This project is mirrored from https://gitee.com/NQL886/vault.git.
Pull mirroring failed .
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer.
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer.
- 20 Dec, 2018 7 commits
-
-
Matthew Irish authored
* don't pass id when using createRecord * add find nearest ancestor mixin * re-throw the error if we've deleted something and encounter a 404 * use the with-nav-to-nearest-ancestor mixin * add some comments * add acceptance test to verify new behavior * yield final transition in ec task
-
Pawel Gorczynski authored
Extended info message regarding VAULT_ADDR env variable for Windows when running `server -dev` (#5970) * Improved info message for Windows when running `server -dev` Improvement for https://github.com/hashicorp/vault/issues/3405 * output updated to: You may need to set the following environment variable: PowerShell: $env:VAULT_ADDR="http://127.0.0.1:8200" cmd.exe: set VAULT_ADDR=http://127.0.0.1:8200
-
Noelle Daley authored
-
Becca Petrin authored
Docs: JWT API - List Roles: fix the path
-
Becca Petrin authored
Improve local development instruction
-
Brian Kassouf authored
-
Jim Kalafut authored
Also move existing base62 encode/decode operations to their only points of use.
-
- 19 Dec, 2018 2 commits
-
-
R.B. Boyer authored
-
Clint authored
-
- 18 Dec, 2018 3 commits
-
-
Matthew Irish authored
* add performanceStandbyCount to license model * use count to determine if perf standby is an active feature * rename test file and add tests for new perf standby behavior * Update ui/app/templates/components/license-info.hbs * update display language
-
Graham Land authored
* Add example for AWS KMS AutoUnseal with PGP Keys A customer could not figure how to get this working today. This example would have helped them. We don't mention KMS anywhere in this section. * Changed reference from AWS KMS to Auto Unseal ``` bash Initialize Auto Unseal, but encrypt the recovery keys with pgp keys: ```
-
Janosch Maier authored
The resource name when referring to a GCP project needs to have a "s". This PR adds the missing letter in the documentation.
-
- 14 Dec, 2018 13 commits
-
-
vishalnayak authored
-
Jeff Mitchell authored
-
Jeff Mitchell authored
-
Jeff Mitchell authored
-
Jeff Mitchell authored
-
Jeff Mitchell authored
-
Jeff Mitchell authored
-
Jeff Mitchell authored
-
Jeff Mitchell authored
* Strip empty strings from database revocation stmts It's technically valid to give empty strings as statements to run on most databases. However, in the case of revocation statements, it's not only generally inadvisable but can lead to lack of revocations when you expect them. This strips empty strings from the array of revocation statements. It also makes two other changes: * Return statements on read as empty but valid arrays rather than nulls, so that typing information is inferred (this is more in line with the rest of Vault these days) * Changes field data for TypeStringSlice and TypeCommaStringSlice such that a client-supplied value of `""` doesn't turn into `[]string{""}` but rather `[]string{}`. The latter and the explicit revocation statement changes are related, and defense in depth.
-
Matthew Irish authored
-
Jeff Mitchell authored
-
Brian Kassouf authored
-
Brian Kassouf authored
-
- 13 Dec, 2018 3 commits
-
-
Jeff Mitchell authored
Fixes #5831
-
Hugues Malphettes authored
-
Jeff Mitchell authored
-
- 12 Dec, 2018 12 commits
-
-
Matthew Irish authored
-
Matthew Irish authored
* add an auth-config adapter for jwt so that configs can be saved properly * unskip some tests and add a test for jwt config * linting
-
Hugues Malphettes authored
With vault-1.0.0 and vault-0.11.4 a different path is needed to list the jwt registered roles: ``` $ vault list auth/jwt/roles No value found at auth/jwt/roles/ $ vault list auth/jwt/role Keys ---- myrole ``` I hope this helps!
-
Jim Kalafut authored
-
Jim Kalafut authored
Fixes #5842
-
Jeff Mitchell authored
-
Lukasz Jagiello authored
This PR fix #5778. Easy test case to reproduce the problem: https://play.golang.org/p/CAMdrOHT7C1 Since `certStr` is empty string during first iteration `strings.Join()` will merge empty line with first CA cert. Extra `strings.TrimSpace` call will remove that empty line, before certificate will be return.
-
Jeff Mitchell authored
-
Nándor István Krácser authored
-
Jeff Mitchell authored
-
Brian Kassouf authored
-
Sergey Trasko authored
-