This project is mirrored from https://gitee.com/NQL886/vault.git. Pull mirroring failed .
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer.
  1. 17 Jul, 2019 1 commit
  2. 16 Jul, 2019 3 commits
  3. 15 Jul, 2019 1 commit
  4. 09 Jul, 2019 12 commits
  5. 08 Jul, 2019 8 commits
  6. 06 Jul, 2019 4 commits
  7. 05 Jul, 2019 11 commits
    • Jeff Mitchell's avatar
      Migrate build to use go modules · 3439a349
      Jeff Mitchell authored
      3439a349
    • Mike Jarmy's avatar
      AWS upgrade role entries (#7025) · c48159ea
      Mike Jarmy authored
      * upgrade aws roles
      
      * test upgrade aws roles
      
      * Initialize aws credential backend at mount time
      
      * add a TODO
      
      * create end-to-end test for builtin/credential/aws
      
      * fix bug in initializer
      
      * improve comments
      
      * add Initialize() to logical.Backend
      
      * use Initialize() in Core.enableCredentialInternal()
      
      * use InitializeRequest to call Initialize()
      
      * improve unit testing for framework.Backend
      
      * call logical.Backend.Initialize() from all of the places that it needs to be called.
      
      * implement backend.proto changes for logical.Backend.Initialize()
      
      * persist current role storage version when upgrading aws roles
      
      * format comments correctly
      
      * improve comments
      
      * use postUnseal funcs to initialize backends
      
      * simplify test suite
      
      * improve test suite
      
      * simplify logic in aws role upgrade
      
      * simplify aws credential initialization logic
      
      * simplify logic in aws role upgrade
      
      * use the core's activeContext for initialization
      
      * refactor builtin/plugin/Backend
      
      * use a goroutine to upgrade the aws roles
      
      * misc improvements and cleanup
      
      * do not run AWS role upgrade on DR Secondary
      
      * always call logical.Backend.Initialize() when loading a plugin.
      
      * improve comments
      
      * on standbys and DR secondaries we do not want to run any kind of upgrade logic
      
      * fix awsVersion struct
      
      * clarify aws version upgrade
      
      * make the upgrade logic for aws auth more explicit
      
      * aws upgrade is now called from a switch
      
      * fix fallthrough bug
      
      * simplify logic
      
      * simplify logic
      
      * rename things
      
      * introduce currentAwsVersion const to track aws version
      
      * improve comments
      
      * rearrange things once more
      
      * conglomerate things into one function
      
      * stub out aws auth initialize e2e test
      
      * improve aws auth initialize e2e test
      
      * finish aws auth initialize e2e test
      
      * tinker with aws auth initialize e2e test
      
      * tinker with aws auth initialize e2e test
      
      * tinker with aws auth initialize e2e test
      
      * fix typo in test suite
      
      * simplify logic a tad
      
      * rearrange assignment
      
      * Fix a few lifecycle related issues in #7025 (#7075)
      
      * Fix panic when plugin fails to load
      c48159ea
    • Tim Arenz's avatar
      Update tokens.html.md (#6697) · 8b9e9ea1
      Tim Arenz authored
      Fixing miner typo by adding dot.
      8b9e9ea1
    • Brian Shumate's avatar
      Update API docs for Create Token — resolves #7053 (#7056) · 36cf85f2
      Brian Shumate authored
      - Update sample `payload.json`
      - Update sample response
      36cf85f2
    • Justin Weissig's avatar
      docs: spelling (#6838) · 405670d4
      Justin Weissig authored
      Fixed minor spelling error: sychronized/synchronized.
      405670d4
    • Brian Shumate's avatar
      Update Cert Auth Login API docs — resolves #7039 (#7058) · 22e66d6c
      Brian Shumate authored
      - Add `--cert` and `--key` options to `curl` example so that it is
        clearer that the certificate and key must also be passed in
      22e66d6c
    • Daniel Mangum's avatar
      plugin docs: update example code snippet with correct imports and link to... · 420f26b3
      Daniel Mangum authored
      plugin docs: update example code snippet with correct imports and link to developing plugin backends tutorial (#6843)
      Signed-off-by: default avatarhasheddan <georgedanielmangum@gmail.com>
      420f26b3
    • Jeff Mitchell's avatar
      Fix various read only storage errors · ccffa166
      Jeff Mitchell authored
      * Fix various read only storage errors
      
      A mistake we've seen multiple times in our own plugins and that we've
      seen in the GCP plugin now is that control flow (how the code is
      structured, helper functions, etc.) can obfuscate whether an error came
      from storage or some other Vault-core location (in which case likely it
      needs to be a 5XX message) or because of user input (thus 4XX). Error
      handling for functions therefore often ends up always treating errors as
      either user related or internal.
      
      When the error is logical.ErrReadOnly this means that treating errors as
      user errors skips the check that triggers forwarding, instead returning
      a read only view error to the user.
      
      While it's obviously more correct to fix that code, it's not always
      immediately apparent to reviewers or fixers what the issue is and fixing
      it when it's found both requires someone to hit the problem and report
      it (thus exposing bugs to users) and selective targeted refactoring that
      only helps that one ...
      ccffa166
    • Brian Kassouf's avatar
      core: Don't shutdown if key upgrades fail due to canceled context (#7070) · 8e93f590
      Brian Kassouf authored
      * core: Don't shutdown if key upgrades fail due to canceled context
      
      * Continue if we are not shutting down
      8e93f590
    • Calvin Leung Huang's avatar
      audit: log invalid wrapping token request/response (#6541) · c3f0f96e
      Calvin Leung Huang authored
      
      * audit: log invalid wrapping token request/response
      
      * Update helper/consts/error.go
      Co-Authored-By: default avatarcalvn <cleung2010@gmail.com>
      
      * update error comments
      
      * Update vault/wrapping.go
      Co-Authored-By: default avatarcalvn <cleung2010@gmail.com>
      
      * update comment
      
      * move validateWrappingToken out of http and into logical
      
      * minor refactor, add test cases
      
      * comment rewording
      
      * refactor validateWrappingToken to perform audit logging
      
      * move ValidateWrappingToken back to wrappingVerificationFunc
      
      * Fix tests
      
      * Review feedback
      c3f0f96e
    • Becca Petrin's avatar
      add a reader that takes stdin (#7074) · 3cc7f4a6
      Becca Petrin authored
      3cc7f4a6