This project is mirrored from https://gitee.com/NQL886/vault.git.
Pull mirroring failed .
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer.
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer.
- 09 Dec, 2021 1 commit
-
-
Meggie authored
-
- 03 Dec, 2021 1 commit
-
-
Angel Garbarino authored
* the fix * test coverage
-
- 30 Nov, 2021 4 commits
-
-
Meggie authored
-
Angel Garbarino authored
* fix spelling error * add test coverage * whoops * browserstack fail
-
Meggie authored
-
Hridoy Roy authored
* version test robustness backports * add version import to core test file
-
- 29 Nov, 2021 4 commits
-
-
John-Michael Faircloth authored
* oidc: fix key rotation panic * refactor and update unit tests * add changelog
-
Calvin Leung Huang authored
* upgrade aerospike-client-go to v5.2.0 * use strings.Contains to check an error * add changelog file * go mod tidy * go mod tidy * update the changelog * revert .gitignore update * go mod tidy Co-authored-by:
Eugene R <yrizhkov@aerospike.com>
-
Jason O'Donnell authored
* sdk/queue: move lock before checking queue length * Add changelog
-
Austin Gebauer authored
-
- 26 Nov, 2021 1 commit
-
-
Nick Cabatoff authored
-
- 25 Nov, 2021 1 commit
-
-
Nick Cabatoff authored
-
- 24 Nov, 2021 4 commits
-
-
Steven Clark authored
* return pkcs8 format for ed25519 curve convertRespToPKCS8 does not recognize the ed25519 key. Changes to recognize ed25519 key and return its PKCS8 format Co-authored-by:
Navaneeth Rameshan <vme@zurich.ibm.com>
-
hghaf099 authored
Backport 1.9.x: Fixing ResponseWriter to assert to http.Flusher in /sys/monitor endpoint (#13200) (#13260) * Unify HTTPResponseWriter and StatusHeaderResponseWriter (#13200) * Unify NewHTTPResponseWriter ant NewStatusHeaderResponseWriter to fix ResponseWriter issues * adding changelog * removing unnecessary function from the WrappingResponseWriter interface * changing logical requests responseWriter type * reverting change to HTTPResponseWriter * Update changelog/13200.txt * Update changelog/13200.txt
-
claire bontempo authored
-
Austin Gebauer authored
-
- 23 Nov, 2021 3 commits
-
-
claire bontempo authored
* add catch for node-forge error handling * update comment * adds changelog * alphabetize attrs and add canParse attr * show alert banner if unable to parse metadata * add test to check info banner renders
-
Jordan Reimer authored
* converts secret-v2-version model to native class -- fixes issues with cached values for deleted prop * adds changelog entry * adds disabled state to ToolbarLink component and disables create new version action when users cannot read metadata * updates secret-edit acceptance test
-
Nick Cabatoff authored
-
- 19 Nov, 2021 1 commit
-
-
Jordan Reimer authored
* fixes issue with ttl picker not initially enabling in form field component * adds changelog entry * updates test * updates initial ttl toggle state for default 0s value
-
- 18 Nov, 2021 3 commits
-
-
Jordan Reimer authored
* fixes issue with oidc auth method when MetaMask chrome extenstion is used * adds changelog entry * updates auth-jwt integration tests * fixes race condition in runCommands ui-panel helper method where running multiple commands would not always result in the same output order
-
Jordan Reimer authored
* fixes issue restoring raft snapshot * adds changelog entry
-
claire bontempo authored
* adds date time helper to generated creds * makes revocation time human-readable
-
- 17 Nov, 2021 2 commits
-
-
Meggie authored
-
swayne275 authored
* don't log token error on DR Secondary * stop gauge collector expiration errors on dr secondary * don't check dr secondary for token create * see if CI hits panic * Revert "don't check dr secondary for token create" This reverts commit c036a1a544d3a20d29d046f1ee239ab1563ce4d9. * don't check dr secondary for token create * Revert "see if CI hits panic" This reverts commit 1e15aa535cac6e4d1684aaf47c8746c094068eb8. * remove condition on log
-
- 16 Nov, 2021 4 commits
-
-
Chelsea Shaw authored
-
Nick Cabatoff authored
-
Nick Cabatoff authored
-
Nick Cabatoff authored
* Add AllowMissing to local_bucket_key schema, preventing startup failures in post-unseal when aliases from an older version exist.
-
- 15 Nov, 2021 2 commits
- 12 Nov, 2021 1 commit
-
-
Jim Kalafut authored
-
- 11 Nov, 2021 2 commits
-
-
vinay-gopalan authored
-
Vishal Nayak authored
-
- 10 Nov, 2021 2 commits
-
-
Arnav Palnitkar authored
* Add message while adding Oracle db connection - Since UI currently doesn't have support for custom plugin names, inform user to use the default plugin name for oracle * Updated warning message * Updated message
-
John-Michael Faircloth authored
* return full issuer uri on read provider * remove err check * simplify full issuer logic
-
- 09 Nov, 2021 4 commits
-
-
Chelsea Shaw authored
-
swayne275 authored
* update activity log to use core's activeContext for cleaner worker termination * update tests to use core activeContext instead of generic context * pass context around instead * revert context change * undo test context changes * change worker context * accidentally undid context for fcn signature changes
-
Victor Rodriguez authored
* certutil: select appropriate hash algorithm for ECDSA signature Select the appropriate signature algorithm for certificates signed with an ECDSA private key. The algorithm is selected based on the curve: - P-256 -> x509.ECDSAWithSHA256 - P-384 -> x509.ECDSAWithSHA384 - P-521 -> x509.ECDSAWithSHA512 - Other -> x509.ECDSAWithSHA256 fixes #11006 Co-authored-by:
Dominik Roos <domi.roos@gmail.com>
-
Steven Clark authored
Backport 1.9: Address a data race issue within identity_store_util::processLocalAlias (#13093) (#13094) * Address a data race issue within identity_store_util::processLocalAlias (#13093) - When loading an existing alias within processLocalAlias we aren't cloning the object from the memory store. There seems to be a data race within the function when calling entity.UpsertAlias and a concurrent invalidation routine. ================== WARNING: DATA RACE Read at 0x00c00bd03d08 by goroutine 94: google.golang.org/protobuf/internal/impl.pointer.Elem() /go/pkg/mod/google.golang.org/protobuf@v1.27.1/internal/impl/pointer_unsafe.go:118 +0x2b3 google.golang.org/protobuf/internal/impl.(*MessageInfo).sizePointerSlow() /go/pkg/mod/google.golang.org/protobuf@v1.27.1/internal/impl/encode.go:76 +0x265 google.golang.org/protobuf/internal/impl.(*MessageInfo).sizePointer() /go/pkg/mod/google.golang.org/protobuf@v1.27.1/internal/impl/encode.go:56 +0x12a google.golang.org/protobuf/internal/impl.(*MessageInfo).size() /go/pkg/mod/google.golang.org/protobuf@v1.27.1/internal/impl/encode.go:40 +0x95 google.golang.org/protobuf/internal/impl.(*MessageInfo).size-fm() /go/pkg/mod/google.golang.org/protobuf@v1.27.1/internal/impl/encode.go:33 +0x6c google.golang.org/protobuf/proto.MarshalOptions.marshal() /go/pkg/mod/google.golang.org/protobuf@v1.27.1/proto/encode.go:153 +0x1f3 google.golang.org/protobuf/proto.MarshalOptions.MarshalAppend() /go/pkg/mod/google.golang.org/protobuf@v1.27.1/proto/encode.go:122 +0xa5 github.com/golang/protobuf/proto.marshalAppend() /go/pkg/mod/github.com/golang/protobuf@v1.5.2/proto/wire.go:40 +0xe4 github.com/golang/protobuf/proto.Marshal() /go/pkg/mod/github.com/golang/protobuf@v1.5.2/proto/wire.go:23 +0x64 github.com/hashicorp/vault/helper/identity.(*Entity).Clone() /go/src/github.com/hashicorp/vault/helper/identity/identity.go:34 +0x150 github.com/hashicorp/vault/vault.(*IdentityStore).MemDBEntitiesByBucketKeyInTxn() /go/src/github.com/hashicorp/vault/vault/identity_store_util.go:1214 +0x306 github.com/hashicorp/vault/vault.(*IdentityStore).Invalidate() /go/src/github.com/hashicorp/vault/vault/identity_store.go:216 +0xd6c github.com/hashicorp/vault/vault.(*IdentityStore).Invalidate-fm() /go/src/github.com/hashicorp/vault/vault/identity_store.go:160 +0x6d github.com/hashicorp/vault/sdk/framework.(*Backend).InvalidateKey() /go/src/github.com/hashicorp/vault/sdk/framework/backend.go:347 +0x8a github.com/hashicorp/vault/vault.(*IdentityStore).InvalidateKey() <autogenerated>:1 +0x7d github.com/hashicorp/vault/vault.(*Core).asyncInvalidateKey() /go/src/github.com/hashicorp/vault/vault/replication_invalidation_ent.go:58 +0x390 github.com/hashicorp/vault/vault.(*Core).asyncInvalidateHandler() /go/src/github.com/hashicorp/vault/vault/replication_invalidation_ent.go:71 +0x9b github.com/hashicorp/vault/vault.startReplicationEnt·dwrap·453() /go/src/github.com/hashicorp/vault/vault/replication_util_ent.go:331 +0x71 Previous write at 0x00c00bd03d08 by goroutine 52: github.com/hashicorp/vault/helper/identity.(*Entity).UpsertAlias() /go/src/github.com/hashicorp/vault/helper/identity/identity.go:55 +0x271 github.com/hashicorp/vault/vault.(*IdentityStore).processLocalAlias() /go/src/github.com/hashicorp/vault/vault/identity_store_util.go:720 +0x672 github.com/hashicorp/vault/vault.possiblyForwardEntityCreation() /go/src/github.com/hashicorp/vault/vault/request_handling_util_ent.go:230 +0x286 github.com/hashicorp/vault/vault.(*Core).handleLoginRequest() /go/src/github.com/hashicorp/vault/vault/request_handling.go:1345 +0x234a github.com/hashicorp/vault/vault.(*Core).handleCancelableRequest() /go/src/github.com/hashicorp/vault/vault/request_handling.go:607 +0x1a11 github.com/hashicorp/vault/vault.(*Core).switchedLockHandleRequest() /go/src/github.com/hashicorp/vault/vault/request_handling.go:442 +0x5b5 github.com/hashicorp/vault/vault.(*Core).HandleRequest() /go/src/github.com/hashicorp/vault/vault/request_handling.go:408 +0xf2 github.com/hashicorp/vault/http.request() /go/src/github.com/hashicorp/vault/http/handler.go:953 +0xb1 github.com/hashicorp/vault/http.handleLogicalInternal.func1() /go/src/github.com/hashicorp/vault/http/logical.go:341 +0xca net/http.HandlerFunc.ServeHTTP() /usr/local/go/src/net/http/server.go:2046 +0x4d github.com/hashicorp/vault/http.handleRequestForwarding.func1() /go/src/github.com/hashicorp/vault/http/handler.go:887 +0x4eb net/http.HandlerFunc.ServeHTTP() /usr/local/go/src/net/http/server.go:2046 +0x4d net/http.(*ServeMux).ServeHTTP() /usr/local/go/src/net/http/server.go:2424 +0xc5 github.com/hashicorp/vault/http.wrapHelpHandler.func1() /go/src/github.com/hashicorp/vault/http/help.go:23 +0x281 net/http.HandlerFunc.ServeHTTP() /usr/local/go/src/net/http/server.go:2046 +0x4d github.com/hashicorp/vault/http.wrapCORSHandler.func1() /go/src/github.com/hashicorp/vault/http/cors.go:29 +0xb0e net/http.HandlerFunc.ServeHTTP() /usr/local/go/src/net/http/server.go:2046 +0x4d github.com/hashicorp/vault/http.rateLimitQuotaWrapping.func1() /go/src/github.com/hashicorp/vault/http/util.go:97 +0xf28 net/http.HandlerFunc.ServeHTTP() /usr/local/go/src/net/http/server.go:2046 +0x4d github.com/hashicorp/vault/http.wrapDRSecondaryHandler.func1() /go/src/github.com/hashicorp/vault/http/util_ent.go:81 +0x7e3 net/http.HandlerFunc.ServeHTTP() /usr/local/go/src/net/http/server.go:2046 +0x4d github.com/hashicorp/vault/http.wrapGenericHandler.func1() /go/src/github.com/hashicorp/vault/http/handler.go:465 +0x1843 net/http.HandlerFunc.ServeHTTP() /usr/local/go/src/net/http/server.go:2046 +0x4d github.com/hashicorp/go-cleanhttp.PrintablePathCheckHandler.func1() /go/pkg/mod/github.com/hashicorp/go-cleanhttp@v0.5.2/handlers.go:42 +0xc1 net/http.HandlerFunc.ServeHTTP() /usr/local/go/src/net/http/server.go:2046 +0x4d net/http.serverHandler.ServeHTTP() /usr/local/go/src/net/http/server.go:2878 +0x89a net/http.initALPNRequest.ServeHTTP() /usr/local/go/src/net/http/server.go:3479 +0x34d net/http.(*initALPNRequest).ServeHTTP() <autogenerated>:1 +0x8f net/http.Handler.ServeHTTP-fm() /usr/local/go/src/net/http/server.go:87 +0x75 net/http.(*http2serverConn).runHandler() /usr/local/go/src/net/http/h2_bundle.go:5832 +0xdd net/http.(*http2serverConn).processHeaders·dwrap·31() /usr/local/go/src/net/http/h2_bundle.go:5562 +0x64 * Add missing changelog for pr #13093 (#13095)
-