summaryrefslogtreecommitdiff
path: root/security/vault
diff options
context:
space:
mode:
authorfhajny <fhajny@pkgsrc.org>2018-09-06 20:41:53 +0000
committerfhajny <fhajny@pkgsrc.org>2018-09-06 20:41:53 +0000
commit54eb4285390444d5d78699508a0ecb873f0b109f (patch)
tree65e8921b9e393b23c6dde4c395516c7c97bbbf24 /security/vault
parent76239ec0746c93f88f681c884c16afbf0224721c (diff)
downloadpkgsrc-54eb4285390444d5d78699508a0ecb873f0b109f.tar.gz
security/vault: Update to 0.11.1.
SECURITY: - Random Byte Reading in Barrier: Prior to this release, Vault was not properly checking the error code when reading random bytes for the IV for AES operations in its cryptographic barrier. Specifically, this means that such an IV could potentially be zero multiple times, causing nonce re-use and weakening the security of the key. On most platforms this should never happen because reading from kernel random sources is non-blocking and always successful, but there may be platform-specific behavior that has not been accounted for. (Vault has tests to check exactly this, and the tests have never seen nonce re-use.) FEATURES: - AliCloud Agent Support: Vault Agent can now authenticate against the AliCloud auth method. - UI: Enable AliCloud auth method and Azure secrets engine via the UI. IMPROVEMENTS: - core: Logging level for most logs (not including secrets/auth plugins) can now be changed on-the-fly via `SIGHUP`, reading the desired value from Vault's config file BUG FIXES: - core: Ensure we use a background context when stepping down - core: Properly check error return from random byte reading - core: Re-add `sys/` top-route injection for now - core: Properly store the replication checkpoint file if it's larger than the storage engine's per-item limit - identity: Update MemDB with identity group alias while loading groups - secrets/database: Fix nil pointer when revoking some leases - secrets/pki: Fix sign-verbatim losing extra Subject attributes - secrets/pki: Remove certificates from store when tidying revoked certificates and simplify API - ui: JSON editor will not coerce input to an object, and will now show an error about Vault expecting an object - ui: authentication form will now default to any methods that have been tuned to show up for unauthenticated users
Diffstat (limited to 'security/vault')
-rw-r--r--security/vault/Makefile4
-rw-r--r--security/vault/distinfo10
2 files changed, 7 insertions, 7 deletions
diff --git a/security/vault/Makefile b/security/vault/Makefile
index 2ef7831264f..5ea13c9e263 100644
--- a/security/vault/Makefile
+++ b/security/vault/Makefile
@@ -1,6 +1,6 @@
-# $NetBSD: Makefile,v 1.31 2018/09/03 18:59:08 fhajny Exp $
+# $NetBSD: Makefile,v 1.32 2018/09/06 20:41:53 fhajny Exp $
-DISTNAME= vault-0.11.0
+DISTNAME= vault-0.11.1
CATEGORIES= security
MASTER_SITES= ${MASTER_SITE_GITHUB:=hashicorp/}
diff --git a/security/vault/distinfo b/security/vault/distinfo
index 7868267cb1f..4f725d7b340 100644
--- a/security/vault/distinfo
+++ b/security/vault/distinfo
@@ -1,6 +1,6 @@
-$NetBSD: distinfo,v 1.20 2018/09/03 18:59:08 fhajny Exp $
+$NetBSD: distinfo,v 1.21 2018/09/06 20:41:53 fhajny Exp $
-SHA1 (vault-0.11.0.tar.gz) = bcccb2ffca44f0d746fb9ce0384bffbab5d8e243
-RMD160 (vault-0.11.0.tar.gz) = 0086bd162d55e3a681bd2b494e7451f0371d7667
-SHA512 (vault-0.11.0.tar.gz) = 33e1e76a0e16803a8d0d6ed8ec0b6d1f8876d54ecf35a70bc4969404bd7991ef0cc5986eae958885d288bb316396e0594a5571b7a11f8b052b22b445388f03c7
-Size (vault-0.11.0.tar.gz) = 24430984 bytes
+SHA1 (vault-0.11.1.tar.gz) = 06bcc72f2f4cbcc03ce9f3be6e986e75be481681
+RMD160 (vault-0.11.1.tar.gz) = ccfb2809b2ab0245a9a7cd834cea13b32e094747
+SHA512 (vault-0.11.1.tar.gz) = b9cbd8862d6bfe4f6e41f6fb916497af0429dde3ce15bb8c808cd57ca6c0e52e95ba165f4d57fd7051a611ac869e54d7b5758f6fc059ad6474c93353a4b14201
+Size (vault-0.11.1.tar.gz) = 24595293 bytes