andrejvanderzee
dc6ea9ecbb
Fix for using ExplicitMaxTTL in auth method plugins. ( #5379 )
...
* Fix for using ExplicitMaxTTL in auth method plugins.
* Reverted pb.go files for readability of PR.
* Fixed indenting of comment.
* Reverted unintended change by go test.
2018-09-21 14:31:29 -07:00
Jim Kalafut
343c72dbe1
Detect and bypass cycles during token revocation ( #5364 )
...
Fixes #4803
2018-09-20 14:56:38 -07:00
Calvin Leung Huang
189b893b35
Add ability to provide env vars to plugins ( #5359 )
...
* Add ability to provide env vars to plugins
* Update docs
* Update docs with examples
* Refactor TestAddTestPlugin, remove TestAddTestPluginTempDir
2018-09-20 10:50:29 -07:00
Jeff Mitchell
919b968c27
The big one ( #5346 )
2018-09-17 23:03:00 -04:00
Jeff Mitchell
f692c1e3a9
Revert "Detect and bypass cycles during token revocation ( #5335 )"
...
This reverts commit 00314eb4d1c5609a1935f653dc6f2fc83c0bfcc0.
2018-09-17 14:10:57 -04:00
Jim Kalafut
0ae6ec52b8
Detect and bypass cycles during token revocation ( #5335 )
...
Fixes #4803
2018-09-17 08:55:12 -07:00
Becca Petrin
b2ff87c9c2
Poll for new creds in the AWS auth agent ( #5300 )
2018-09-12 13:30:57 -07:00
vishalnayak
e421972efb
Remove group alias mdmdb update outside of UpsertGroupInTxn
2018-09-06 12:19:00 -04:00
Martin
d51f3a45f7
Fix group alias loading when identity memdb is initialized ( #5289 )
2018-09-06 09:17:44 -07:00
Jeff Mitchell
95bdbbe85e
Port fix over that ensures we use the right step-down context ( #5290 )
2018-09-06 12:03:26 -04:00
Jeff Mitchell
c28ed23972
Allow most parts of Vault's logging to have its level changed on-the-fly ( #5280 )
...
* Allow most parts of Vault's logging to have its level changed on-the-fly
* Use a const for not set
2018-09-05 15:52:54 -04:00
Jeff Mitchell
c9e2cd93e8
Move logic around a bit to avoid holding locks when not necessary ( #5277 )
...
Also, ensure we are error checking the rand call
2018-09-05 11:49:32 -04:00
Chris Hoffman
e2ed8d3d61
Fixing capabilities check for templated policies ( #5250 )
...
* fixing capabilities check for templated policies
* remove unnecessary change
* formatting
2018-09-04 14:18:59 -04:00
Brian Shumate
45f1ca162f
Log 'marked as sealed' at INFO instead ( #5260 )
2018-09-04 10:53:40 -07:00
Becca Petrin
7a8c116fb1
undo make fmt ( #5265 )
2018-09-04 09:29:18 -07:00
Becca Petrin
ed7639b0ec
run make fmt ( #5261 )
2018-09-04 09:12:59 -07:00
Jeff Mitchell
a67869de22
Fix typo
2018-09-01 12:15:02 -04:00
Calvin Leung Huang
9988ace85e
gofmt files ( #5233 )
2018-08-31 09:15:40 -07:00
Chris Hoffman
716fb03ab7
perform policy templating on each path ( #5229 )
2018-08-30 18:45:11 -04:00
Jeff Mitchell
d57dfc1875
Move things back
2018-08-29 19:13:10 -04:00
Jeff Mitchell
c6f7312f6c
Move physical types around
2018-08-29 19:05:33 -04:00
Brian Kassouf
346d87f1f8
Pass the ctx value to make the race detector happy ( #5201 )
2018-08-27 18:21:54 -07:00
Jeff Mitchell
4761209331
Fix build
2018-08-27 19:59:59 -04:00
Jeff Mitchell
b44b25d816
Allow fallback to non /-suffixed path for list acling ( #5197 )
...
This works around a very, very common error where people write policies
to affect listing but forget the slash at the end. If there is no exact
rule with a slash at the end when doing a list, we look to see if there
is a rule without it, and if so, use those capabilities.
Fixes #mass-user-confusion
2018-08-27 16:44:07 -07:00
Brian Kassouf
c0ba9e8ff7
Fix potential deadlock ( #5189 )
2018-08-27 10:01:33 -07:00
Brian Kassouf
c603a8b811
Add performance standby status to status output ( #5192 )
...
* Add performance standby status to status output
* Update ha.go
2018-08-27 10:01:07 -07:00
Jeff Mitchell
7a723b510e
Properly persist alias metadata ( #5188 )
...
In addition, don't lie about what's actually being stored
2018-08-26 10:26:34 -07:00
Brian Kassouf
b7e33f1d2e
Port some HA changes ( #5186 )
2018-08-25 14:41:55 -07:00
Jeff Mitchell
c4ebf3deda
Fix expiration test
2018-08-24 12:47:56 -04:00
Jeff Mitchell
f5024770dc
Allow comment key in policies
2018-08-24 09:42:47 -04:00
Jeff Mitchell
362a92945e
Don't resetnamed
2018-08-23 15:04:18 -04:00
Jeff Mitchell
ba0d029247
Restricts ACL templating to paths but allows failures ( #5167 )
...
When a templating failure happens, we now simply ignore that path,
rather than fail all access to all policies
2018-08-23 12:15:02 -04:00
Jeff Mitchell
50197d5bfd
Only write valid group alias memberships into leases ( #5164 )
2018-08-22 21:53:04 -04:00
Jeff Mitchell
4bf0b12bfa
Migrate external tests in vault folder
2018-08-22 20:50:52 -04:00
Brian Kassouf
2a89c60c7b
Update ha.go
2018-08-22 20:45:31 -04:00
Vishal Nayak
ee07e6ae59
Checks for assigning root policy ( #5152 )
...
* Fail if other policies present along with root
* disallow entity/group to contain root policy
2018-08-21 16:12:23 -04:00
Jeff Mitchell
3b01b29056
Pass in an ErrorLog to http.Server ( #5135 )
...
Fixes #5108
2018-08-21 11:23:18 -04:00
Jeff Mitchell
21cd0dd71a
Use strings.Contains for error possibly coming from storage
...
They may not well errwrap
Fixes #5046
2018-08-17 16:06:47 -04:00
Jeff Mitchell
71d92ef093
ACL Templating ( #4994 )
...
* Initial work on templating
* Add check for unbalanced closing in front
* Add missing templated assignment
* Add first cut of end-to-end test on templating.
* Make template errors be 403s and finish up testing
* Review feedback
2018-08-15 11:42:56 -07:00
Vishal Nayak
303b2f97ff
don't ignore errors ( #5087 )
2018-08-10 22:32:10 -04:00
Vishal Nayak
68d27c7c38
Adjust ACL error checking ( #5086 )
...
* Adjust acl error checking
* address review feedback
* unlock before checks
2018-08-10 21:05:10 -04:00
Jeff Mitchell
4798af88f9
Fix some cases where unauthorized calls could return 400 ( #5083 )
2018-08-10 08:59:58 -05:00
Jeff Mitchell
14dccd7744
Remove unused variable
2018-08-09 16:47:58 -04:00
Jeff Mitchell
2ed2e696a7
Merge Identity Entities if two claim the same alias ( #5075 )
...
* Merge Identity Entities if two claim the same alias
Past bugs/race conditions meant two entities could be created each
claiming the same alias. There are planned longer term fixes for this
(outside of the race condition being fixed in 0.10.4) that involve
changing the data model, but this is an immediate workaround that has
the same net effect: if two entities claim the same alias, assume they
were created due to this race condition and merge them.
In this situation, also automatically merge policies so we don't lose
e.g. RGPs.
2018-08-09 15:37:36 -05:00
Martin
aa8662c6c0
Add mount_path and mount_type to group lookups ( #5074 )
2018-08-09 13:07:24 -05:00
Jeff Mitchell
7d90e6eae9
Fix typo
2018-08-08 14:38:11 -04:00
Brian Kassouf
3330a3954a
Rollback: Only grab statelock if we are running async ( #5064 )
2018-08-07 17:48:43 -07:00
Jim Kalafut
4bdbc820ed
Add PluginEnv to SystemView ( #5028 )
2018-08-03 09:32:17 -07:00
Chris Hoffman
d8b1d19ed6
Plumbing request context through to expiration manager ( #5021 )
...
* plumbing request context to expiration manager
* moar context
* address feedback
* only using active context for revoke prefix
* using active context for revoke commands
* cancel tidy on active context
* address feedback
2018-08-01 21:39:39 -04:00
Brian Kassouf
bb076f161d
core: Cancel context before taking state lock ( #5020 )
...
* core: Cancel context before taking state lock
* Create active context outside of postUnseal
* Attempt to drain requests before canceling context
* fix test
2018-08-01 12:07:37 -07:00