Update security/vault to 0.7.0.
SECURITY: * Common name not being validated when `exclude_cn_from_sans` option used in `pki` backend DEPRECATIONS/CHANGES: * List Operations Always Use Trailing Slash * PKI Defaults to Unleased Certificates FEATURES: * Replication (Enterprise) * Response Wrapping & Replication in the Vault Enterprise UI * Expanded Access Control Policies * SSH Backend As Certificate Authority IMPROVEMENTS: * api/request: Passing username and password information in API request * audit: Logging the token's use count with authentication response and logging the remaining uses of the client token with request * auth/approle: Support for restricting the number of uses on the tokens issued * auth/aws-ec2: AWS EC2 auth backend now supports constraints for VPC ID, Subnet ID and Region * auth/ldap: Use the value of the `LOGNAME` or `USER` env vars for the username if not explicitly set on the command line when authenticating * audit: Support adding a configurable prefix (such as `@cee`) before each line * core: Canonicalize list operations to use a trailing slash * core: Add option to disable caching on a per-mount level * core: Add ability to require valid client certs in listener config * physical/dynamodb: Implement a session timeout to avoid having to use recovery mode in the case of an unclean shutdown, which makes HA much safer * secret/pki: O (Organization) values can now be set to role-defined values for issued/signed certificates * secret/pki: Certificates issued/signed from PKI backend do not generate leases by default * secret/pki: When using DER format, still return the private key type * secret/pki: Add an intermediate to the CA chain even if it lacks an authority key ID * secret/pki: Add role option to use CSR SANs * secret/ssh: SSH backend as CA to sign user and host certificates * secret/ssh: Support reading of SSH CA public key from `config/ca` endpoint and also return it when CA key pair is generated BUG FIXES: * audit: When auditing headers use case-insensitive comparisons * auth/aws-ec2: Return role period in seconds and not nanoseconds * auth/okta: Fix panic if user had no local groups and/or policies set * command/server: Fix parsing of redirect address when port is not mentioned * physical/postgresql: Fix listing returning incorrect results if there were multiple levels of children Full changelog: https://github.com/hashicorp/vault/blob/v0.7.0/CHANGELOG.md
This commit is contained in:
parent
bd1e1bba66
commit
fdd3577bfb
2 changed files with 7 additions and 7 deletions
|
@ -1,6 +1,6 @@
|
|||
# $NetBSD: Makefile,v 1.9 2017/02/13 14:23:08 fhajny Exp $
|
||||
# $NetBSD: Makefile,v 1.10 2017/03/20 15:15:28 fhajny Exp $
|
||||
|
||||
DISTNAME= vault-0.6.5
|
||||
DISTNAME= vault-0.7.0
|
||||
CATEGORIES= security
|
||||
MASTER_SITES= ${MASTER_SITE_GITHUB:=hashicorp/}
|
||||
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
$NetBSD: distinfo,v 1.5 2017/02/13 14:23:08 fhajny Exp $
|
||||
$NetBSD: distinfo,v 1.6 2017/03/20 15:15:28 fhajny Exp $
|
||||
|
||||
SHA1 (vault-0.6.5.tar.gz) = 2c80398d09436abfcb24a8abcda77ef5c00872d5
|
||||
RMD160 (vault-0.6.5.tar.gz) = adfd8ca147a73ac771423f113a548e6eed995dfc
|
||||
SHA512 (vault-0.6.5.tar.gz) = 3a135281a2135aae45e9a659b0492d37069b080f42956f8a1fdbf842a8a1e54b474b7c5b48c0e6170b206fdb52da7a718a9702d5a14d3aa99f8e560839268374
|
||||
Size (vault-0.6.5.tar.gz) = 5628341 bytes
|
||||
SHA1 (vault-0.7.0.tar.gz) = 407eb309107fbb5608fc108331f5d60be0b164b4
|
||||
RMD160 (vault-0.7.0.tar.gz) = 8e8ce699782d67ce4f0e6b209ad174a99c92ad80
|
||||
SHA512 (vault-0.7.0.tar.gz) = dc43949acfaf54fc5a43a01657f52b1cab373cb2f3c8fad7b82320fd9dc42d99533fba91931a636dfce1e5d586a1421d74a991ad4e10117b595fb875c1b344d5
|
||||
Size (vault-0.7.0.tar.gz) = 5826086 bytes
|
||||
|
|
Loading…
Reference in a new issue