Mon Sep 3 18:59:08 2018 UTC ()
security/vault: Update to 0.11.0.

DEPRECATIONS/CHANGES:

- Request Timeouts: A default request timeout of 90s is now enforced. This
  setting can be overwritten in the config file. If you anticipate requests
  taking longer than 90s this setting should be updated before upgrading.
- (NOTE: will be re-added into 0.11.1 as it broke more than anticipated. There
  will be some further guidelines around when this will be removed again.)
  * `sys/` Top Level Injection: For the last two years for backwards
  compatibility data for various `sys/` routes has been injected into both the
  Secret's Data map and into the top level of the JSON response object.
  However, this has some subtle issues that pop up from time to time and is
  becoming increasingly complicated to maintain, so it's finally being
  removed.
- Path Fallback for List Operations: For a very long time Vault has
  automatically adjusted `list` operations to always end in a `/`, as list
  operations operates on prefixes, so all list operations by definition end
  with `/`. This was done server-side so affects all clients. However, this
  has also led to a lot of confusion for users writing policies that assume
  that the path that they use in the CLI is the path used internally. Starting
  in 0.11, ACL policies gain a new fallback rule for listing: they will use a
  matching path ending in `/` if available, but if not found, they will look
  for the same path without a trailing `/`. This allows putting `list`
  capabilities in the same path block as most other capabilities for that
  path, while not providing any extra access if `list` wasn't actually
  provided there.
- Performance Standbys On By Default: If you flavor/license of Vault
  Enterprise supports Performance Standbys, they are on by default. You can
  disable this behavior per-node with the `disable_performance_standby`
  configuration flag.
- AWS Secret Engine Roles: The AWS Secret Engine roles are now explicit about
  the type of AWS credential they are generating; this reduces reduce
  ambiguity that existed previously as well as enables new features for
  specific credential types. Writing role data and generating credentials
  remain backwards compatible; however, the data returned when reading a
  role's configuration has changed in backwards-incompatible ways. Anything
  that depended on reading role data from the AWS secret engine will break
  until it is updated to work with the new format.

FEATURES:

- Namespaces (Enterprise): A set of features within Vault Enterprise
  that allows Vault environments to support *Secure Multi-tenancy* within a
  single Vault Enterprise infrastructure. Through namespaces, Vault
  administrators can support tenant isolation for teams and individuals as
  well as empower those individuals to self-manage their own tenant
  environment.
- Performance Standbys (Enterprise): Standby nodes can now service
  requests that do not modify storage. This provides near-horizontal scaling
  of a cluster in some workloads, and is the intra-cluster analogue of
  the existing Performance Replication feature, which replicates to distinct
  clusters in other datacenters, geos, etc.
- AliCloud OSS Storage: AliCloud OSS can now be used for Vault storage.
- AliCloud Auth Plugin: AliCloud's identity services can now be used to
  grant access to Vault. See the plugin repository for more information.
- Azure Secrets Plugin: There is now a plugin (pulled in to Vault) that
  allows generating credentials to allow access to Azure. See the plugin
  repository for more information.
- HA Support for MySQL Storage: MySQL storage now supports HA.
- ACL Templating: ACL policies can now be templated using identity Entity,
  Groups, and Metadata.
- UI Onboarding wizards: The Vault UI can provide contextual help and
  guidance, linking out to relevant links or guides on vaultproject.io for
  various workflows in Vault.

IMPROVEMENTS:

- agent: Add `exit_after_auth` to be able to use the Agent for a single
  authentication
- auth/approle: Add ability to set token bound CIDRs on individual Secret IDs
- cli: Add support for passing parameters to `vault read` operations
- secrets/aws: Make credential types more explicit
- secrets/nomad: Support for longer token names
- secrets/pki: Allow disabling CRL generation
- storage/azure: Add support for different Azure environments
- storage/file: Sort keys in list responses
- storage/mysql: Support special characters in database and table names.

BUG FIXES:

- auth/jwt: Always validate `aud` claim even if `bound_audiences` isn't set
  (IOW, error in this case)
- core: Prevent Go's HTTP library from interspersing logs in a different
  format and/or interleaved
- identity: Properly populate `mount_path` and `mount_type` on group lookup
- identity: Fix persisting alias metadata
- identity: Fix carryover issue from previously fixed race condition that
  could cause Vault not to start up due to two entities referencing the same
  alias. These entities are now merged.
- replication: Fix issue causing some pages not to flush to storage
- secrets/database: Fix inability to update custom SQL statements on
  database roles.
- secrets/pki: Disallow putting the CA's serial on its CRL. While technically
  legal, doing so inherently means the CRL can't be trusted anyways, so it's
  not useful and easy to footgun.
- storage/gcp,spanner: Fix data races


(fhajny)
diff -r1.30 -r1.31 pkgsrc/security/vault/Makefile
diff -r1.19 -r1.20 pkgsrc/security/vault/distinfo

cvs diff -r1.30 -r1.31 pkgsrc/security/vault/Makefile (expand / switch to unified diff)

--- pkgsrc/security/vault/Makefile 2018/07/08 13:54:39 1.30
+++ pkgsrc/security/vault/Makefile 2018/09/03 18:59:08 1.31
@@ -1,29 +1,32 @@ @@ -1,29 +1,32 @@
1# $NetBSD: Makefile,v 1.30 2018/07/08 13:54:39 bsiegert Exp $ 1# $NetBSD: Makefile,v 1.31 2018/09/03 18:59:08 fhajny Exp $
2 2
3DISTNAME= vault-0.10.1 3DISTNAME= vault-0.11.0
4PKGREVISION= 1 
5CATEGORIES= security 4CATEGORIES= security
6MASTER_SITES= ${MASTER_SITE_GITHUB:=hashicorp/} 5MASTER_SITES= ${MASTER_SITE_GITHUB:=hashicorp/}
7 6
8MAINTAINER= filip@joyent.com 7MAINTAINER= filip@joyent.com
9HOMEPAGE= https://www.vaultproject.io/ 8HOMEPAGE= https://www.vaultproject.io/
10COMMENT= Tool for managing secrets 9COMMENT= Tool for managing secrets
11LICENSE= mpl-2.0 10LICENSE= mpl-2.0
12 11
13GITHUB_TAG= v${PKGVERSION_NOREV} 12GITHUB_TAG= v${PKGVERSION_NOREV}
14 13
15GO_DIST_BASE= ${DISTNAME} 14GO_DIST_BASE= ${DISTNAME}
16GO_SRCPATH= github.com/hashicorp/vault 15GO_SRCPATH= github.com/hashicorp/vault
17 16
18USE_TOOLS+= bash gmake 17USE_TOOLS+= bash gmake
19 18
20INSTALLATION_DIRS+= bin 19INSTALLATION_DIRS+= bin
21 20
 21# Clumsy workaround for https://github.com/golang/go/issues/22409
 22pre-build:
 23 ${RM} -rf ${WRKSRC}/vault/external_tests
 24
22do-install: 25do-install:
23 ${INSTALL_PROGRAM} ${WRKDIR}/bin/vault ${DESTDIR}${PREFIX}/bin 26 ${INSTALL_PROGRAM} ${WRKDIR}/bin/vault ${DESTDIR}${PREFIX}/bin
24 27
25do-test: 28do-test:
26 cd ${WRKSRC} && ${SETENV} GOPATH=${WRKDIR}:${BUILDLINK_DIR}/gopkg ${GO} test -v ./vault 29 cd ${WRKSRC} && ${SETENV} GOPATH=${WRKDIR}:${BUILDLINK_DIR}/gopkg ${GO} test -v ./vault
27 30
28.include "../../lang/go/go-package.mk" 31.include "../../lang/go/go-package.mk"
29.include "../../mk/bsd.pkg.mk" 32.include "../../mk/bsd.pkg.mk"

cvs diff -r1.19 -r1.20 pkgsrc/security/vault/distinfo (expand / switch to unified diff)

--- pkgsrc/security/vault/distinfo 2018/04/27 14:02:41 1.19
+++ pkgsrc/security/vault/distinfo 2018/09/03 18:59:08 1.20
@@ -1,6 +1,6 @@ @@ -1,6 +1,6 @@
1$NetBSD: distinfo,v 1.19 2018/04/27 14:02:41 fhajny Exp $ 1$NetBSD: distinfo,v 1.20 2018/09/03 18:59:08 fhajny Exp $
2 2
3SHA1 (vault-0.10.1.tar.gz) = 698033ef7c931e2d7939eba8904cad79ccbfbe59 3SHA1 (vault-0.11.0.tar.gz) = bcccb2ffca44f0d746fb9ce0384bffbab5d8e243
4RMD160 (vault-0.10.1.tar.gz) = eeaef430c97b405cdaf8f27eacbe26a0a1197bd0 4RMD160 (vault-0.11.0.tar.gz) = 0086bd162d55e3a681bd2b494e7451f0371d7667
5SHA512 (vault-0.10.1.tar.gz) = dfa2d81e0e51cf41694ad40ad9bcc6847a9261ee06b2787d59915b941a63bfe58e649271e1ff5a963b892af5c13043057f29a1a8412efe51b3cf54157c54a060 5SHA512 (vault-0.11.0.tar.gz) = 33e1e76a0e16803a8d0d6ed8ec0b6d1f8876d54ecf35a70bc4969404bd7991ef0cc5986eae958885d288bb316396e0594a5571b7a11f8b052b22b445388f03c7
6Size (vault-0.10.1.tar.gz) = 13001413 bytes 6Size (vault-0.11.0.tar.gz) = 24430984 bytes