This project is mirrored from https://gitee.com/NQL886/vault.git.
Pull mirroring failed .
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer.
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer.
- 15 Mar, 2022 3 commits
-
-
hc-github-team-secure-vault-core authored
* backport of commit 87b230797095b4db1e66a0baba42fce49652fb87 * backport of commit ddfcbd49b86bc0e1945a9072412156cf9be1d5bb Co-authored-by:
hamid ghaf <hamid@hashicorp.com> Co-authored-by:
hghaf099 <83242695+hghaf099@users.noreply.github.com>
-
hc-github-team-secure-vault-core authored
Co-authored-by:
Jason O'Donnell <2160810+jasonodonnell@users.noreply.github.com>
-
hc-github-team-secure-vault-core authored
* backport of commit 452d04439649c0f8551615a60b50d8302cd3cbfd * backport of commit 9968d0252482beca466197a734e39bacdad24672 * backport of commit 4d4539354d5fbbc847cb20351ab5aef66d3e4294 * backport of commit 29ce3830382cc5a0df24a043911868d4bf0323eb Co-authored-by:
Pratyoy Mukhopadhyay <prat@hashicorp.com> Co-authored-by:
Pratyoy Mukhopadhyay <35388175+pmmukh@users.noreply.github.com>
-
- 14 Mar, 2022 6 commits
-
-
hc-github-team-secure-vault-core authored
Co-authored-by:
Victor Rodriguez <vrizo@hashicorp.com>
-
Rachel Culpepper authored
* add documentation for AWS KMS managed keys * a couple small fixes * docs updates * remove endpoint env var * docs changes for aws kms managed keys
-
hc-github-team-secure-vault-core authored
Co-authored-by:
Michele Degges <mdeggies@gmail.com>
-
hc-github-team-secure-vault-core authored
* backport of commit 8b297df7 * backport of commit 71764b00 * backport of commit a98076b7 * backport of commit d20b0630 * backport of commit 7c95d39e * backport of commit d9976563 * backport of commit c7da1467 * backport of commit 12c02667 Co-authored-by:
Claire Bontempo <cbontempo@hashicorp.com> Co-authored-by:
claire bontempo <68122737+hellobontempo@users.noreply.github.com>
-
Alexander Scheel authored
* added add_basic_constraints parameter to PKI API docs Added add_basic_constraints parameter to PKI API docs for Generate Intermediate. Copied description from https://github.com/hashicorp/vault/blob/ba533d006f2244103648785ebfe8a9a9763d2b6e/builtin/logical/pki/path_intermediate.go#L34-L37 Co-authored-by:
Peter Sonnek <petersonnek@users.noreply.github.com>
-
hc-github-team-secure-vault-core authored
* backport of commit 8aef67766926213f0b0e3f2d733aa987e630cdc4 * backport of commit 7fe721670e53bcc153092591a973be8d7e2b0528 * backport of commit 9b1cca294fb47db904a0480364d44ac8362ca187 * backport of commit 52f9a09d74a8ee3fb0d69058ff30bfc58be6d632 * backport of commit 722b505e8486b14aeca75a25375742036387cbb6 * backport of commit 2f0c6be41e8749ffe000af6c14c0c41f47df1f0f * backport of commit 0a930b40fa8194c8ee66dc92c32a931e4a863610 * backport of commit ae2a77bb3e54b90f74af10607dfbdf1a80602fbb * backport of commit 8c39b44cd16512ab5ba89fd3f37c1e210f03c738 * backport of commit 11705b7fe924d60caf423190c107321cade034b5 * backport of commit 2205d7d85fa0ba912c4a5af40ab1afde589cd5e7 * backport of commit a6ae3066a0a78cbabac27a9c81dd948341c272cd * backport of commit 4d606b59abcce96fd162764f97f36cc919832c1f Co-authored-by:
Stephen Wayne <swayne@hashicorp.com>
-
- 11 Mar, 2022 4 commits
-
-
VAL authored
* Output full secret path in certain kv commands (#14301) * Full secret path in table output of get and put * Add path output to KV patch and metadata get * Add changelog * Don't print secret path for kv-v1 * Make more readable * Switch around logic to not swallow error * Add test for secret path * Fix metadata test * Add unit test for padequalsigns * Remove wonky kv get tests * Remove unneeded comments (#14423)
-
Scott Miller authored
* Fix autoseal health check race by passing metrics sync in CoreConfig * Fix up the test semantics * Unused import * Fix error setup * typo
-
hc-github-team-secure-vault-core authored
Co-authored-by:
Ricky Grassmuck <rigrassm@gmail.com>
-
hc-github-team-secure-vault-core authored
Co-authored-by:
Nick Cabatoff <ncabatoff@hashicorp.com>
-
- 10 Mar, 2022 3 commits
-
-
hc-github-team-secure-vault-core authored
* backport of commit 8917416bc4f6319e0f2a466d63f0293224e05d7f * backport of commit c6848e3f1dbb61853d70a08061e630f4e183ac02 * backport of commit d72845d740e9d135ac547e55d113eb17033dc69e Co-authored-by:
hashishaw <cshaw@hashicorp.com> Co-authored-by:
Chelsea Shaw <82459713+hashishaw@users.noreply.github.com>
-
hc-github-team-secure-vault-core authored
Co-authored-by:
Jordan Reimer <zofskeez@gmail.com>
-
hc-github-team-secure-vault-core authored
Backport of identity/oidc: prevent key rotation on performance secondary clusters into release/1.10.x (#14433) * backport of commit 6d15116f9c143868ed04c947fb1a7258fe9e003f * backport of commit 8de9a9396e983b3b771a1d25ebe13b32ff6a08b4 * backport of commit 8da063171e92929dc631961ebb31109bf8120071 * fix fmt check Co-authored-by:
Austin Gebauer <agebauer@hashicorp.com>
-
- 09 Mar, 2022 2 commits
-
-
hc-github-team-secure-vault-core authored
* backport of commit 31c54f4e25fb33d2ff718dd3549b9d390377157f * backport of commit 9283ff5065148fa84865c1bd839456b999644bed * backport of commit d0a75547070473a105840502150dbdd8115b94bf * backport of commit 6216eaab8f080333bca2170948dd93d0cc64abec * backport of commit e2a2ba88b18f2165d589b4b56a64f298385ecc0d Co-authored-by:
hamid ghaf <hamid@hashicorp.com> Co-authored-by:
hghaf099 <83242695+hghaf099@users.noreply.github.com>
-
hghaf099 authored
* Add support for PROXY protocol v2 in TCP listener I did not find tests for this so I added one trying to cover different configurations to make sure I did not break something. As far as I know, the behavior should be exactly the same as before except for one thing when proxy_protocol_behavior is set to "deny_unauthorized", unauthorized requests were previously silently reject because of https://github.com/armon/go-proxyproto/blob/7e956b284f0a/protocol.go#L81-L84 but it will now be logged. Also fixes https://github.com/hashicorp/vault/issues/9462 by adding support for `PROXY UNKNOWN` for PROXY protocol v1. Closes https://github.com/hashicorp/vault/issues/3807 * Add changelog Co-authored-by:
Rémi Lapeyre <remi.lapeyre@lenstra.fr>
-
- 08 Mar, 2022 1 commit
-
-
Josh Black authored
-
- 04 Mar, 2022 2 commits
-
-
Josh Black authored
-
hc-github-team-secure-vault-core authored
* backport of commit ee7f9abcf82d15b758df6481a1ba8beb705a8419 * backport of commit a4144747cfb8c30bd2714fdf54d78c05e88f508a * backport of commit aa1164f33c562041d9d6d4639ca4a077240e8403 Co-authored-by:
Claire Bontempo <cbontempo@hashicorp.com>
-
- 03 Mar, 2022 2 commits
-
-
Scott Miller authored
-
hc-github-team-secure-vault-core authored
Co-authored-by:
Alexander Scheel <alex.scheel@hashicorp.com>
-
- 02 Mar, 2022 5 commits
-
-
hc-github-team-secure-vault-core authored
Co-authored-by:
Claire Bontempo <cbontempo@hashicorp.com>
-
hc-github-team-secure-vault-core authored
* backport of commit 36f24e8921c046abafac012f7c62aad90973c7e8 * backport of commit 9f165b0ef5ea79551a7c1dbb083d7641abe4fdfa * backport of commit 4ff8321b7b084ceedd12a8746dcf5503f664e855 * backport of commit a53bdf9357d16c57e83e83669a1c6cc85a1ca0f2 * backport of commit 31c175fa213c1904d88793e8f14334d986780b20 * Empty state for current tab (#14319) * update ci.hcl to remove 1.6.x and add in 1.10.x (#14310) * Fix autoseal health check race by passing metrics sink in CoreConfig (#14196) * Add empty state for current tab, config off, no read permissions on config Co-authored-by:
Hridoy Roy <roy@hashicorp.com> Co-authored-by:
Scott Miller <smiller@hashicorp.com> * update selector * fix test * remove helper Co-authored-by:
Claire Bontempo <cbontempo@hashicorp.com> Co-authored-by:
Chelsea Shaw <82459713+hashishaw@users.noreply.github.com> Co-authored-by:
Hridoy Roy <roy@hashicorp.com> Co-authored-by:
Scott Miller <smiller@hashicorp.com> Co-authored-by:
claire bontempo <68122737+hellobontempo@users.noreply.github.com>
-
hc-github-team-secure-vault-core authored
* backport of commit eaf5f1a50f72c4ebcae6c6c7d2fa6e5e94382ba5 * backport of commit a0e6d1b6b93fd84967314aca28dc4b7f58fbe6b0 Co-authored-by:
Jordan Reimer <zofskeez@gmail.com>
-
hc-github-team-secure-vault-core authored
* backport of commit 250f95c92152276cc1d3519406316362b71e51de * backport of commit bce725ebd161949d69b89777227243162fac4595 * backport of commit 6271bc8eaa9e3b549f83e9707e7b2d4250bb6436 Co-authored-by:
Angel Garbarino <argarbarino@gmail.com>
-
hc-github-team-secure-vault-core authored
* backport of commit b9afbf71ce3649c0c0be7afecac16ea6724848b0 * backport of commit 805f9377a09aba33bb10a9d1163e6da59375f6c7 Co-authored-by:
Josh Black <raskchanky@gmail.com> Co-authored-by:
Josh Black <raskchanky@users.noreply.github.com>
-
- 01 Mar, 2022 1 commit
-
-
Hridoy Roy authored
* update build and ci to point to release branch * backport ssct oss optimizations
-
- 28 Feb, 2022 3 commits
-
-
Hridoy Roy authored
* update build and ci to point to release branch * update version prerelease for 1.10 branch to be rc1 in prep for release
-
Pratyoy Mukhopadhyay authored
-
Hridoy Roy authored
-
- 26 Feb, 2022 1 commit
-
-
Calvin Leung Huang authored
* deps: update plugin versions for Vault 1.10 * update vault-plugin-secrets-alicloud to v0.11.1 * downgrade alibaba-cloud-sdk-go * update auth-jwt and auth-gcp, revert non-plugin deps
-
- 25 Feb, 2022 7 commits
-
-
Robert authored
docs: consul secret engine improvements, database secrets engine disable_escaping parameter (#14260) * Update consul secrets engine docs and api-docs * Update databases secrets engine docs and api-docs
-
Josh Black authored
-
Steven Clark authored
* Address slow CI causing failures in TestRateLimitQuota_Allow_WithBlock - An attempt to fix CI runs that are extremely slow and the for loop runs across two BlockIntervals within the rate limit window of operation. - Increasing BlockInterval was looked at but the normal test times would be increased due to us also validating that we are releasing clients post BlockInterval. * Address TestRateLimitQuota_Allow_WithBlock slowness issue (take 2) - Increase the overall Interval value within the blocking test so that we should always be able to request at least 17 requests within the interval value. - Tested by changing the time.Sleep within the for loop to 20 from 2 and could see that within the response, coming back from the rlq.allow, that we were no longer being rate limited by going over the 1 second interval value per host. * Limit the number of active go routines in TestRateLimitQuota_Allow_WithBlock
-
Hridoy Roy authored
-
Hridoy Roy authored
-
Alexander Scheel authored
As pointed out internally, a lot of the API docs and FrameworkField descriptions of parameters were out of date. This syncs a number of them, updating their descriptions where relevant. Signed-off-by:
Alexander Scheel <alex.scheel@hashicorp.com>
-
Steven Clark authored
-