open-vault/sdk
Josh Black e83471d7de
Login MFA (#14025)
* Login MFA

* ENT OSS segragation (#14088)

* Delete method id if not used in an MFA enforcement config (#14063)

* Delete an MFA methodID only if it is not used by an MFA enforcement config

* Fixing a bug: mfa/validate is an unauthenticated path, and goes through the handleLoginRequest path

* adding use_passcode field to DUO config (#14059)

* add changelog

* preventing replay attack on MFA passcodes (#14056)

* preventing replay attack on MFA passcodes

* using %w instead of %s for error

* Improve CLI command for login mfa (#14106)

CLI prints a warning message indicating the login request needs to get validated

* adding the validity period of a passcode to error messages (#14115)

* PR feedback

* duo to handle preventing passcode reuse

Co-authored-by: hghaf099 <83242695+hghaf099@users.noreply.github.com>
Co-authored-by: hamid ghaf <hamid@hashicorp.com>
2022-02-17 13:08:51 -08:00
..
database Login MFA (#14025) 2022-02-17 13:08:51 -08:00
framework adding docs for the framework Required field (#13884) 2022-02-03 11:44:01 -05:00
helper Login MFA (#14025) 2022-02-17 13:08:51 -08:00
logical Login MFA (#14025) 2022-02-17 13:08:51 -08:00
physical Return an error when trying to store a too-large key with Raft (#13282) 2021-11-25 14:07:03 -05:00
plugin Login MFA (#14025) 2022-02-17 13:08:51 -08:00
queue sdk/queue: move lock before checking queue length (#13146) 2021-11-29 14:54:00 -05:00
version Convert to Go 1.17 go:build directive (#13579) 2022-01-05 12:02:03 -06:00
README.md Create sdk/ and api/ submodules (#6583) 2019-04-12 17:54:35 -04:00
go.mod Add helper for encoding/decoding root tokens and OTP generation in SDK module (#10504) (#10505) 2021-12-01 08:05:49 -05:00
go.sum Add helper for encoding/decoding root tokens and OTP generation in SDK module (#10504) (#10505) 2021-12-01 08:05:49 -05:00

README.md

Vault SDK libs

This package provides the sdk package which contains code useful for developing Vault plugins.

Although we try not to break functionality, we reserve the right to reorganize the code at will and may occasionally cause breaks if they are warranted. As such we expect the tag of this module will stay less than v1.0.0.

For any major changes we will try to give advance notice in the CHANGES section of Vault's CHANGELOG.md.