diff options
author | fhajny <fhajny@pkgsrc.org> | 2017-03-20 15:15:28 +0000 |
---|---|---|
committer | fhajny <fhajny@pkgsrc.org> | 2017-03-20 15:15:28 +0000 |
commit | 7d87d7e175429f965ad3c296af51022952dacf5d (patch) | |
tree | 9c71735423917bd55c6cb4da5368d8da721245ec /security/vault | |
parent | dbdc769e9a2450eed277ca7322cc55093f675720 (diff) | |
download | pkgsrc-7d87d7e175429f965ad3c296af51022952dacf5d.tar.gz |
Update security/vault to 0.7.0.
SECURITY:
* Common name not being validated when `exclude_cn_from_sans` option used in
`pki` backend
DEPRECATIONS/CHANGES:
* List Operations Always Use Trailing Slash
* PKI Defaults to Unleased Certificates
FEATURES:
* Replication (Enterprise)
* Response Wrapping & Replication in the Vault Enterprise UI
* Expanded Access Control Policies
* SSH Backend As Certificate Authority
IMPROVEMENTS:
* api/request: Passing username and password information in API request
* audit: Logging the token's use count with authentication response and
logging the remaining uses of the client token with request
* auth/approle: Support for restricting the number of uses on the tokens
issued
* auth/aws-ec2: AWS EC2 auth backend now supports constraints for VPC ID,
Subnet ID and Region
* auth/ldap: Use the value of the `LOGNAME` or `USER` env vars for the
username if not explicitly set on the command line when authenticating
* audit: Support adding a configurable prefix (such as `@cee`) before each
line
* core: Canonicalize list operations to use a trailing slash
* core: Add option to disable caching on a per-mount level
* core: Add ability to require valid client certs in listener config
* physical/dynamodb: Implement a session timeout to avoid having to use
recovery mode in the case of an unclean shutdown, which makes HA much safer
* secret/pki: O (Organization) values can now be set to role-defined values
for issued/signed certificates
* secret/pki: Certificates issued/signed from PKI backend do not generate
leases by default
* secret/pki: When using DER format, still return the private key type
* secret/pki: Add an intermediate to the CA chain even if it lacks an
authority key ID
* secret/pki: Add role option to use CSR SANs
* secret/ssh: SSH backend as CA to sign user and host certificates
* secret/ssh: Support reading of SSH CA public key from `config/ca` endpoint
and also return it when CA key pair is generated
BUG FIXES:
* audit: When auditing headers use case-insensitive comparisons
* auth/aws-ec2: Return role period in seconds and not nanoseconds
* auth/okta: Fix panic if user had no local groups and/or policies set
* command/server: Fix parsing of redirect address when port is not mentioned
* physical/postgresql: Fix listing returning incorrect results if there were
multiple levels of children
Full changelog:
https://github.com/hashicorp/vault/blob/v0.7.0/CHANGELOG.md
Diffstat (limited to 'security/vault')
-rw-r--r-- | security/vault/Makefile | 4 | ||||
-rw-r--r-- | security/vault/distinfo | 10 |
2 files changed, 7 insertions, 7 deletions
diff --git a/security/vault/Makefile b/security/vault/Makefile index f897fc50e7c..bfed1438837 100644 --- a/security/vault/Makefile +++ b/security/vault/Makefile @@ -1,6 +1,6 @@ -# $NetBSD: Makefile,v 1.9 2017/02/13 14:23:08 fhajny Exp $ +# $NetBSD: Makefile,v 1.10 2017/03/20 15:15:28 fhajny Exp $ -DISTNAME= vault-0.6.5 +DISTNAME= vault-0.7.0 CATEGORIES= security MASTER_SITES= ${MASTER_SITE_GITHUB:=hashicorp/} diff --git a/security/vault/distinfo b/security/vault/distinfo index 372bd151348..5bb38b63989 100644 --- a/security/vault/distinfo +++ b/security/vault/distinfo @@ -1,6 +1,6 @@ -$NetBSD: distinfo,v 1.5 2017/02/13 14:23:08 fhajny Exp $ +$NetBSD: distinfo,v 1.6 2017/03/20 15:15:28 fhajny Exp $ -SHA1 (vault-0.6.5.tar.gz) = 2c80398d09436abfcb24a8abcda77ef5c00872d5 -RMD160 (vault-0.6.5.tar.gz) = adfd8ca147a73ac771423f113a548e6eed995dfc -SHA512 (vault-0.6.5.tar.gz) = 3a135281a2135aae45e9a659b0492d37069b080f42956f8a1fdbf842a8a1e54b474b7c5b48c0e6170b206fdb52da7a718a9702d5a14d3aa99f8e560839268374 -Size (vault-0.6.5.tar.gz) = 5628341 bytes +SHA1 (vault-0.7.0.tar.gz) = 407eb309107fbb5608fc108331f5d60be0b164b4 +RMD160 (vault-0.7.0.tar.gz) = 8e8ce699782d67ce4f0e6b209ad174a99c92ad80 +SHA512 (vault-0.7.0.tar.gz) = dc43949acfaf54fc5a43a01657f52b1cab373cb2f3c8fad7b82320fd9dc42d99533fba91931a636dfce1e5d586a1421d74a991ad4e10117b595fb875c1b344d5 +Size (vault-0.7.0.tar.gz) = 5826086 bytes |