open-vault/logical
Jeff Mitchell 2d8e3b35f2 Revoke permissions before dropping user in postgresql.
Currently permissions are not revoked, which can lead revocation to not
actually work properly. This attempts to revoke all permissions and only
then drop the role.

Fixes issue #699
2015-10-30 11:58:52 -04:00
..
framework Add '.' to GenericNameRegex; it cannot appear as the first or last 2015-10-13 16:04:10 -04:00
testing Sort policies when checking for equality 2015-10-06 15:48:25 -04:00
auth.go vault: Adding InternalData to Auth 2015-05-09 11:39:54 -07:00
connection.go logical: add credential info to logical backend structures 2015-03-30 14:23:32 -07:00
error.go This adds a new error class which can be used by logical backends to 2015-08-10 13:27:25 -04:00
lease.go Rejig Lease terminology internally; also, put a few JSON names back to their original values 2015-08-20 22:27:01 -07:00
lease_test.go Internally refactor Lease/LeaseGracePeriod into TTL/GracePeriod 2015-08-20 18:00:51 -07:00
logical.go Rename View to StorageView to make it more distinct from SystemView 2015-09-15 13:50:37 -04:00
request.go Fix a couple of typos 2015-08-09 15:20:06 -04:00
response.go Add unit tests 2015-10-07 20:17:06 -04:00
secret.go Internally refactor Lease/LeaseGracePeriod into TTL/GracePeriod 2015-08-20 18:00:51 -07:00
storage.go logical/aws 2015-03-20 19:03:20 +01:00
storage_inmem.go vault: Passthrough backend uses logical.Backend 2015-03-15 14:27:06 -07:00
storage_inmem_test.go vault: Passthrough backend uses logical.Backend 2015-03-15 14:27:06 -07:00
system_view.go Take ClientToken instead of Policies 2015-09-21 10:04:03 -04:00
testing.go Revoke permissions before dropping user in postgresql. 2015-10-30 11:58:52 -04:00
uuid.go logical: WAL methods 2015-03-17 20:39:45 -05:00