This project is mirrored from https://gitee.com/NQL886/vault.git.
Pull mirroring failed .
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer.
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer.
- 08 Oct, 2018 4 commits
-
-
Jeff Mitchell authored
-
Jeff Mitchell authored
-
Jeff Mitchell authored
-
Jeff Mitchell authored
* Set allowed OIDs to any value when generaing a CA. Also, allow utf-8 in addition to utf8 as the OID type specifier, and allow `*` to specify any OID of a supported type. * Update PKI docs
-
- 06 Oct, 2018 1 commit
-
-
Jim Kalafut authored
-
- 05 Oct, 2018 3 commits
-
-
Jim Kalafut authored
Running 'vault auth' with no parameters was panicking: panic: assignment to entry in nil map github.com/hashicorp/vault/command/login.go:255 +0xdee Now it will show help.
-
Becca Petrin authored
-
vishalnayak authored
-
- 04 Oct, 2018 7 commits
-
-
Vishal Nayak authored
-
Brian Kassouf authored
-
Jim Kalafut authored
sha_256 is supported but not referenced in our API docs.
-
Sebastian Plattner authored
-
Jeff Mitchell authored
-
Konstantinos Tsanaktsidis authored
When Vault is concurrently creating and revoking leases for MongoDB users as part of the database secrets engine, and then loses connection to MongoDB, it can panic. This occurrs because the RevokeUser path does _not_ lock the mutex, but the CreateUser path does. Both threads of execution can concurently decide to call c.session.Close() in mongodb/connection_producer.go:119, and then mgo panics when the second close attempt occurs.
-
Jeff Mitchell authored
-
- 03 Oct, 2018 9 commits
-
-
Becca Petrin authored
-
Brian Kassouf authored
-
Jeff authored
-
Brian Kassouf authored
-
Martins Sipenko authored
-
Brian Kassouf authored
-
Brian Kassouf authored
-
Becca Petrin authored
-
Chris Hoffman authored
-
- 02 Oct, 2018 16 commits
-
-
Brian Kassouf authored
-
Jeff Mitchell authored
-
Jeff Mitchell authored
-
Jeff Mitchell authored
-
Brian Kassouf authored
-
Jeff Mitchell authored
-
Brian Kassouf authored
-
Chris Hoffman authored
-
Matthew Irish authored
-
Chris Hoffman authored
-
sk4ry authored
* Add ability to configure the NotBefore property of certificates in role api * Update index.html.md * converting field to time.Duration * setting default back to 30s * renaming the parameter not_before_duration to differentiate between the NotBefore datetime on the cert * Update description
-
Matthew Irish authored
* re-add performancestandycode for health api call * update debounce timeout for namespace input on the auth page * re-fetch cluster model on successful init * 500ms for the debounce * swap auth methods after successful api call so that the auth box doesn't jump around * move list capability fetch to namespace component and don't use computed queryRecord to fetch it * convert ed models to JSON so that they're unaffected by store unloading * serialize with the id for the auth method models * speed tests back up with different polling while loop * login flash isn't in the same run loop so no longer needs withFlash
-
Joel Thompson authored
* Allow specifying role-default TTLs in AWS secret engine * Add an acceptance test * Add docs for AWS secret role-default TTLs * Rename default_ttl to default_sts_ttl * Return default_ttl as int64 instead of time.Duration * Fix broken tests The merge of #5383 broke the tests due to some changes in the test style that didn't actually cause a git merge conflict. This updates the tests to the new style.
-
Matthew Irish authored
-
Matthew Irish authored
* fix token expiration calculation * move authenticate to an ember concurrency task * don't show logged in nav while still on the auth route * move current tests to integration folder, add unit test for expiration calculation * fix auth form tests
-
Nageswara Rao Podilapu authored
This might be a typo, It says `A user may have a client token sent to her` instead it should say `A user may have a client token sent to them`
-