This project is mirrored from https://gitee.com/NQL886/vault.git.
Pull mirroring failed .
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer.
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer.
- 16 Oct, 2019 2 commits
-
-
Alberto Alvarez authored
* Add further detail on Auto Unseal and awskms Seal documentation * Move Rekeying to the generic Seal docs
-
Michael Gaffney authored
-
- 15 Oct, 2019 18 commits
-
-
Calvin Leung Huang authored
* cli: initial work on debug; server-status target * debug: add metrics capture target (#7376) * check against DR secondary * debug: add compression * refactor check into preflight func * debug: set short test time on tests, fix exit code bug * debug: use temp dir for output on tests * debug: use mholt/archiver for compression * first pass on adding pprof * use logger for output * refactor polling target capture logic * debug: poll and collect replication status * debug: poll and collect host-info; rename output files and collection refactor * fix comments * add archive test; fix bugs found * rename flag name to singular target * add target output test; scaffold other tests cases * debug/test: add pprof and index file tests * debug/test: add min timing check tests * debug: fix index gen race and collection goroutine race * debug: extend archive tests, handle race between program exit and polling goroutines * update docstrin...
-
Yoko authored
* Adding the known issue section * incorporated the feedback * Added the known issue section * Fixed a typo * Created upgrade guide for 1.1.2
-
Michael Gaffney authored
* core: add hook for initializing seals for migration Needed in enterprise version.
-
Jim Kalafut authored
-
Dom Goodwin authored
-
Vishal Nayak authored
-
Matthew Irish authored
-
Jim Kalafut authored
-
Brian Shumate authored
- Add missing `username` and `password` connection parameters - Use templated root credential in example connection payload
-
Amitosh Swain Mahapatra authored
-
Brian Shumate authored
* Docs: File Audit Device - Add section + note about proper File Audit Device log rotation * Additional clarification about relevant platforms
-
Chris Hoffman authored
-
Chris Hoffman authored
-
Chris Hoffman authored
-
Chris Hoffman authored
-
Jeff Mitchell authored
Fixes #7588
-
Vishal Nayak authored
-
Vishal Nayak authored
* Initial work * rework * s/dr/recovery * Add sys/raw support to recovery mode (#7577) * Factor the raw paths out so they can be run with a SystemBackend. # Conflicts: # vault/logical_system.go * Add handleLogicalRecovery which is like handleLogical but is only sufficient for use with the sys-raw endpoint in recovery mode. No authentication is done yet. * Integrate with recovery-mode. We now handle unauthenticated sys/raw requests, albeit on path v1/raw instead v1/sys/raw. * Use sys/raw instead raw during recovery. * Don't bother persisting the recovery token. Authenticate sys/raw requests with it. * RecoveryMode: Support generate-root for autounseals (#7591) * Recovery: Abstract config creation and log settings * Recovery mode integration test. (#7600) * Recovery: Touch up (#7607) * Recovery: Touch up * revert the raw backend creation changes * Added recovery operation token prefix * Move RawBackend to its own file * Update API path and hit it using CLI flag on generate-root * Fix a panic triggered when handling a request that yields a nil response. (#7618) * Improve integ test to actually make changes while in recovery mode and verify they're still there after coming back in regular mode. * Refuse to allow a second recovery token to be generated. * Resize raft cluster to size 1 and start as leader (#7626) * RecoveryMode: Setup raft cluster post unseal (#7635) * Setup raft cluster post unseal in recovery mode * Remove marking as unsealed as its not needed * Address review comments * Accept only one seal config in recovery mode as there is no scope for migration
-
- 14 Oct, 2019 11 commits
-
-
Jack Kleeman authored
Currently whenever we start a new C* session in the database plugin, we run `LIST ALL` to determine whether we are a superuser, or otherwise have permissions on roles. This is a fairly sensible way of checking this, except it can be really slow when you have a lot of roles (C* isn't so good at listing things). It's also really intensive to C* and leads to a lot of data transfer. We've seen timeout issues when doing this query, and can of course raise the timeout, but we'd probably prefer to be able to switch it off.
-
Jim Kalafut authored
-
Jim Kalafut authored
-
Matthew Irish authored
* add storage route * template out the routes and new raft storage overview * fetch raft config and add new server model * pngcrush the favicon * add view components and binary-file component * add form-save-buttons component * adjust rawRequest so that it can send a request body and returns the response on errors * hook up restore * rename binary-file to file-to-array-buffer * add ember-service-worker * use forked version of ember-service-worker for now * scope the service worker to a single endpoint * show both download buttons for now * add service worker download with a fallback to JS in-mem download * add remove peer functionality * lint go file * add storage-type to the cluster and node models * update edit for to take a cancel action * separate out a css table styles to be used by http-requests-table and on the raft-overview component * add raft-join adapter, model, component and use on the init page...
-
Becca Petrin authored
-
Yoko authored
-
Jim Kalafut authored
Fixes #7648
-
Calvin Leung Huang authored
-
Brian Kassouf authored
* Start benchmark work * Add batching FSM function * dedupe some code * Update dependency on chunking FSM * fix raft external tests * fix go.mod * Add batching test * uncomment test * update raft deps * update vendor * Update physical/raft/fsm.go Co-Authored-By:
Michel Vocks <michelvocks@gmail.com> * Update physical/raft/fsm.go
-
ncabatoff authored
On circleci we've seen the test run very slowly so it's often failing here.
-
Mike Jarmy authored
-
- 11 Oct, 2019 8 commits
-
-
Mike Jarmy authored
* implement SSRF protection header * add test for SSRF protection header * cleanup * refactor * implement SSRF header on a per-listener basis * cleanup * cleanup * creat unit test for agent SSRF * improve unit test for agent SSRF * add VaultRequest SSRF header to CLI * fix unit test * cleanup * improve test suite * simplify check for Vault-Request header * add constant for Vault-Request header * improve test suite * change 'config' to 'agentConfig' * Revert "change 'config' to 'agentConfig'" This reverts commit 14ee72d21fff8027966ee3c89dd3ac41d849206f. * do not remove header from request * change header name to X-Vault-Request * simplify http.Handler logic * cleanup * simplify http.Handler logic * use stdlib errors package
-
Brian Kassouf authored
* OSS portions of raft non-voters * add file * Update vault/raft.go Co-Authored-By:
Vishal Nayak <vishalnayak@users.noreply.github.com>
-
isbric authored
-
kuritonasu authored
-
kuritonasu authored
-
Chris Hoffman authored
-
Michel Vocks authored
-
- 10 Oct, 2019 1 commit
-
-
Jason O'Donnell authored
-