open-vault/builtin/logical
Jeff Mitchell 12c00b97ef Allow backends to see taint status.
This can be seen via System(). In the PKI backend, if the CA is
reconfigured but not fully (e.g. an intermediate CSR is generated but no
corresponding cert set) and there are already leases (issued certs), the
CRL is unable to be built. As a result revocation fails. But in this
case we don't actually need revocation to be successful since the CRL is
useless after unmounting. By checking taint status we know if we can
simply fast-path out of revocation with a success in this case.

Fixes #946
2016-01-22 17:01:22 -05:00
..
aws STS now uses root vault user for keys 2016-01-21 15:04:16 -05:00
cassandra Update deps, and adjust usage of go-uuid to match new return values 2016-01-13 13:40:08 -05:00
consul WriteOperation -> UpdateOperation 2016-01-08 13:03:03 -05:00
mysql Update deps, and adjust usage of go-uuid to match new return values 2016-01-13 13:40:08 -05:00
pki Allow backends to see taint status. 2016-01-22 17:01:22 -05:00
postgresql Update deps, and adjust usage of go-uuid to match new return values 2016-01-13 13:40:08 -05:00
ssh Update deps, and adjust usage of go-uuid to match new return values 2016-01-13 13:40:08 -05:00
transit WriteOperation -> UpdateOperation 2016-01-08 13:03:03 -05:00