This project is mirrored from https://gitee.com/NQL886/vault.git.
Pull mirroring failed .
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer.
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer.
- 17 Jul, 2019 1 commit
-
-
Jeff Mitchell authored
Several env vars got renamed in https://github.com/hashicorp/vault/pull/6306. This re-adds support for those. Indirectly addresses https://github.com/hashicorp/consul-template/pull/1233 although they should still update to the new values.
-
- 16 Jul, 2019 3 commits
-
-
Noelle Daley authored
* ensure dropdown updates selected item * ensure no duplicate ticks * handle case where counters are Dates instead of strings so bar chart filters in Storybook
-
Calvin Leung Huang authored
-
Michel Vocks authored
-
- 15 Jul, 2019 1 commit
-
-
Lexman authored
-
- 09 Jul, 2019 12 commits
-
-
Becca Petrin authored
* fix panic generating openapi docs * fmt
-
Calvin Leung Huang authored
-
Brian Kassouf authored
-
Calvin Leung Huang authored
-
Jeff Mitchell authored
-
Jeff Mitchell authored
This reverts commit 3439a349. For the moment with bad wifi this is just taking too, too long. We may be able to figure out an approach that bind mounts the cache in which should help drastically.
-
Jeff Mitchell authored
-
Jeff Mitchell authored
-
Jeff Mitchell authored
-
Jeff Mitchell authored
-
Jeff Mitchell authored
-
Jeff Mitchell authored
-
- 08 Jul, 2019 8 commits
-
-
Jeff Mitchell authored
-
Jeff Mitchell authored
-
Jeff Mitchell authored
-
Mark Gritter authored
-
Jeff Mitchell authored
-
Brian Kassouf authored
* Don't run Initialize on plugins on postUnseal * Add comments explaining that we do not want to initalize
-
Martin Lee authored
Resolves #7081
-
Matthew Irish authored
-
- 06 Jul, 2019 4 commits
-
-
Jeff Mitchell authored
Wrapping validation was deferring the function to audit log before actually checking if we were sealed or standby, and without having the read lock grabbed.
-
Brian Kassouf authored
-
Jeff Mitchell authored
-
Brian Kassouf authored
-
- 05 Jul, 2019 11 commits
-
-
Jeff Mitchell authored
-
Mike Jarmy authored
* upgrade aws roles * test upgrade aws roles * Initialize aws credential backend at mount time * add a TODO * create end-to-end test for builtin/credential/aws * fix bug in initializer * improve comments * add Initialize() to logical.Backend * use Initialize() in Core.enableCredentialInternal() * use InitializeRequest to call Initialize() * improve unit testing for framework.Backend * call logical.Backend.Initialize() from all of the places that it needs to be called. * implement backend.proto changes for logical.Backend.Initialize() * persist current role storage version when upgrading aws roles * format comments correctly * improve comments * use postUnseal funcs to initialize backends * simplify test suite * improve test suite * simplify logic in aws role upgrade * simplify aws credential initialization logic * simplify logic in aws role upgrade * use the core's activeContext for initialization * refactor builtin/plugin/Backend * use a goroutine to upgrade the aws roles * misc improvements and cleanup * do not run AWS role upgrade on DR Secondary * always call logical.Backend.Initialize() when loading a plugin. * improve comments * on standbys and DR secondaries we do not want to run any kind of upgrade logic * fix awsVersion struct * clarify aws version upgrade * make the upgrade logic for aws auth more explicit * aws upgrade is now called from a switch * fix fallthrough bug * simplify logic * simplify logic * rename things * introduce currentAwsVersion const to track aws version * improve comments * rearrange things once more * conglomerate things into one function * stub out aws auth initialize e2e test * improve aws auth initialize e2e test * finish aws auth initialize e2e test * tinker with aws auth initialize e2e test * tinker with aws auth initialize e2e test * tinker with aws auth initialize e2e test * fix typo in test suite * simplify logic a tad * rearrange assignment * Fix a few lifecycle related issues in #7025 (#7075) * Fix panic when plugin fails to load
-
Tim Arenz authored
Fixing miner typo by adding dot.
-
Brian Shumate authored
- Update sample `payload.json` - Update sample response
-
Justin Weissig authored
Fixed minor spelling error: sychronized/synchronized.
-
Brian Shumate authored
- Add `--cert` and `--key` options to `curl` example so that it is clearer that the certificate and key must also be passed in
-
Daniel Mangum authored
plugin docs: update example code snippet with correct imports and link to developing plugin backends tutorial (#6843) Signed-off-by:
hasheddan <georgedanielmangum@gmail.com>
-
Jeff Mitchell authored
* Fix various read only storage errors A mistake we've seen multiple times in our own plugins and that we've seen in the GCP plugin now is that control flow (how the code is structured, helper functions, etc.) can obfuscate whether an error came from storage or some other Vault-core location (in which case likely it needs to be a 5XX message) or because of user input (thus 4XX). Error handling for functions therefore often ends up always treating errors as either user related or internal. When the error is logical.ErrReadOnly this means that treating errors as user errors skips the check that triggers forwarding, instead returning a read only view error to the user. While it's obviously more correct to fix that code, it's not always immediately apparent to reviewers or fixers what the issue is and fixing it when it's found both requires someone to hit the problem and report it (thus exposing bugs to users) and selective targeted refactoring that only helps that one ...
-
Brian Kassouf authored
* core: Don't shutdown if key upgrades fail due to canceled context * Continue if we are not shutting down
-
Calvin Leung Huang authored
* audit: log invalid wrapping token request/response * Update helper/consts/error.go Co-Authored-By:
calvn <cleung2010@gmail.com> * update error comments * Update vault/wrapping.go Co-Authored-By:
calvn <cleung2010@gmail.com> * update comment * move validateWrappingToken out of http and into logical * minor refactor, add test cases * comment rewording * refactor validateWrappingToken to perform audit logging * move ValidateWrappingToken back to wrappingVerificationFunc * Fix tests * Review feedback
-
Becca Petrin authored
-