pkgsrc/security/vault/Makefile

34 lines
809 B
Makefile
Raw Normal View History

# $NetBSD: Makefile,v 1.41 2019/05/27 15:18:30 bsiegert Exp $
## 0.11.2 (October 2nd, 2018) CHANGES: - `sys/seal-status` now includes an `initialized` boolean in the output. If Vault is not initialized, it will return a `200` with this value set `false` instead of a `400`. - `passthrough_request_headers` will now deny certain headers from being provided to backends based on a global denylist. FEATURES: - AWS Secret Engine Root Credential Rotation: The credential used by the AWS secret engine can now be rotated, to ensure that only Vault knows the credentials it is using. - Storage Backend Migrator: A new `operator migrate` command allows offline migration of data between two storage backends. - AliCloud KMS Auto Unseal and Seal Wrap Support (Enterprise): AliCloud KMS can now be used a support seal for Auto Unseal and Seal Wrapping. BUG FIXES: - auth/okta: Fix reading deprecated `token` parameter if a token was previously set in the configuration - core: Re-add deprecated capabilities information for now - core: Fix handling of cyclic token relationships - storage/mysql: Fix locking on MariaDB - replication: Fix DR API when using a token - identity: Ensure old group alias is removed when a new one is written - storage/alicloud: Don't call uname on package init - secrets/jwt: Fix issue where request context would be canceled too early - ui: fix need to have update for aws iam creds generation - ui: fix calculation of token expiry IMPROVEMENTS: - auth/aws: The identity alias name can now configured to be either IAM unique ID of the IAM Principal, or ARN of the caller identity - auth/cert: Add allowed_organizational_units support - cli: Format TTLs for non-secret responses - identity: Support operating on entities and groups by their names - plugins: Add `env` parameter when registering plugins to the catalog to allow operators to include environment variables during plugin execution. - secrets/aws: WAL Rollback improvements - secrets/aws: Allow specifying STS role-default TTLs - secrets/pki: Add configuration support for setting NotBefore - core: Support for passing the Vault token via an Authorization Bearer header - replication: Reindex process now runs in the background and does not block other vault operations - storage/zookeeper: Enable TLS based communication with Zookeeper - ui: you can now init a cluster with a seal config - ui: added the option to force promote replication clusters - replication: Allow promotion of a secondary when data is syncing with a "force" flag
2018-10-07 22:19:38 +02:00
DISTNAME= vault-0.11.2
PKGREVISION= 7
CATEGORIES= security
MASTER_SITES= ${MASTER_SITE_GITHUB:=hashicorp/}
2018-12-15 22:12:18 +01:00
MAINTAINER= fhajny@NetBSD.org
2017-09-06 11:02:59 +02:00
HOMEPAGE= https://www.vaultproject.io/
COMMENT= Tool for managing secrets
LICENSE= mpl-2.0
GITHUB_TAG= v${PKGVERSION_NOREV}
Update security/vault to 0.7.2. 0.7.2 (May 8th, 2017) BUG FIXES: - audit: Fix auditing entries containing certain kinds of time values 0.7.1 (May 5th, 2017) DEPRECATIONS/CHANGES: - LDAP Auth Backend: Group membership queries will now run as the binddn user when binddn/bindpass are configured, rather than as the authenticating user as was the case previously. FEATURES: - AWS IAM Authentication - MSSQL Physical Backend - Lease Listing and Lookup - TOTP Secret Backend - Database Secret Backend & Secure Plugins (Beta) IMPROVEMENTS: - auth/cert: Support for constraints on subject Common Name and DNS/email Subject Alternate Names in certificates - auth/ldap: Use the binding credentials to search group membership rather than the user credentials - cli/revoke: Add -self option to allow revoking the currently active token - core: Randomize x coordinate in Shamir shares - tidy: Improvements to auth/token/tidy and sys/leases/tidy to handle more cleanup cases - secret/pki: Add no_store option that allows certificates to be issued without being stored. This removes the ability to look up and/or add to a CRL but helps with scaling to very large numbers of certificates. - secret/pki: If used with a role parameter, the sign-verbatim/<role> endpoint honors the values of generate_lease, no_store, ttl and max_ttl from the given role - secret/pki: Add role parameter allow_glob_domains that enables defining names in allowed_domains containing * glob patterns - secret/pki: Update certificate storage to not use characters that are not supported on some filesystems - storage/etcd3: Add discovery_srv option to query for SRV records to find servers - storage/s3: Support max_parallel option to limit concurrent outstanding requests - storage/s3: Use pooled transport for http client - storage/swift: Allow domain values for V3 authentication BUG FIXES: - api: Respect a configured path in Vault's address - auth/aws-ec2: New bounds added as criteria to allow role creation - auth/ldap: Don't lowercase groups attached to users - cli: Don't panic if vault write is used with the force flag but no path - core: Help operations should request forward since standbys may not have appropriate info - replication: Fix enabling secondaries when certain mounts already existed on the primary - secret/mssql: Update mssql driver to support queries with colons - secret/pki: Don't lowercase O/OU values in certs - secret/pki: Don't attempt to validate IP SANs if none are provided
2017-05-10 20:21:27 +02:00
GO_DIST_BASE= ${DISTNAME}
GO_SRCPATH= github.com/hashicorp/vault
USE_TOOLS+= bash gmake
INSTALLATION_DIRS+= bin
security/vault: Update to 0.11.0. DEPRECATIONS/CHANGES: - Request Timeouts: A default request timeout of 90s is now enforced. This setting can be overwritten in the config file. If you anticipate requests taking longer than 90s this setting should be updated before upgrading. - (NOTE: will be re-added into 0.11.1 as it broke more than anticipated. There will be some further guidelines around when this will be removed again.) * `sys/` Top Level Injection: For the last two years for backwards compatibility data for various `sys/` routes has been injected into both the Secret's Data map and into the top level of the JSON response object. However, this has some subtle issues that pop up from time to time and is becoming increasingly complicated to maintain, so it's finally being removed. - Path Fallback for List Operations: For a very long time Vault has automatically adjusted `list` operations to always end in a `/`, as list operations operates on prefixes, so all list operations by definition end with `/`. This was done server-side so affects all clients. However, this has also led to a lot of confusion for users writing policies that assume that the path that they use in the CLI is the path used internally. Starting in 0.11, ACL policies gain a new fallback rule for listing: they will use a matching path ending in `/` if available, but if not found, they will look for the same path without a trailing `/`. This allows putting `list` capabilities in the same path block as most other capabilities for that path, while not providing any extra access if `list` wasn't actually provided there. - Performance Standbys On By Default: If you flavor/license of Vault Enterprise supports Performance Standbys, they are on by default. You can disable this behavior per-node with the `disable_performance_standby` configuration flag. - AWS Secret Engine Roles: The AWS Secret Engine roles are now explicit about the type of AWS credential they are generating; this reduces reduce ambiguity that existed previously as well as enables new features for specific credential types. Writing role data and generating credentials remain backwards compatible; however, the data returned when reading a role's configuration has changed in backwards-incompatible ways. Anything that depended on reading role data from the AWS secret engine will break until it is updated to work with the new format. FEATURES: - Namespaces (Enterprise): A set of features within Vault Enterprise that allows Vault environments to support *Secure Multi-tenancy* within a single Vault Enterprise infrastructure. Through namespaces, Vault administrators can support tenant isolation for teams and individuals as well as empower those individuals to self-manage their own tenant environment. - Performance Standbys (Enterprise): Standby nodes can now service requests that do not modify storage. This provides near-horizontal scaling of a cluster in some workloads, and is the intra-cluster analogue of the existing Performance Replication feature, which replicates to distinct clusters in other datacenters, geos, etc. - AliCloud OSS Storage: AliCloud OSS can now be used for Vault storage. - AliCloud Auth Plugin: AliCloud's identity services can now be used to grant access to Vault. See the plugin repository for more information. - Azure Secrets Plugin: There is now a plugin (pulled in to Vault) that allows generating credentials to allow access to Azure. See the plugin repository for more information. - HA Support for MySQL Storage: MySQL storage now supports HA. - ACL Templating: ACL policies can now be templated using identity Entity, Groups, and Metadata. - UI Onboarding wizards: The Vault UI can provide contextual help and guidance, linking out to relevant links or guides on vaultproject.io for various workflows in Vault. IMPROVEMENTS: - agent: Add `exit_after_auth` to be able to use the Agent for a single authentication - auth/approle: Add ability to set token bound CIDRs on individual Secret IDs - cli: Add support for passing parameters to `vault read` operations - secrets/aws: Make credential types more explicit - secrets/nomad: Support for longer token names - secrets/pki: Allow disabling CRL generation - storage/azure: Add support for different Azure environments - storage/file: Sort keys in list responses - storage/mysql: Support special characters in database and table names. BUG FIXES: - auth/jwt: Always validate `aud` claim even if `bound_audiences` isn't set (IOW, error in this case) - core: Prevent Go's HTTP library from interspersing logs in a different format and/or interleaved - identity: Properly populate `mount_path` and `mount_type` on group lookup - identity: Fix persisting alias metadata - identity: Fix carryover issue from previously fixed race condition that could cause Vault not to start up due to two entities referencing the same alias. These entities are now merged. - replication: Fix issue causing some pages not to flush to storage - secrets/database: Fix inability to update custom SQL statements on database roles. - secrets/pki: Disallow putting the CA's serial on its CRL. While technically legal, doing so inherently means the CRL can't be trusted anyways, so it's not useful and easy to footgun. - storage/gcp,spanner: Fix data races
2018-09-03 20:59:08 +02:00
# Clumsy workaround for https://github.com/golang/go/issues/22409
pre-build:
${RM} -rf ${WRKSRC}/vault/external_tests
do-install:
${INSTALL_PROGRAM} ${WRKDIR}/bin/vault ${DESTDIR}${PREFIX}/bin
do-test:
cd ${WRKSRC} && ${SETENV} GOPATH=${WRKDIR}:${BUILDLINK_DIR}/gopkg ${GO} test -v ./vault
Update security/vault to 0.7.2. 0.7.2 (May 8th, 2017) BUG FIXES: - audit: Fix auditing entries containing certain kinds of time values 0.7.1 (May 5th, 2017) DEPRECATIONS/CHANGES: - LDAP Auth Backend: Group membership queries will now run as the binddn user when binddn/bindpass are configured, rather than as the authenticating user as was the case previously. FEATURES: - AWS IAM Authentication - MSSQL Physical Backend - Lease Listing and Lookup - TOTP Secret Backend - Database Secret Backend & Secure Plugins (Beta) IMPROVEMENTS: - auth/cert: Support for constraints on subject Common Name and DNS/email Subject Alternate Names in certificates - auth/ldap: Use the binding credentials to search group membership rather than the user credentials - cli/revoke: Add -self option to allow revoking the currently active token - core: Randomize x coordinate in Shamir shares - tidy: Improvements to auth/token/tidy and sys/leases/tidy to handle more cleanup cases - secret/pki: Add no_store option that allows certificates to be issued without being stored. This removes the ability to look up and/or add to a CRL but helps with scaling to very large numbers of certificates. - secret/pki: If used with a role parameter, the sign-verbatim/<role> endpoint honors the values of generate_lease, no_store, ttl and max_ttl from the given role - secret/pki: Add role parameter allow_glob_domains that enables defining names in allowed_domains containing * glob patterns - secret/pki: Update certificate storage to not use characters that are not supported on some filesystems - storage/etcd3: Add discovery_srv option to query for SRV records to find servers - storage/s3: Support max_parallel option to limit concurrent outstanding requests - storage/s3: Use pooled transport for http client - storage/swift: Allow domain values for V3 authentication BUG FIXES: - api: Respect a configured path in Vault's address - auth/aws-ec2: New bounds added as criteria to allow role creation - auth/ldap: Don't lowercase groups attached to users - cli: Don't panic if vault write is used with the force flag but no path - core: Help operations should request forward since standbys may not have appropriate info - replication: Fix enabling secondaries when certain mounts already existed on the primary - secret/mssql: Update mssql driver to support queries with colons - secret/pki: Don't lowercase O/OU values in certs - secret/pki: Don't attempt to validate IP SANs if none are provided
2017-05-10 20:21:27 +02:00
.include "../../lang/go/go-package.mk"
.include "../../mk/bsd.pkg.mk"