Received: by mail.netbsd.org (Postfix, from userid 605) id 9CD9384D9D; Thu, 6 Sep 2018 20:41:55 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by mail.netbsd.org (Postfix) with ESMTP id CCBA084D9B for ; Thu, 6 Sep 2018 20:41:54 +0000 (UTC) X-Virus-Scanned: amavisd-new at netbsd.org Received: from mail.netbsd.org ([IPv6:::1]) by localhost (mail.netbsd.org [IPv6:::1]) (amavisd-new, port 10025) with ESMTP id u2XzCUDdRuCu for ; Thu, 6 Sep 2018 20:41:54 +0000 (UTC) Received: from cvs.NetBSD.org (ivanova.NetBSD.org [IPv6:2001:470:a085:999:28c:faff:fe03:5984]) by mail.netbsd.org (Postfix) with ESMTP id EBDB984D54 for ; Thu, 6 Sep 2018 20:41:53 +0000 (UTC) Received: by cvs.NetBSD.org (Postfix, from userid 500) id E40BFFBF8; Thu, 6 Sep 2018 20:41:53 +0000 (UTC) Content-Transfer-Encoding: 7bit Content-Type: multipart/mixed; boundary="_----------=_1536266513254470" MIME-Version: 1.0 Date: Thu, 6 Sep 2018 20:41:53 +0000 From: "Filip Hajny" Subject: CVS commit: pkgsrc/security/vault To: pkgsrc-changes@NetBSD.org Reply-To: fhajny@netbsd.org X-Mailer: log_accum Message-Id: <20180906204153.E40BFFBF8@cvs.NetBSD.org> Sender: pkgsrc-changes-owner@NetBSD.org List-Id: pkgsrc-changes.NetBSD.org Precedence: bulk List-Unsubscribe: This is a multi-part message in MIME format. --_----------=_1536266513254470 Content-Disposition: inline Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset="US-ASCII" Module Name: pkgsrc Committed By: fhajny Date: Thu Sep 6 20:41:53 UTC 2018 Modified Files: pkgsrc/security/vault: Makefile distinfo Log Message: security/vault: Update to 0.11.1. SECURITY: - Random Byte Reading in Barrier: Prior to this release, Vault was not properly checking the error code when reading random bytes for the IV for AES operations in its cryptographic barrier. Specifically, this means that such an IV could potentially be zero multiple times, causing nonce re-use and weakening the security of the key. On most platforms this should never happen because reading from kernel random sources is non-blocking and always successful, but there may be platform-specific behavior that has not been accounted for. (Vault has tests to check exactly this, and the tests have never seen nonce re-use.) FEATURES: - AliCloud Agent Support: Vault Agent can now authenticate against the AliCloud auth method. - UI: Enable AliCloud auth method and Azure secrets engine via the UI. IMPROVEMENTS: - core: Logging level for most logs (not including secrets/auth plugins) can now be changed on-the-fly via `SIGHUP`, reading the desired value from Vault's config file BUG FIXES: - core: Ensure we use a background context when stepping down - core: Properly check error return from random byte reading - core: Re-add `sys/` top-route injection for now - core: Properly store the replication checkpoint file if it's larger than the storage engine's per-item limit - identity: Update MemDB with identity group alias while loading groups - secrets/database: Fix nil pointer when revoking some leases - secrets/pki: Fix sign-verbatim losing extra Subject attributes - secrets/pki: Remove certificates from store when tidying revoked certificates and simplify API - ui: JSON editor will not coerce input to an object, and will now show an error about Vault expecting an object - ui: authentication form will now default to any methods that have been tuned to show up for unauthenticated users To generate a diff of this commit: cvs rdiff -u -r1.31 -r1.32 pkgsrc/security/vault/Makefile cvs rdiff -u -r1.20 -r1.21 pkgsrc/security/vault/distinfo Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files. --_----------=_1536266513254470 Content-Disposition: inline Content-Length: 1602 Content-Transfer-Encoding: binary Content-Type: text/x-diff; charset=us-ascii Modified files: Index: pkgsrc/security/vault/Makefile diff -u pkgsrc/security/vault/Makefile:1.31 pkgsrc/security/vault/Makefile:1.32 --- pkgsrc/security/vault/Makefile:1.31 Mon Sep 3 18:59:08 2018 +++ pkgsrc/security/vault/Makefile Thu Sep 6 20:41:53 2018 @@ -1,6 +1,6 @@ -# $NetBSD: Makefile,v 1.31 2018/09/03 18:59:08 fhajny Exp $ +# $NetBSD: Makefile,v 1.32 2018/09/06 20:41:53 fhajny Exp $ -DISTNAME= vault-0.11.0 +DISTNAME= vault-0.11.1 CATEGORIES= security MASTER_SITES= ${MASTER_SITE_GITHUB:=hashicorp/} Index: pkgsrc/security/vault/distinfo diff -u pkgsrc/security/vault/distinfo:1.20 pkgsrc/security/vault/distinfo:1.21 --- pkgsrc/security/vault/distinfo:1.20 Mon Sep 3 18:59:08 2018 +++ pkgsrc/security/vault/distinfo Thu Sep 6 20:41:53 2018 @@ -1,6 +1,6 @@ -$NetBSD: distinfo,v 1.20 2018/09/03 18:59:08 fhajny Exp $ +$NetBSD: distinfo,v 1.21 2018/09/06 20:41:53 fhajny Exp $ -SHA1 (vault-0.11.0.tar.gz) = bcccb2ffca44f0d746fb9ce0384bffbab5d8e243 -RMD160 (vault-0.11.0.tar.gz) = 0086bd162d55e3a681bd2b494e7451f0371d7667 -SHA512 (vault-0.11.0.tar.gz) = 33e1e76a0e16803a8d0d6ed8ec0b6d1f8876d54ecf35a70bc4969404bd7991ef0cc5986eae958885d288bb316396e0594a5571b7a11f8b052b22b445388f03c7 -Size (vault-0.11.0.tar.gz) = 24430984 bytes +SHA1 (vault-0.11.1.tar.gz) = 06bcc72f2f4cbcc03ce9f3be6e986e75be481681 +RMD160 (vault-0.11.1.tar.gz) = ccfb2809b2ab0245a9a7cd834cea13b32e094747 +SHA512 (vault-0.11.1.tar.gz) = b9cbd8862d6bfe4f6e41f6fb916497af0429dde3ce15bb8c808cd57ca6c0e52e95ba165f4d57fd7051a611ac869e54d7b5758f6fc059ad6474c93353a4b14201 +Size (vault-0.11.1.tar.gz) = 24595293 bytes --_----------=_1536266513254470--