open-vault/logical
Jeff Mitchell caa5661031
Pass identity metadata through to plugins (#4967)
It's not obvious why this should be secret, and if it were considered
secret, when and what anything would ever be allowed to access it.
Likely the right way to tie secret values to particular
entities/aliases/groups would be to use the upcoming templated ACL
feature.
2018-07-23 12:45:06 -04:00
..
framework Disallow negative TypeDurationSecond (#4910) 2018-07-17 17:46:03 -07:00
plugin Pass identity metadata through to plugins (#4967) 2018-07-23 12:45:06 -04:00
testing Early skip mssql test if not on acceptance, defer Teardown() early in testing.Test (#4457) 2018-04-26 12:17:44 -04:00
auth.go Changes the way policies are reported in audit logs (#4747) 2018-06-14 09:49:33 -04:00
connection.go
error.go Make single-lease revocation behave like expiration (#4883) 2018-07-11 15:45:35 -04:00
identity.pb.go Pass identity metadata through to plugins (#4967) 2018-07-23 12:45:06 -04:00
identity.proto Pass identity metadata through to plugins (#4967) 2018-07-23 12:45:06 -04:00
lease.go Core handling of TTLs (#4230) 2018-04-03 12:20:20 -04:00
lease_test.go
logical.go
request.go Make single-lease revocation behave like expiration (#4883) 2018-07-11 15:45:35 -04:00
response.go Fix tests 2018-07-12 10:18:50 -04:00
response_util.go Handle multierr when altering response codes (#4881) 2018-07-09 13:08:44 -07:00
secret.go
storage.go Clean up error string formatting (#4304) 2018-04-09 14:35:21 -04:00
storage_inmem.go
storage_inmem_test.go
system_view.go Add entity information request to system view (#4681) 2018-06-03 20:48:12 -04:00
testing.go Offline token revocation fix 2018-06-05 18:53:27 -04:00
token.go Move TokenEntry into logical. (#4729) 2018-06-08 17:24:27 -04:00
translate_response.go Changes the way policies are reported in audit logs (#4747) 2018-06-14 09:49:33 -04:00