pkgsrc-wip/vault
Iku Iwasa d0ddae968f vault: Update to 1.5.4
SECURITY:

* Batch Token Expiry: We addressed an issue where batch token leases could
  outlive their TTL because we were not scheduling the expiration time
  correctly. This vulnerability affects Vault OSS and Vault Enterprise 1.0
  and newer and is fixed in 1.4.7 and 1.5.4 (CVE-2020-25816).

IMPROVEMENTS:

* secrets/pki: Handle expiration of a cert not in storage as a success
  [GH-9880]
* auth/kubernetes: Add an option to disable defaulting to the local CA cert
  and service account JWT when running in a Kubernetes pod [GH-97]
* secrets/gcp: Add check for 403 during rollback to prevent repeated
  deletion calls [GH-97]
* core: Disable usage metrics collection on performance standby
  nodes. [GH-9966]
* credential/aws: Added X-Amz-Content-Sha256 as a default STS request
  header [GH-10009]

BUG FIXES:

* agent: Fix disable_fast_negotiation not being set on the auth method when
  configured by user. [GH-9892]
* core (enterprise): Fix hang when cluster-wide plugin reload cleanup is
  slow on unseal
* core (enterprise): Fix an error in cluster-wide plugin reload cleanup
  following such a reload
* core: Fix crash when metrics collection encounters zero-length keys in KV
  store [GH-9811]
* mfa (enterprise): Fix incorrect handling of PingID responses that could
  result in auth requests failing
* replication (enterprise): Improve race condition when using a newly
  created token on a performance standby node
* replication (enterprise): Only write failover cluster addresses if
  they've changed
* ui: fix bug where dropdown for identity/entity management is not
  reflective of actual policy [GH-9958]
2020-09-26 14:04:33 +09:00
..
patches
DESCR
Makefile vault: Update to 1.5.4 2020-09-26 14:04:33 +09:00
PLIST
distinfo vault: Update to 1.5.4 2020-09-26 14:04:33 +09:00