open-vault/builtin/logical/consul
John-Michael Faircloth 678556f3df
plugin/secrets/auth: enable multiplexing (#19215)
* plugin/auth: enable multiplexing

- the plugin will be multiplexed when run as an external plugin
  by vault versions that support secrets/auth plugin multiplexing (> 1.12)
- we continue to set the TLSProviderFunc to maintain backwards
  compatibility with vault versions that don't support AutoMTLS (< 1.12)

* enable multiplexing for secrets engines

* add changelog

* revert call to ServeMultiplex for pki and transit

* Revert "revert call to ServeMultiplex for pki and transit"

This reverts commit 755be28d14b4c4c4d884d3cf4d2ec003dda579b9.
2023-02-16 22:25:15 +00:00
..
cmd/consul plugin/secrets/auth: enable multiplexing (#19215) 2023-02-16 22:25:15 +00:00
backend.go Check if plugin version matches running version (#17182) 2022-09-21 12:25:04 -07:00
backend_test.go Update Consul bootstrap test case to conditionally add token to config (#16560) 2022-08-03 13:43:43 -05:00
client.go secrets/consul: Add support to auto-bootstrap Consul ACL system (#10751) 2022-04-20 17:16:15 -05:00
path_config.go secrets/consul: Add support to auto-bootstrap Consul ACL system (#10751) 2022-04-20 17:16:15 -05:00
path_roles.go secrets/consul: Deprecate token_type and policy fields (#15550) 2022-05-20 15:48:02 -05:00
path_token.go secrets/consul: Add support for generating tokens with service and node identities (#15295) 2022-05-09 20:07:35 -05:00
path_token_test.go secrets/consul: Use consistent parameter names (#15400) 2022-05-19 14:43:54 -05:00
secret_token.go builtin: deprecate errwrap.Wrapf() throughout (#11430) 2021-04-22 11:20:59 -04:00