jfrog / vault-plugin-secrets-artifactory

HashiCorp Vault Secrets Plugin for Artifactory
https://jfrog.com
Apache License 2.0
39 stars 20 forks source link

build(deps): bump github.com/hashicorp/vault/sdk from 0.11.0 to 0.11.1 #165

Closed dependabot[bot] closed 5 months ago

dependabot[bot] commented 5 months ago

Bumps github.com/hashicorp/vault/sdk from 0.11.0 to 0.11.1.

Changelog

Sourced from github.com/hashicorp/vault/sdk's changelog.

0.11.1 (September 6th, 2018)

SECURITY:

  • Random Byte Reading in Barrier: Prior to this release, Vault was not properly checking the error code when reading random bytes for the IV for AES operations in its cryptographic barrier. Specifically, this means that such an IV could potentially be zero multiple times, causing nonce re-use and weakening the security of the key. On most platforms this should never happen because reading from kernel random sources is non-blocking and always successful, but there may be platform-specific behavior that has not been accounted for. (Vault has tests to check exactly this, and the tests have never seen nonce re-use.)

FEATURES:

  • AliCloud Agent Support: Vault Agent can now authenticate against the AliCloud auth method.
  • UI: Enable AliCloud auth method and Azure secrets engine via the UI.

IMPROVEMENTS:

  • core: Logging level for most logs (not including secrets/auth plugins) can now be changed on-the-fly via SIGHUP, reading the desired value from Vault's config file [GH-5280]

BUG FIXES:

  • core: Ensure we use a background context when stepping down [GH-5290]
  • core: Properly check error return from random byte reading [GH-5277]
  • core: Re-add sys/ top-route injection for now [GH-5241]
  • core: Policies stored in minified JSON would return an error [GH-5229]
  • core: Evaluate templated policies in capabilities check [GH-5250]
  • identity: Update MemDB with identity group alias while loading groups [GH-5289]
  • secrets/database: Fix nil pointer when revoking some leases [GH-5262]
  • secrets/pki: Fix sign-verbatim losing extra Subject attributes [GH-5245]
  • secrets/pki: Remove certificates from store when tidying revoked certificates and simplify API [GH-5231]
  • ui: JSON editor will not coerce input to an object, and will now show an error about Vault expecting an object [GH-5271]
  • ui: authentication form will now default to any methods that have been tuned to show up for unauthenticated users [GH-5281]
Commits


Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show ignore conditions` will show all of the ignore conditions of the specified dependency - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)