This project is mirrored from https://gitee.com/NQL886/vault.git.
Pull mirroring failed .
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer.
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer.
- 17 Dec, 2021 2 commits
- 15 Dec, 2021 1 commit
-
-
Yoko Hyakuna authored
* Add paths filter doc * Add a description about the screenshot * Update website/content/docs/enterprise/replication.mdx Co-authored-by:
Loann Le <84412881+taoism4504@users.noreply.github.com> * Update website/content/docs/enterprise/replication.mdx Co-authored-by:
Loann Le <84412881+taoism4504@users.noreply.github.com> * Update website/content/docs/enterprise/replication.mdx Co-authored-by:
Loann Le <84412881+taoism4504@users.noreply.github.com> * Update website/content/docs/enterprise/replication.mdx Co-authored-by:
Loann Le <84412881+taoism4504@users.noreply.github.com> * Update website/content/docs/enterprise/replication.mdx Co-authored-by:
Loann Le <84412881+taoism4504@users.noreply.github.com> * Update website/content/docs/enterprise/replication.mdx Co-authored-by:
Loann Le <84412881+taoism4504@users.noreply.github.com> * Update website/content/docs/enterprise/replication.mdx Co-authored-by:
Loann Le <84412881+taoism4504@users.noreply.github.com> * Update website/content/docs/enterprise/replication.mdx Co-authored-by:
Loann Le <84412881+taoism4504@users.noreply.github.com> * Update website/content/docs/enterprise/replication.mdx Co-authored-by:
Loann Le <84412881+taoism4504@users.noreply.github.com> * Update website/content/docs/enterprise/replication.mdx Co-authored-by:
Loann Le <84412881+taoism4504@users.noreply.github.com> * Update website/content/docs/enterprise/replication.mdx Co-authored-by:
Loann Le <84412881+taoism4504@users.noreply.github.com> * Remove extra sentense * Update the diagram * Update the diagram Co-authored-by:
Loann Le <84412881+taoism4504@users.noreply.github.com>
-
- 14 Dec, 2021 8 commits
-
-
John-Michael Faircloth authored
* github auth: use org id to verify creds * add check for required org param; add test case * update UTs * add nil check for org * add changelog * fix typo in ut * set org ID if it is unset; add more ut coverage * add optional organization_id * move client instantiation * refactor parse URL; add UT for setting org ID * fix comment in UT * add nil check * don't update org name on change; return warning * refactor verifyCredentials * error when unable to fetch org ID on config write; add warnings * fix bug in log message * update UT and small refactor * update comments and log msg * use getter for org ID
-
Victor Rodriguez authored
-
Kyle Penfound authored
-
Sai Hemanth Bheemreddy authored
-
Nick Cabatoff authored
Bump yarn cache key version so that it uses the new disk layout we've adopted for using cimg/go. (#13420)
-
Meggie authored
* Go 1.17.2 -> 1.17.5 * Switching to cimg
-
Mark Lewis authored
-
Pratyoy Mukhopadhyay authored
* Add docs about path param restrictions * Update website/content/api-docs/auth/userpass.mdx Co-authored-by:
Loann Le <84412881+taoism4504@users.noreply.github.com> * Update with review suggestion Co-authored-by:
Loann Le <84412881+taoism4504@users.noreply.github.com>
-
- 13 Dec, 2021 4 commits
-
-
Steven Clark authored
-
Alexander Scheel authored
* Allow universal default for key_bits This allows the key_bits field to take a universal default value, 0, which, depending on key_type, gets adjusted appropriately into a specific default value (rsa->2048, ec->256, ignored under ed25519). Signed-off-by:
Alexander Scheel <alex.scheel@hashicorp.com> * Handle universal default key size in certutil Also move RSA < 2048 error message into certutil directly, instead of in ca_util/path_roles. Signed-off-by:
Alexander Scheel <alex.scheel@hashicorp.com> * Add missing RSA key sizes to pki/backend_test.go Signed-off-by:
Alexander Scheel <alex.scheel@hashicorp.com> * Switch to returning updated values When determining the default, don't pass in pointer types, but instead return the newly updated value. Signed-off-by:
Alexander Scheel <alex.scheel@hashicorp.com> * Add changelog entry Signed-off-by:
Alexander Scheel <alex.scheel@hashicorp.com> * Re-add fix for ed25519 from #13254 Ed25519 internally specifies a hash length; by changing the default from 256 to 0, we fail validation in ValidateSignatureLength(...) unless we specify the key algorithm. Signed-off-by:
Alexander Scheel <alex.scheel@hashicorp.com>
-
Jason O'Donnell authored
* auth/azure: add note about debug env * Update azure.mdx * Update azure.mdx
-
Ben Ash authored
* Clean up whitespace
-
- 10 Dec, 2021 10 commits
-
-
Ben Ash authored
* Support clearing an identity alias' custom_metadata Previously, an update to an entity alias supported updating the custom_metadata as long as the update was not empty, which makes it impossible to clear the metadata values completely. Fixes: - empty custom_metadata parameters are honoured on entity alias update - update related tests - drop dependency on mapstructure - reformat with gofumpt
-
Chelsea Shaw authored
* Initial fix * Add fallback zero values * Add changelog * Fix client count current test
-
Meggie authored
Working on a new workflow for generating the preview so I thought I'd leave a note that it's still coming.
-
Meggie authored
* Some changelog tidying for 1.10 preview * PR accounted for by different CL entry
-
Chelsea Shaw authored
* Fix managed namespace test * Remove log
-
Steven Clark authored
- The test was attempting to test the convergent encryption behaviour with several key types but the common function never used the passed in key type. So we ran the test with the default aes256-gcm96 only.
-
John-Michael Faircloth authored
-
divyapola5 authored
* CLI changes for new mount tune config parameter allowed_managed_keys * Correct allowed_managed_keys description in auth and secrets * Documentation update for secrets and removed changes for auth * Add changelog and remove documentation changes for auth * removed changelog * Correct the field description
-
Nick Cabatoff authored
-
Nick Cabatoff authored
-
- 09 Dec, 2021 4 commits
-
-
Meggie authored
-
Brandon Romano authored
-
Meggie authored
-
John-Michael Faircloth authored
* auth/jwt: Update plugin to v0.11.3 * add changelog
-
- 08 Dec, 2021 6 commits
-
-
hghaf099 authored
* VAULT-1564 report in-flight requests * adding a changelog * Changing some variable names and fixing comments * minor style change * adding unauthenticated support for in-flight-req * adding documentation for the listener.profiling stanza * adding an atomic counter for the inflight requests addressing comments * addressing comments * logging completed requests * fixing a test * providing log_requests_info as a config option to determine at which level requests should be logged * removing a member and a method from the StatusHeaderResponseWriter struct * adding api docks * revert changes in NewHTTPResponseWriter * Fix logging invalid log_requests_info value * Addressing comments * Fixing a test * use an tomic value for logRequestsInfo, and moving the CreateClientID function to Core * fixing go.sum * minor refactoring * protecting InFlightRequests from data race * another try on fixing a data race * another try to fix a data race * addressing comments * fixing couple of tests * changing log_requests_info to log_requests_level * minor style change * fixing a test * removing the lock in InFlightRequests * use single-argument form for interface assertion * adding doc for the new configuration paramter * adding the new doc to the nav data file * minor fix
-
Pratyoy Mukhopadhyay authored
* Add entity-alias behavior change to docs * Add upgrade note about entity-alias mapping change * Rename 1.7-9 upgrade pages, shuffle upgrade note position * Update website/content/partials/entity-alias-mapping.mdx Co-authored-by:
Meggie <meggie@hashicorp.com> * Add incorrect policy issue to the docs * Add example about entity-alias restriction Co-authored-by:
Meggie <meggie@hashicorp.com>
-
Steven Clark authored
* Warn user supplying nonce values in FIPS mode for transit encryption requests - Send back a warning within the response if an end-user supplies nonce values that we use within the various transit encrypt apis. - We do not send a warning if an end-user supplies a nonce value but we don't use it. - Affected api methods are encrypt, rewrap and datakey - The warning is only sent when we are operating in FIPS mode.
-
Theron Voran authored
Changes the error output for the second open of the persistent cache file, to differentiate it from the c.UI.Error message for the initial open of the cache file, just to make it easier to tell where a problem occurred.
-
Matt Schultz authored
* Adding support for SHA3 in the transit backend. * Adds SHA-3 tests for transit sign/verify path. Adds SHA-3 tests for logical system tools path hash functionality. Updates documentation to include SHA-3 algorithms in system tools path hashing. * Adds changelog entry. Co-authored-by:
robison jacka <robison@packetized.io>
-
Tom Proctor authored
* Rework 1.21 content into one heading and add note at top * Add notes about extended k8s token duration * Add example of ClusterRoleBinding for using client JWTs
-
- 07 Dec, 2021 5 commits
-
-
Noel Quiles authored
-
Mike Green authored
-
Calvin Leung Huang authored
-
mickael-hc authored
-
Jordan Reimer authored
* adds ember-flight-icons dependecy * adds inline-json-import babel plugin * adds flight icon styling * updates Icon component to support flight icons * updates Icon component usages to new api and updates name values to flight icon set when available * fixes tests * updates icon story with flight mappings and fixes issue with flight icons not rendering in storybook * adds changelog * fixes typo in sign action glyph name in transit-key model * adds comments to icon-map * updates Icon component to use only supported flight icon sizes * adds icon transform codemod * updates icon transform formatting to handle edge case * runs icon transform on templates * updates Icon usage in toolbar-filter md and story * updates tests
-