Mitchell Hashimoto
ac8570c809
main: enable AWS backend
2015-03-20 19:32:18 +01:00
Mitchell Hashimoto
3456d9276c
logical/aws
2015-03-20 19:03:20 +01:00
Mitchell Hashimoto
2ce92edd0f
logical/framework: can specify InternalData for secret
2015-03-20 17:59:48 +01:00
Mitchell Hashimoto
92e200f150
logical/testing: rollback/revoke secrets, error dangling secrets
2015-03-20 17:20:55 +01:00
Mitchell Hashimoto
2c7343854f
http: passing tests
2015-03-19 23:28:49 +01:00
Mitchell Hashimoto
e6ab3a3771
vault: clean up VaultID duplications, make secret responses clearer
...
/cc @armon - This is a reasonably major refactor that I think cleans up
a lot of the logic with secrets in responses. The reason for the
refactor is that while implementing Renew/Revoke in logical/framework I
found the existing API to be really awkward to work with.
Primarily, we needed a way to send down internal data for Vault core to
store since not all the data you need to revoke a key is always sent
down to the user (for example the user than AWS key belongs to).
At first, I was doing this manually in logical/framework with
req.Storage, but this is going to be such a common event that I think
its something core should assist with. Additionally, I think the added
context for secrets will be useful in the future when we have a Vault
API for returning orphaned out keys: we can also return the internal
data that might help an operator.
So this leads me to this refactor. I've removed most of the fields in
`logical.Response` and replaced it with a single `*Secret` pointer. If
this is non-nil, then the response represents a secret. The Secret
struct encapsulates all the lease info and such.
It also has some fields on it that are only populated at _request_ time
for Revoke/Renew operations. There is precedent for this sort of
behavior in the Go stdlib where http.Request/http.Response have fields
that differ based on client/server. I copied this style.
All core unit tests pass. The APIs fail for obvious reasons but I'll fix
that up in the next commit.
2015-03-19 23:11:42 +01:00
Mitchell Hashimoto
163bfa62a6
logical/framework: support renew
2015-03-19 20:20:57 +01:00
Mitchell Hashimoto
b54dc20aff
logical/framework: revoke support
2015-03-19 19:41:41 +01:00
Armon Dadgar
9fcd6a8d04
vault: testing credential enable/disable
2015-03-19 10:39:47 -07:00
Armon Dadgar
8e29253c2b
vault: Change constant name
2015-03-19 09:56:39 -07:00
Armon Dadgar
0c7a4982b5
vault: Switch AuthTable to using MountTable
2015-03-19 09:54:57 -07:00
Mitchell Hashimoto
6c1ecc8a15
logical/framework: can specify renew/revoke functins for secret
2015-03-19 15:07:45 +01:00
Mitchell Hashimoto
813873b115
vault: convert to new callback style
2015-03-19 15:05:22 +01:00
Mitchell Hashimoto
b5757ae49a
logical/framework: add methods to look up secret and gen response
2015-03-19 14:59:01 +01:00
Mitchell Hashimoto
ef56daa3bc
logical/framework: use custom request wrapper
2015-03-19 14:39:25 +01:00
Armon Dadgar
6b621caea0
vault: first pass at enable/disable auth backends
2015-03-18 19:36:17 -07:00
Armon Dadgar
1478fa8359
vault: token store is a credential implementation
2015-03-18 19:11:52 -07:00
Armon Dadgar
cae7c3adf1
vault: Removing mtype from router
2015-03-18 15:48:14 -07:00
Armon Dadgar
ca919e6a15
vault: first pass at initializing credential backends
2015-03-18 15:46:07 -07:00
Armon Dadgar
22897d7840
vault: Adding hooks for auth loading
2015-03-18 15:30:31 -07:00
Armon Dadgar
c7f0d38e1a
vault: Allow passing in credential backends
2015-03-18 15:21:41 -07:00
Armon Dadgar
a324bb6f46
credential: Base interface
2015-03-18 15:21:25 -07:00
Armon Dadgar
7198dd6271
vault: more protection of protected mount points
2015-03-18 15:16:52 -07:00
Armon Dadgar
ddbc1c5258
vault: integrate policy and token store into core
2015-03-18 14:00:42 -07:00
Armon Dadgar
9a0fbe9d0b
vault: testing token revocation
2015-03-18 13:50:36 -07:00
Armon Dadgar
ea578306d5
vault: Guard against blank tokens
2015-03-18 13:21:16 -07:00
Armon Dadgar
ae8de95e0f
vault: First pass token store
2015-03-18 13:19:19 -07:00
Armon Dadgar
73c498160c
vault: Adding PolicyStore
2015-03-18 12:17:03 -07:00
Armon Dadgar
9780e5c6e4
vault: Refactor to use CollectKeys
2015-03-18 12:06:18 -07:00
Mitchell Hashimoto
801260bf0f
vault: TODOs
2015-03-17 20:54:38 -05:00
Mitchell Hashimoto
e377869766
vault: comment mounts mapping in rollback manager
2015-03-17 20:53:28 -05:00
Mitchell Hashimoto
5c1a8f297f
vault: put uint32 at top of struct to avoid alignment issues
2015-03-17 20:46:10 -05:00
Mitchell Hashimoto
f4cc32e126
logical/framework: test for minimum age
2015-03-17 20:42:35 -05:00
Mitchell Hashimoto
56fb620b2d
logical/framework: only rollback old enough WAL entries
2015-03-17 20:39:46 -05:00
Mitchell Hashimoto
93f828ec0d
logical/framework: WAL entry supports "kind"
2015-03-17 20:39:46 -05:00
Mitchell Hashimoto
e77f79b317
logical/framework: rollback support
2015-03-17 20:39:46 -05:00
Mitchell Hashimoto
79af0e5d9e
logical/framework: WAL should live here
2015-03-17 20:39:45 -05:00
Mitchell Hashimoto
2a4a58732d
logical: WAL methods
2015-03-17 20:39:45 -05:00
Mitchell Hashimoto
99c9f1a5d7
vault: ignore backends that don't support rollback
2015-03-17 20:39:45 -05:00
Mitchell Hashimoto
4ba99024ae
vault: start/stop rollback manager post/pre seal
2015-03-17 20:39:45 -05:00
Mitchell Hashimoto
4f4794ea64
vault: RollbackManager
...
There are some major TODO items here, and it isn't hooked into the core
yet, but the basic functionality is there.
2015-03-17 20:39:45 -05:00
Mitchell Hashimoto
a65f6544e0
vault: use RWMutex on MountTable itself
2015-03-17 20:39:45 -05:00
Armon Dadgar
53f75a839b
vault: Adding ACL representation
2015-03-17 18:31:20 -07:00
Armon Dadgar
8cd56d4058
vault: Adding policy parsing
2015-03-17 15:53:29 -07:00
Jack Pearkes
8c9349602a
Merge pull request #4 from hashicorp/website-demo-updates
...
Website: Demo improvements
2015-03-17 13:09:24 -07:00
Jack Pearkes
26d1b36991
website: defocus input (hide cursor) during submission
2015-03-17 12:55:24 -07:00
Jack Pearkes
40be97bec6
website: add isLoading
2015-03-17 12:47:55 -07:00
Jack Pearkes
14c89c8f8b
website: slow down demo animation
2015-03-17 12:47:34 -07:00
Jack Pearkes
05daec0905
website: refactor send command for demo
2015-03-17 12:47:16 -07:00
Jack Pearkes
492ea9cec1
website: wire close button for demos, fade white overlay
2015-03-17 12:22:18 -07:00