vault: Update to 1.5.4

SECURITY:

* Batch Token Expiry: We addressed an issue where batch token leases could
  outlive their TTL because we were not scheduling the expiration time
  correctly. This vulnerability affects Vault OSS and Vault Enterprise 1.0
  and newer and is fixed in 1.4.7 and 1.5.4 (CVE-2020-25816).

IMPROVEMENTS:

* secrets/pki: Handle expiration of a cert not in storage as a success
  [GH-9880]
* auth/kubernetes: Add an option to disable defaulting to the local CA cert
  and service account JWT when running in a Kubernetes pod [GH-97]
* secrets/gcp: Add check for 403 during rollback to prevent repeated
  deletion calls [GH-97]
* core: Disable usage metrics collection on performance standby
  nodes. [GH-9966]
* credential/aws: Added X-Amz-Content-Sha256 as a default STS request
  header [GH-10009]

BUG FIXES:

* agent: Fix disable_fast_negotiation not being set on the auth method when
  configured by user. [GH-9892]
* core (enterprise): Fix hang when cluster-wide plugin reload cleanup is
  slow on unseal
* core (enterprise): Fix an error in cluster-wide plugin reload cleanup
  following such a reload
* core: Fix crash when metrics collection encounters zero-length keys in KV
  store [GH-9811]
* mfa (enterprise): Fix incorrect handling of PingID responses that could
  result in auth requests failing
* replication (enterprise): Improve race condition when using a newly
  created token on a performance standby node
* replication (enterprise): Only write failover cluster addresses if
  they've changed
* ui: fix bug where dropdown for identity/entity management is not
  reflective of actual policy [GH-9958]
This commit is contained in:
Iku Iwasa 2020-09-26 14:04:33 +09:00
parent 9be242a2c2
commit d0ddae968f
2 changed files with 5 additions and 5 deletions

View File

@ -1,6 +1,6 @@
# $NetBSD$
DISTNAME= vault-1.5.3
DISTNAME= vault-1.5.4
CATEGORIES= security
MASTER_SITES= ${MASTER_SITE_GITHUB:=hashicorp/}

View File

@ -1,9 +1,9 @@
$NetBSD$
SHA1 (vault-1.5.3.tar.gz) = ca11b81ffe657004023bd0388665bfe35ffe5962
RMD160 (vault-1.5.3.tar.gz) = ad3b62e2e799c326dea17ea152b1a3b149fc10ea
SHA512 (vault-1.5.3.tar.gz) = 2eaeabf939c20e914319f0038f7b2cea219618a5f830a7d250f4de447b1b7e9fab9fee611752fcd26086b67c3b5e32f403a88d4e7da1d94f34570e1a210bc4f8
Size (vault-1.5.3.tar.gz) = 35123873 bytes
SHA1 (vault-1.5.4.tar.gz) = 3ee6842614f41be471e9873ae80328c8f862788d
RMD160 (vault-1.5.4.tar.gz) = 94c82a572a1e3b2f6483adf842d37a2ef1042732
SHA512 (vault-1.5.4.tar.gz) = 9a3d4d30a61e89aeb5c622fa82dcbc0fed28ae17fce8c6f29c71cb47784aae57f08b0cad5532e18178683f823581e306b5a37e5d2391af7dec3bd9a6889ab75d
Size (vault-1.5.4.tar.gz) = 35116452 bytes
SHA1 (patch-vendor_github.com_docker_docker_client_client__unix.go) = 51a400f6adaa6abe4cd42c31cfba4f037d9d81e5
SHA1 (patch-vendor_github.com_docker_docker_pkg_system_stat__netbsd.go) = 125e35b6f5e9a0cdec8c0a5e0b7c67cc326467ea
SHA1 (patch-vendor_github.com_ory_dockertest_docker_pkg_system_stat__netbsd.go) = 723ce00bc56771008074e5d77efd465501fda2bb