This project is mirrored from https://gitee.com/NQL886/vault.git.
Pull mirroring failed .
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer.
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer.
- 02 Oct, 2018 3 commits
-
-
Brian Kassouf authored
-
Calvin Leung Huang authored
-
JohnVonNeumann authored
Minor grammar fix.
-
- 01 Oct, 2018 21 commits
-
-
Brian Kassouf authored
-
Jim Kalafut authored
-
Matthew Irish authored
-
Brian Kassouf authored
-
Saurabh Pal authored
* The added method customTLSDial() creates a tls connection to the zookeeper backend when 'tls_enabled' is set to true in config * Update to the document for TLS configuration that is required to enable TLS connection to Zookeeper backend * Minor formatting update * Minor update to the description for example config * As per review comments from @kenbreeman, additional property description indicating support for multiple Root CAs in a single file has been added * minor formatting
-
Brian Kassouf authored
-
Brian Kassouf authored
-
Matthew Irish authored
-
Brian Kassouf authored
-
Brian Kassouf authored
-
Calvin Leung Huang authored
-
Becca Petrin authored
* discuss ambient credentials in namespaces * update aws cred chain description
-
Calvin Leung Huang authored
* Add denylist check when filtering passthrough headers * Minor comment update
-
Brian Kassouf authored
-
vishalnayak authored
-
Matthew Irish authored
* fix the top level pollling and use ember-concurrency * make suggested changes
-
Brian Kassouf authored
-
Martin authored
* Support Authorization Bearer as token header * add requestAuth test * remove spew debug output in test * Add Authorization in CORS Allowed headers * use const where applicable * use less allocations in bearer token checking * address PR comments on tests and apply last commit * reorder error checking in a TestHandler_requestAuth
-
Chris Pick authored
In addition to the specific permissions that are already mentioned, the project also needs the `iam.googleapis.com` API enabled, otherwise authenticating will fail with an error similar to: ``` Error authenticating: Error making API request. URL: PUT https://localhost:8200/v1/auth/gcp/login Code: 400. Errors: * could not find service account key or Google Oauth cert with given 'kid' id ```
-
Vishal Nayak authored
-
Becca Petrin authored
-
- 28 Sep, 2018 11 commits
-
-
Chris Hoffman authored
-
Matthew Irish authored
* allow passing a path for options so that it can be extracted from the model * add cred type selector for the aws generate form * style hint text on generate creds form * add tests for aws-credential adapter * allow for the case where we might have zero ttl * show error for TTL picker if a non-number is entered for the duration part of the TTL * fix positioning of tooltips * fix ttl rendering with invalid input for initialValue
-
Brian Shumate authored
-
Chris Hoffman authored
-
Jeff Mitchell authored
-
Jeff Mitchell authored
Fixes #5409
-
Matthew Irish authored
* allow for enterprise init attributes * allow moving from init to auth in the init flow on the tutorial machine * show loading spinner while cluster is unsealing * use seal-status type to determine the init attrs * add init acceptance tests * stored_shares should always be 1 * fix lint * format template * remove explicity model attr from init controller
-
Mike Christof authored
-
Calvin Leung Huang authored
-
Chris Hoffman authored
-
joe miller authored
Specifying the `allowed_organiztaional_units` parameter to a cert auth backend role will require client certificates to contain at least one of a list of one or more "organizational units" (OU). Example use cases: Certificates are issued to entities in an organization arrangement by organizational unit (OU). The OU may be a department, team, or any other logical grouping of resources with similar roles. The entities within the OU should be granted the same policies. ``` $ vault write auth/cert/certs/ou-engineering \ certificate=@ca.pem \ policies=engineering \ allowed_organiztaional_units=engineering $ vault write auth/cert/certs/ou-engineering \ certificate=@ca.pem \ policies=engineering \ allowed_organiztaional_units=engineering,support ```
-
- 27 Sep, 2018 5 commits
-
-
Jeff Mitchell authored
-
Jeff Mitchell authored
-
Ben Boeckel authored
-
Martin authored
-
vishalnayak authored
-