pkgsrc-WIP-changes archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
vault: update to version 1.12.2.
Module Name: pkgsrc-wip
Committed By: Havard Eidnes <he%NetBSD.org@localhost>
Pushed By: he
Date: Thu Dec 1 14:01:13 2022 +0100
Changeset: 343340604a1ff1c2f0051725f39f5d19d1e0f1ae
Modified Files:
vault/Makefile
vault/distinfo
vault/go-modules.mk
Log Message:
vault: update to version 1.12.2.
Pkgsrc changes:
* Only version number, go-modules.mk and checksums.
Upstream changes:
1.12.2
November 30, 2022
CHANGES:
* core: Bump Go version to 1.19.3.
* plugins: Mounts can no longer be pinned to a specific builtin
version. Mounts previously pinned to a specific builtin version
will now automatically upgrade to the latest builtin version, and
may now be overridden if an unversioned plugin of the same name
and type is registered. Mounts using plugin versions without
builtin in their metadata remain unaffected. [GH-18051]
IMPROVEMENTS:
* secrets/pki: Allow issuer creation, import to change default
issuer via default_follows_latest_issuer. [GH-17824]
* storage/raft: Add retry_join_as_non_voter config option. [GH-18030]
BUG FIXES:
* auth/okta: fix a panic for AuthRenew in Okta [GH-18011]
* auth: Deduplicate policies prior to ACL generation [GH-17914]
* cli: Fix issue preventing kv commands from executing properly
when the mount path provided by -mount flag and secret key path
are the same. [GH-17679]
* core (enterprise): Supported storage check in vault server
command will no longer prevent startup. Instead, a warning will
be logged if configured to use storage backend other than raft
or consul.
* core/quotas (enterprise): Fix a lock contention issue that could
occur and cause Vault to become unresponsive when creating,
changing, or deleting lease count quotas.
* core: Fix potential deadlock if barrier ciphertext is less than
4 bytes. [GH-17944]
* core: fix a start up race condition where performance standbys
could go into a mount loop if default policies are not yet synced
from the active node. [GH-17801]
* plugins: Only report deprecation status for builtin plugins. [GH-17816]
* plugins: Vault upgrades will no longer fail if a mount has been
created using an explicit builtin plugin version. [GH-18051]
* secret/pki: fix bug with initial legacy bundle migration (from
< 1.11 into 1.11+) and missing issuers from ca_chain [GH-17772]
* secrets/azure: add WAL to clean up role assignments if errors
occur [GH-18086]
* secrets/gcp: Fixes duplicate service account key for rotate root
on standby or secondary [GH-18111]
* secrets/pki: Fix upgrade of missing expiry, delta_rebuild_interval
by setting them to the default. [GH-17693]
* ui: Fixes issue with not being able to download raft snapshot
via service worker [GH-17769]
* ui: fix entity policies list link to policy show page [GH-17950]
To see a diff of this commit:
https://wip.pkgsrc.org/cgi-bin/gitweb.cgi?p=pkgsrc-wip.git;a=commitdiff;h=343340604a1ff1c2f0051725f39f5d19d1e0f1ae
Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.
diffstat:
vault/Makefile | 2 +-
vault/distinfo | 30 +++++++++++++++---------------
vault/go-modules.mk | 8 ++++----
3 files changed, 20 insertions(+), 20 deletions(-)
diffs:
diff --git a/vault/Makefile b/vault/Makefile
index d1b2f7341d..cee402d48d 100644
--- a/vault/Makefile
+++ b/vault/Makefile
@@ -1,6 +1,6 @@
# $NetBSD$
-DISTNAME= vault-1.12.1
+DISTNAME= vault-1.12.2
CATEGORIES= security
MASTER_SITES= ${MASTER_SITE_GITHUB:=hashicorp/}
diff --git a/vault/distinfo b/vault/distinfo
index 6014f0975b..8eebf8c2cb 100644
--- a/vault/distinfo
+++ b/vault/distinfo
@@ -3300,18 +3300,18 @@ Size (github.com_hashicorp_vault-plugin-secrets-alicloud_@v_v0.13.0.mod) = 582 b
BLAKE2s (github.com_hashicorp_vault-plugin-secrets-alicloud_@v_v0.13.0.zip) = 999663a37513447300bea76c6f473c4100ab8dc1be6cfb3bf5f3b85bcd238636
SHA512 (github.com_hashicorp_vault-plugin-secrets-alicloud_@v_v0.13.0.zip) = ed4d6fb18d72bcbffc71b5c225d1ed15f6283a17b44a76efb266dda803f6f2b6f513724b4f42334f2915fb36d234801a4aa80e4ce2502f8d00cfa6b256cb6718
Size (github.com_hashicorp_vault-plugin-secrets-alicloud_@v_v0.13.0.zip) = 50789 bytes
-BLAKE2s (github.com_hashicorp_vault-plugin-secrets-azure_@v_v0.14.0.mod) = edcd567a15f61029617c6e13c75984b39352aa273c9b1c3ff68cd8e8b4416e21
-SHA512 (github.com_hashicorp_vault-plugin-secrets-azure_@v_v0.14.0.mod) = eb74244fd35674275e34540d2ce7127d862517f83547187a5d8ac9bc8a3b0875b9a4316113d536ba58df875e16d9ed8cb12c9f96c362b18b54c17b5b077b3b30
-Size (github.com_hashicorp_vault-plugin-secrets-azure_@v_v0.14.0.mod) = 920 bytes
-BLAKE2s (github.com_hashicorp_vault-plugin-secrets-azure_@v_v0.14.0.zip) = 225ddc9b731c94233f1e214beb5da48c8e6fea0564747635e4d5a8ce15935fa8
-SHA512 (github.com_hashicorp_vault-plugin-secrets-azure_@v_v0.14.0.zip) = d1d9adf9e8f8647f468df5a2f8bb9bd00619859c4654347cab9dfdcd83d2a507bf3dd7f2dd8ec75e611cc0db55cd14e675e204fc9f060eb3d04e39b245ecce98
-Size (github.com_hashicorp_vault-plugin-secrets-azure_@v_v0.14.0.zip) = 89360 bytes
-BLAKE2s (github.com_hashicorp_vault-plugin-secrets-gcp_@v_v0.14.0.mod) = 5631c61831e3beadec0a9d578cce654259a0f4b8b314d22061cc207b7d37cf38
-SHA512 (github.com_hashicorp_vault-plugin-secrets-gcp_@v_v0.14.0.mod) = 2f450f9ddd69970c848e0e4899a1babd1e95e1b95ae890c22d5b97855baff08b1756668f4ce58dc08f09eb0a578d764cf417068fc0a145df89b5bce499fa6fed
-Size (github.com_hashicorp_vault-plugin-secrets-gcp_@v_v0.14.0.mod) = 675 bytes
-BLAKE2s (github.com_hashicorp_vault-plugin-secrets-gcp_@v_v0.14.0.zip) = ebb3ad3244507d1df5cbccfe2839a42f7b99e8de76fc4936f72af116fe401b16
-SHA512 (github.com_hashicorp_vault-plugin-secrets-gcp_@v_v0.14.0.zip) = aef1106bc3f8580cc7fc0f47b5af7b675579b609cc4f10e48f466454d25c2f8223cd14b957094edce116eadb31c09a7c64b69dbbebaf6aad5c36f8846bfa105d
-Size (github.com_hashicorp_vault-plugin-secrets-gcp_@v_v0.14.0.zip) = 133373 bytes
+BLAKE2s (github.com_hashicorp_vault-plugin-secrets-azure_@v_v0.14.1.mod) = edcd567a15f61029617c6e13c75984b39352aa273c9b1c3ff68cd8e8b4416e21
+SHA512 (github.com_hashicorp_vault-plugin-secrets-azure_@v_v0.14.1.mod) = eb74244fd35674275e34540d2ce7127d862517f83547187a5d8ac9bc8a3b0875b9a4316113d536ba58df875e16d9ed8cb12c9f96c362b18b54c17b5b077b3b30
+Size (github.com_hashicorp_vault-plugin-secrets-azure_@v_v0.14.1.mod) = 920 bytes
+BLAKE2s (github.com_hashicorp_vault-plugin-secrets-azure_@v_v0.14.1.zip) = b6758cc9a7d6151d589f2eb8aca02538c76f2bd7ccf4bd8ab5e6bf2a2904f495
+SHA512 (github.com_hashicorp_vault-plugin-secrets-azure_@v_v0.14.1.zip) = 883d48034ca76b90cb56f45e93fb1b47858202ba031f469afc6623577a467c2ab03b594774ec1d50e95596a7e2bb6a4fe37af581582f51d84222460c439b0c3f
+Size (github.com_hashicorp_vault-plugin-secrets-azure_@v_v0.14.1.zip) = 91016 bytes
+BLAKE2s (github.com_hashicorp_vault-plugin-secrets-gcp_@v_v0.14.1.mod) = 5631c61831e3beadec0a9d578cce654259a0f4b8b314d22061cc207b7d37cf38
+SHA512 (github.com_hashicorp_vault-plugin-secrets-gcp_@v_v0.14.1.mod) = 2f450f9ddd69970c848e0e4899a1babd1e95e1b95ae890c22d5b97855baff08b1756668f4ce58dc08f09eb0a578d764cf417068fc0a145df89b5bce499fa6fed
+Size (github.com_hashicorp_vault-plugin-secrets-gcp_@v_v0.14.1.mod) = 675 bytes
+BLAKE2s (github.com_hashicorp_vault-plugin-secrets-gcp_@v_v0.14.1.zip) = 7fff3d574562634710a2cbb0628976fac814fd2ad1292508e6b5309abd854963
+SHA512 (github.com_hashicorp_vault-plugin-secrets-gcp_@v_v0.14.1.zip) = 8af83b57d5b5e92343b42641194ab6964042f44be426eaa2d3001dfb64294ac7b193fb2754d453afa13438e8851902b8a722893b6d163a80abb4c9c1696a5269
+Size (github.com_hashicorp_vault-plugin-secrets-gcp_@v_v0.14.1.zip) = 133469 bytes
BLAKE2s (github.com_hashicorp_vault-plugin-secrets-gcpkms_@v_v0.13.0.mod) = e5ed1e3f4849572049a9473e5d1e3b234f7d0abbbbb254b69a5052eccc86acda
SHA512 (github.com_hashicorp_vault-plugin-secrets-gcpkms_@v_v0.13.0.mod) = 2d3015f7ed5ed8c68ed9bb387bb85c6a63647710fdb3e9568fbf5024c924a95e51849595360b7b54aa1778ae1b07470655455dd9c2c5b22fa25e7eca62cc7945
Size (github.com_hashicorp_vault-plugin-secrets-gcpkms_@v_v0.13.0.mod) = 1053 bytes
@@ -7851,6 +7851,6 @@ Size (sigs.k8s.io_yaml_@v_v1.2.0.mod) = 106 bytes
BLAKE2s (sigs.k8s.io_yaml_@v_v1.2.0.zip) = 196614bfe35a861524f0dd2e2e0b63fbd650b889bab18114f167720f05506b70
SHA512 (sigs.k8s.io_yaml_@v_v1.2.0.zip) = 52a52b3d380ae6e2cbe1b2c849d3089f74aa876fb3fadfbd02eada97446e0f2cf387f10ddb527f2dfefd57dccba8c82b0b349efbecaa0e6e3d00dc2b5d4fc21e
Size (sigs.k8s.io_yaml_@v_v1.2.0.zip) = 20937 bytes
-BLAKE2s (vault-1.12.1.tar.gz) = 58f0f6a7178ee843d478cc19cda28c885bebbee4c4a9d49a3e1e9eb11551d6c8
-SHA512 (vault-1.12.1.tar.gz) = deed26c9a8effc196e4714d31c774d58a4353f6066cb1d54203c5ab194b93d3fed822dfbe4490aab3e55f9ee0b650d7105b6c654f53e4610f1202cca5c718144
-Size (vault-1.12.1.tar.gz) = 30132130 bytes
+BLAKE2s (vault-1.12.2.tar.gz) = 365418a576018f90ed203cc69239f669a841c789ce87d883c206cf15aa422add
+SHA512 (vault-1.12.2.tar.gz) = 83d48defca869624c1e0dbd6d37f1d83d0aec355bf9a83dee557c42f2b534f14d7db5293d3292b6765eef6d5f06d74df30142e5fd460397561283e4e37aee3a4
+Size (vault-1.12.2.tar.gz) = 30153275 bytes
diff --git a/vault/go-modules.mk b/vault/go-modules.mk
index 25b6ab1b04..4b9f69499d 100644
--- a/vault/go-modules.mk
+++ b/vault/go-modules.mk
@@ -1100,10 +1100,10 @@ GO_MODULE_FILES+= github.com/hashicorp/vault-plugin-secrets-ad/@v/v0.14.0.mod
GO_MODULE_FILES+= github.com/hashicorp/vault-plugin-secrets-ad/@v/v0.14.0.zip
GO_MODULE_FILES+= github.com/hashicorp/vault-plugin-secrets-alicloud/@v/v0.13.0.mod
GO_MODULE_FILES+= github.com/hashicorp/vault-plugin-secrets-alicloud/@v/v0.13.0.zip
-GO_MODULE_FILES+= github.com/hashicorp/vault-plugin-secrets-azure/@v/v0.14.0.mod
-GO_MODULE_FILES+= github.com/hashicorp/vault-plugin-secrets-azure/@v/v0.14.0.zip
-GO_MODULE_FILES+= github.com/hashicorp/vault-plugin-secrets-gcp/@v/v0.14.0.mod
-GO_MODULE_FILES+= github.com/hashicorp/vault-plugin-secrets-gcp/@v/v0.14.0.zip
+GO_MODULE_FILES+= github.com/hashicorp/vault-plugin-secrets-azure/@v/v0.14.1.mod
+GO_MODULE_FILES+= github.com/hashicorp/vault-plugin-secrets-azure/@v/v0.14.1.zip
+GO_MODULE_FILES+= github.com/hashicorp/vault-plugin-secrets-gcp/@v/v0.14.1.mod
+GO_MODULE_FILES+= github.com/hashicorp/vault-plugin-secrets-gcp/@v/v0.14.1.zip
GO_MODULE_FILES+= github.com/hashicorp/vault-plugin-secrets-gcpkms/@v/v0.13.0.mod
GO_MODULE_FILES+= github.com/hashicorp/vault-plugin-secrets-gcpkms/@v/v0.13.0.zip
GO_MODULE_FILES+= github.com/hashicorp/vault-plugin-secrets-kubernetes/@v/v0.2.0.mod
Home |
Main Index |
Thread Index |
Old Index