open-vault/builtin/logical/aws
Dmitriy Gromov 70ef2e3398 STS now uses root vault user for keys
The secretAccessKeysRevoke revoke function now asserts that it is
not dealing with STS keys by checking a new internal data flag. Defaults
to IAM when the flag is not found.

Factored out genUsername into its own function to share between STS and
IAM secret creation functions.

Fixed bad call to "WriteOperation" instead of "UpdateOperation" in
aws/backend_test
2016-01-21 15:04:16 -05:00
..
backend.go Add STS path to AWS backend. 2016-01-21 14:05:09 -05:00
backend_test.go STS now uses root vault user for keys 2016-01-21 15:04:16 -05:00
client.go Add STS path to AWS backend. 2016-01-21 14:05:09 -05:00
path_config_lease.go WriteOperation -> UpdateOperation 2016-01-08 13:03:03 -05:00
path_config_root.go WriteOperation -> UpdateOperation 2016-01-08 13:03:03 -05:00
path_roles.go Merge pull request #895 from nickithewatt/aws-prexisting-policies 2016-01-21 13:23:37 -05:00
path_sts.go Renamed sts duration to ttl and added STS permissions note. 2016-01-21 14:28:34 -05:00
path_user.go Allow use of pre-existing policies for AWS users 2015-12-30 18:05:54 +00:00
rollback.go Fixed duration type and added acceptance test for sts 2016-01-21 14:05:10 -05:00
secret_access_keys.go STS now uses root vault user for keys 2016-01-21 15:04:16 -05:00
secret_access_keys_test.go Allow use of pre-existing policies for AWS users 2015-12-30 18:05:54 +00:00