Bump for release

This commit is contained in:
Jeff Mitchell
2018-09-05 13:17:37 -04:00
parent ce0b6c0359
commit a7dd669615
6 changed files with 18 additions and 15 deletions

View File

@@ -1,4 +1,4 @@
## 0.11.1 (Unreleased) ## 0.11.1 (September 5th, 2018)
SECURITY: SECURITY:
@@ -9,7 +9,8 @@ SECURITY:
and weakening the security of the key. On most platforms this should never and weakening the security of the key. On most platforms this should never
happen because reading from kernel random sources is non-blocking and always happen because reading from kernel random sources is non-blocking and always
successful, but there may be platform-specific behavior that has not been successful, but there may be platform-specific behavior that has not been
accounted for. accounted for. (Vault has tests to check exactly this, and the tests have
never seen nonce re-use.)
IMPROVEMENTS: IMPROVEMENTS:

View File

@@ -3,7 +3,7 @@
//------------------------------------------------------------------- //-------------------------------------------------------------------
variable "download-url" { variable "download-url" {
default = "https://releases.hashicorp.com/vault/0.11.0/vault_0.11.0_linux_amd64.zip" default = "https://releases.hashicorp.com/vault/0.11.1/vault_0.11.1_linux_amd64.zip"
description = "URL to download Vault" description = "URL to download Vault"
} }

View File

@@ -9,6 +9,8 @@ import (
"net/url" "net/url"
"time" "time"
"strings"
"github.com/hashicorp/errwrap" "github.com/hashicorp/errwrap"
"github.com/hashicorp/vault/logical" "github.com/hashicorp/vault/logical"
"github.com/hashicorp/vault/logical/framework" "github.com/hashicorp/vault/logical/framework"
@@ -16,7 +18,6 @@ import (
"golang.org/x/oauth2/google" "golang.org/x/oauth2/google"
"google.golang.org/api/googleapi" "google.golang.org/api/googleapi"
"google.golang.org/api/iam/v1" "google.golang.org/api/iam/v1"
"strings"
) )
const ( const (
@@ -95,6 +96,7 @@ func (b *backend) secretAccessTokenRevoke(ctx context.Context, req *logical.Requ
} }
resp, err := http.Get(revokeAccessTokenEndpoint + fmt.Sprintf("?token=%s", url.QueryEscape(tokenRaw.(string)))) resp, err := http.Get(revokeAccessTokenEndpoint + fmt.Sprintf("?token=%s", url.QueryEscape(tokenRaw.(string))))
defer googleapi.CloseBody(resp)
if err == nil { if err == nil {
err = googleapi.CheckResponse(resp) err = googleapi.CheckResponse(resp)
} }

18
vendor/vendor.json vendored
View File

@@ -1359,8 +1359,8 @@
{ {
"checksumSHA1": "xdrSQoX7B7Hr4iWm9T2+5wHVpHQ=", "checksumSHA1": "xdrSQoX7B7Hr4iWm9T2+5wHVpHQ=",
"path": "github.com/hashicorp/vault-plugin-auth-alicloud/tools", "path": "github.com/hashicorp/vault-plugin-auth-alicloud/tools",
"revision": "90acf238c385792939aade0286fcb941d9899435", "revision": "1a078292f70a4c9e366a13d3c725d105bd5be1af",
"revisionTime": "2018-08-22T21:26:04Z" "revisionTime": "2018-09-04T20:26:51Z"
}, },
{ {
"checksumSHA1": "ojr0r/jmutGEhftDXiHthCCwpIA=", "checksumSHA1": "ojr0r/jmutGEhftDXiHthCCwpIA=",
@@ -1417,22 +1417,22 @@
"revisionTime": "2018-08-21T21:57:39Z" "revisionTime": "2018-08-21T21:57:39Z"
}, },
{ {
"checksumSHA1": "zkmWfxanMFQXWQIAboXj/jqF12g=", "checksumSHA1": "91ydauzZu3czIjeQM9IAgvy7B7o=",
"path": "github.com/hashicorp/vault-plugin-secrets-gcp/plugin", "path": "github.com/hashicorp/vault-plugin-secrets-gcp/plugin",
"revision": "ba74744a1fcfcd9c5f3635571a0734e6a13ce349", "revision": "e3f5ad9f075ab1b18fa665a64bdec5411a14a4bb",
"revisionTime": "2018-08-17T20:56:55Z" "revisionTime": "2018-09-05T16:00:51Z"
}, },
{ {
"checksumSHA1": "zwKMP2eBB2fKeOXMf0afsbw1bS0=", "checksumSHA1": "zwKMP2eBB2fKeOXMf0afsbw1bS0=",
"path": "github.com/hashicorp/vault-plugin-secrets-gcp/plugin/iamutil", "path": "github.com/hashicorp/vault-plugin-secrets-gcp/plugin/iamutil",
"revision": "ba74744a1fcfcd9c5f3635571a0734e6a13ce349", "revision": "e3f5ad9f075ab1b18fa665a64bdec5411a14a4bb",
"revisionTime": "2018-08-17T20:56:55Z" "revisionTime": "2018-09-05T16:00:51Z"
}, },
{ {
"checksumSHA1": "81kYL49zTBoj1NYczxB2Xbr2d6Y=", "checksumSHA1": "81kYL49zTBoj1NYczxB2Xbr2d6Y=",
"path": "github.com/hashicorp/vault-plugin-secrets-gcp/plugin/util", "path": "github.com/hashicorp/vault-plugin-secrets-gcp/plugin/util",
"revision": "ba74744a1fcfcd9c5f3635571a0734e6a13ce349", "revision": "e3f5ad9f075ab1b18fa665a64bdec5411a14a4bb",
"revisionTime": "2018-08-17T20:56:55Z" "revisionTime": "2018-09-05T16:00:51Z"
}, },
{ {
"checksumSHA1": "FkppDRdkWTF4Ry+olqZT8L0Stb8=", "checksumSHA1": "FkppDRdkWTF4Ry+olqZT8L0Stb8=",

View File

@@ -2,7 +2,7 @@ package version
func init() { func init() {
// The main version number that is being run at the moment. // The main version number that is being run at the moment.
Version = "0.11.0" Version = "0.11.1"
// A pre-release marker for the version. If this is "" (empty string) // A pre-release marker for the version. If this is "" (empty string)
// then it means that it is a final release. Otherwise, this is a pre-release // then it means that it is a final release. Otherwise, this is a pre-release

View File

@@ -2,7 +2,7 @@ set :base_url, "https://www.vaultproject.io/"
activate :hashicorp do |h| activate :hashicorp do |h|
h.name = "vault" h.name = "vault"
h.version = "0.11.0" h.version = "0.11.1"
h.github_slug = "hashicorp/vault" h.github_slug = "hashicorp/vault"
h.website_root = "website" h.website_root = "website"
end end