summaryrefslogtreecommitdiff
path: root/security/vault
diff options
context:
space:
mode:
authorfhajny <fhajny@pkgsrc.org>2017-02-13 14:23:08 +0000
committerfhajny <fhajny@pkgsrc.org>2017-02-13 14:23:08 +0000
commit4578ddf4fc593fa163f54cdb1927587250a10ab2 (patch)
tree82e53f8ae91bf554f37aadebb999b102fd01c8d1 /security/vault
parent3ed7834523a3b1e9112bf788fa63843ad035598b (diff)
downloadpkgsrc-4578ddf4fc593fa163f54cdb1927587250a10ab2.tar.gz
Update security/vault to 0.6.5.
FEATURES: - Okta Authentication: A new Okta authentication backend allows you to use Okta usernames and passwords to authenticate to Vault. If provided with an appropriate Okta API token, group membership can be queried to assign policies; users and groups can be defined locally as well. - RADIUS Authentication: A new RADIUS authentication backend allows using a RADIUS server to authenticate to Vault. Policies can be configured for specific users or for any authenticated user. - Exportable Transit Keys: Keys in `transit` can now be marked as `exportable` at creation time. This allows a properly ACL'd user to retrieve the associated signing key, encryption key, or HMAC key. The `exportable` value is returned on a key policy read and cannot be changed, so if a key is marked `exportable` it will always be exportable, and if it is not it will never be exportable. - Batch Transit Operations: `encrypt`, `decrypt` and `rewrap` operations in the transit backend now support processing multiple input items in one call, returning the output of each item in the response. - Configurable Audited HTTP Headers: You can now specify headers that you want to have included in each audit entry, along with whether each header should be HMAC'd or kept plaintext. This can be useful for adding additional client or network metadata to the audit logs. - Transit Backend UI (Enterprise): Vault Enterprise UI now supports the transit backend, allowing creation, viewing and editing of named keys as well as using those keys to perform supported transit operations directly in the UI. - Socket Audit Backend A new socket audit backend allows audit logs to be sent through TCP, UDP, or UNIX Sockets. IMPROVEMENTS: - auth/aws-ec2: Add support for cross-account auth using STS - auth/aws-ec2: Support issuing periodic tokens - auth/github: Support listing teams and users - auth/ldap: Support adding policies to local users directly, in addition to local groups - command/server: Add ability to select and prefer server cipher suites - core: Add a nonce to unseal operations as a check (useful mostly for support, not as a security principle) - duo: Added ability to supply extra context to Duo pushes - physical/consul: Add option for setting consistency mode on Consul gets - physical/etcd: Full v3 API support; code will autodetect which API version to use. The v3 code path is significantly less complicated and may be much more stable. - secret/pki: Allow specifying OU entries in generated certificate subjects - secret mount ui (Enterprise): the secret mount list now shows all mounted backends even if the UI cannot browse them. Additional backends can now be mounted from the UI as well. BUG FIXES: - auth/token: Fix regression in 0.6.4 where using token store roles as a blacklist (with only `disallowed_policies` set) would not work in most circumstances - physical/s3: Page responses in client so list doesn't truncate - secret/cassandra: Stop a connection leak that could occur on active node failover - secret/pki: When using `sign-verbatim`, don't require a role and use the CSR's common name
Diffstat (limited to 'security/vault')
-rw-r--r--security/vault/Makefile4
-rw-r--r--security/vault/distinfo10
2 files changed, 7 insertions, 7 deletions
diff --git a/security/vault/Makefile b/security/vault/Makefile
index a3694f8c5d5..f897fc50e7c 100644
--- a/security/vault/Makefile
+++ b/security/vault/Makefile
@@ -1,6 +1,6 @@
-# $NetBSD: Makefile,v 1.8 2017/01/03 07:44:01 fhajny Exp $
+# $NetBSD: Makefile,v 1.9 2017/02/13 14:23:08 fhajny Exp $
-DISTNAME= vault-0.6.4
+DISTNAME= vault-0.6.5
CATEGORIES= security
MASTER_SITES= ${MASTER_SITE_GITHUB:=hashicorp/}
diff --git a/security/vault/distinfo b/security/vault/distinfo
index b9c97edab6a..372bd151348 100644
--- a/security/vault/distinfo
+++ b/security/vault/distinfo
@@ -1,6 +1,6 @@
-$NetBSD: distinfo,v 1.4 2017/01/03 07:44:01 fhajny Exp $
+$NetBSD: distinfo,v 1.5 2017/02/13 14:23:08 fhajny Exp $
-SHA1 (vault-0.6.4.tar.gz) = 788539891a2ad0d358b35aba9fddbac90a60b6f9
-RMD160 (vault-0.6.4.tar.gz) = d4b0dee5d372ece57ae21c307e460137cc575404
-SHA512 (vault-0.6.4.tar.gz) = 413d3072ce99cd3a7bb39523ee2791b7839fb3887511ab620390c18aa498c8cb0d4376846a6d57dca616e968f72b720b63745153c470b539d6ce6c4dcd218c5e
-Size (vault-0.6.4.tar.gz) = 5167905 bytes
+SHA1 (vault-0.6.5.tar.gz) = 2c80398d09436abfcb24a8abcda77ef5c00872d5
+RMD160 (vault-0.6.5.tar.gz) = adfd8ca147a73ac771423f113a548e6eed995dfc
+SHA512 (vault-0.6.5.tar.gz) = 3a135281a2135aae45e9a659b0492d37069b080f42956f8a1fdbf842a8a1e54b474b7c5b48c0e6170b206fdb52da7a718a9702d5a14d3aa99f8e560839268374
+Size (vault-0.6.5.tar.gz) = 5628341 bytes