open-vault/logical
Jeff Mitchell 12c00b97ef Allow backends to see taint status.
This can be seen via System(). In the PKI backend, if the CA is
reconfigured but not fully (e.g. an intermediate CSR is generated but no
corresponding cert set) and there are already leases (issued certs), the
CRL is unable to be built. As a result revocation fails. But in this
case we don't actually need revocation to be successful since the CRL is
useless after unmounting. By checking taint status we know if we can
simply fast-path out of revocation with a success in this case.

Fixes #946
2016-01-22 17:01:22 -05:00
..
framework Address some more review feedback 2016-01-12 15:09:16 -05:00
testing WriteOperation -> UpdateOperation 2016-01-08 13:03:03 -05:00
auth.go vault: Adding InternalData to Auth 2015-05-09 11:39:54 -07:00
connection.go logical: add credential info to logical backend structures 2015-03-30 14:23:32 -07:00
error.go This adds a new error class which can be used by logical backends to 2015-08-10 13:27:25 -04:00
lease.go Rejig Lease terminology internally; also, put a few JSON names back to their original values 2015-08-20 22:27:01 -07:00
lease_test.go Internally refactor Lease/LeaseGracePeriod into TTL/GracePeriod 2015-08-20 18:00:51 -07:00
logical.go Address some more review feedback 2016-01-12 15:09:16 -05:00
request.go Use logical operations instead of strings for comparison 2016-01-12 21:16:31 -05:00
response.go Address some listing review feedback 2016-01-22 10:07:32 -05:00
secret.go Internally refactor Lease/LeaseGracePeriod into TTL/GracePeriod 2015-08-20 18:00:51 -07:00
storage.go
storage_inmem.go
storage_inmem_test.go
system_view.go Allow backends to see taint status. 2016-01-22 17:01:22 -05:00
testing.go Revoke permissions before dropping user in postgresql. 2015-10-30 11:58:52 -04:00
uuid.go