summaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorfhajny <fhajny>2017-06-13 06:28:38 +0000
committerfhajny <fhajny>2017-06-13 06:28:38 +0000
commit509831e4cd407db228c45656251c3c9089696658 (patch)
treee80d695bb4f4f14e4fdfae31c581c75422fc7e97 /security
parent680de814f69bae950744181ef7dbe24a793e76e2 (diff)
downloadpkgsrc-509831e4cd407db228c45656251c3c9089696658.tar.gz
Update security/vault to 0.7.3.
## 0.7.3 (June 7th, 2017) SECURITY: - Cert auth backend now checks validity of individual certificates - App-ID path salting was skipped in 0.7.1/0.7.2 DEPRECATIONS/CHANGES: - Step-Down is Forwarded FEATURES: - ed25519 Signing/Verification in Transit with Key Derivation - Key Version Specification for Encryption in Transit - Replication Primary Discovery (Enterprise) IMPROVEMENTS: - api/health: Add Sys().Health() - audit: Add auth information to requests that error out - command/auth: Add `-no-store` option that prevents the auth command from storing the returned token into the configured token helper - core/forwarding: Request forwarding now heartbeats to prevent unused connections from being terminated by firewalls or proxies - plugins/databases: Add MongoDB as an internal database plugin - storage/dynamodb: Add a method for checking the existence of children, speeding up deletion operations in the DynamoDB storage backend - storage/mysql: Add max_parallel parameter to MySQL backend - secret/databases: Support listing connections - secret/databases: Support custom renewal statements in Postgres database plugin - secret/databases: Use the role name as part of generated credentials - ui (Enterprise): Transit key and secret browsing UI handle large lists better - ui (Enterprise): root tokens are no longer persisted - ui (Enterprise): support for mounting Database and TOTP secret backends BUG FIXES: - auth/app-id: Fix regression causing loading of salts to be skipped - auth/aws: Improve EC2 describe instances performance - auth/aws: Fix lookup of some instance profile ARNs - auth/aws: Resolve ARNs to internal AWS IDs which makes lookup at various points (e.g. renewal time) more robust - auth/aws: Properly honor configured period when using IAM authentication - auth/aws: Check that a bound IAM principal is not empty (in the current state of the role) before requiring it match the previously authenticated client - auth/cert: Fix panic on renewal - auth/cert: Certificate verification for non-CA certs - core/acl: Prevent race condition when compiling ACLs in some scenarios - secret/database: Increase wrapping token TTL; in a loaded scenario it could be too short - secret/generic: Allow integers to be set as the value of `ttl` field as the documentation claims is supported - secret/ssh: Added host key callback to ssh client config - storage/s3: Avoid a panic when some bad data is returned - storage/dynamodb: Fix list functions working improperly on Windows - storage/file: Don't leak file descriptors in some error cases - storage/swift: Fix pre-v3 project/tenant name reading
Diffstat (limited to 'security')
-rw-r--r--security/vault/Makefile4
-rw-r--r--security/vault/distinfo10
2 files changed, 7 insertions, 7 deletions
diff --git a/security/vault/Makefile b/security/vault/Makefile
index 1ef348b538e..e3da85bddce 100644
--- a/security/vault/Makefile
+++ b/security/vault/Makefile
@@ -1,6 +1,6 @@
-# $NetBSD: Makefile,v 1.12 2017/05/10 18:21:27 fhajny Exp $
+# $NetBSD: Makefile,v 1.13 2017/06/13 06:28:38 fhajny Exp $
-DISTNAME= vault-0.7.2
+DISTNAME= vault-0.7.3
CATEGORIES= security
MASTER_SITES= ${MASTER_SITE_GITHUB:=hashicorp/}
diff --git a/security/vault/distinfo b/security/vault/distinfo
index a0c091bd960..60d2b71fe94 100644
--- a/security/vault/distinfo
+++ b/security/vault/distinfo
@@ -1,6 +1,6 @@
-$NetBSD: distinfo,v 1.7 2017/05/10 18:21:27 fhajny Exp $
+$NetBSD: distinfo,v 1.8 2017/06/13 06:28:38 fhajny Exp $
-SHA1 (vault-0.7.2.tar.gz) = e0482b7625b095a93fc6075c83988fda0738d45e
-RMD160 (vault-0.7.2.tar.gz) = 0b666498fcf4254ecd1b8194cf5762027c0c385a
-SHA512 (vault-0.7.2.tar.gz) = 3a811f1a3f7c318bf645bf93c66c15c6a9d06718806ca5dd7a5ff95eeafef6dc6e58bcb829373716172cf2fe863240d1f4fdd34f8dcc1d31a2e36f6917e533ba
-Size (vault-0.7.2.tar.gz) = 6547973 bytes
+SHA1 (vault-0.7.3.tar.gz) = 6cec196e3d4483aee896e6ca69993bebf856d142
+RMD160 (vault-0.7.3.tar.gz) = 2091b5f947579a7a715090164d8ccb2c805cb2b6
+SHA512 (vault-0.7.3.tar.gz) = 8632b4b721372cb0f5f684564ebe0749b7c1a9b5d0322b083773b3a2fd1734fb2eedee1aeb4b4c9431ce7f44c711ac0a95960c581165e1bac1a3754f8658e783
+Size (vault-0.7.3.tar.gz) = 6694636 bytes