault/Makefile
index 1dd20b676e..94a58543a8 100644
--- a/vault/Makefile
+++ b/vault/Makefile
@@ -1,6 +1,6 @@
# $NetBSD$
-DISTNAME= vault-1.5.3
+DISTNAME= vault-1.5.4
CATEGORIES= security
MASTER_SITES= ${MASTER_SITE_GITHUB:=hashicorp/}
diff --git a/vault/distinfo b/vault/distinfo
index 26eb6e1e94..514d63b822 100644
--- a/vault/distinfo
+++ b/vault/distinfo
@@ -1,9 +1,9 @@
$NetBSD$
-SHA1 (vault-1.5.3.tar.gz) = ca11b81ffe657004023bd0388665bfe35ffe5962
-RMD160 (vault-1.5.3.tar.gz) = ad3b62e2e799c326dea17ea152b1a3b149fc10ea
-SHA512 (vault-1.5.3.tar.gz) = 2eaeabf939c20e914319f0038f7b2cea219618a5f830a7d250f4de447b1b7e9fab9fee611752fcd26086b67c3b5e32f403a88d4e7da1d94f34570e1a210bc4f8
-Size (vault-1.5.3.tar.gz) = 35123873 bytes
+SHA1 (vault-1.5.4.tar.gz) = 3ee6842614f41be471e9873ae80328c8f862788d
+RMD160 (vault-1.5.4.tar.gz) = 94c82a572a1e3b2f6483adf842d37a2ef1042732
+SHA512 (vault-1.5.4.tar.gz) = 9a3d4d30a61e89aeb5c622fa82dcbc0fed28ae17fce8c6f29c71cb47784aae57f08b0cad5532e18178683f823581e306b5a37e5d2391af7dec3bd9a6889ab75d
+Size (vault-1.5.4.tar.gz) = 35116452 bytes
SHA1 (patch-vendor_github.com_docker_docker_client_client__unix.go) = 51a400f6adaa6abe4cd42c31cfba4f037d9d81e5
SHA1 (patch-vendor_github.com_docker_docker_pkg_system_stat__netbsd.go) = 125e35b6f5e9a0cdec8c0a5e0b7c67cc326467ea
SHA1 (patch-vendor_github.com_ory_dockertest_docker_pkg_system_stat__netbsd.go) = 723ce00bc56771008074e5d77efd465501fda2bb
Home |
Main Index |
Thread Index |
Old Index