Brian Kassouf
8142b42d95
Add context to storage backends and wire it through a lot of places ( #3817 )
2018-01-19 01:44:44 -05:00
Brian Kassouf
78adac0a24
Pass context to backends ( #3750 )
...
* Start work on passing context to backends
* More work on passing context
* Unindent logical system
* Unindent token store
* Unindent passthrough
* Unindent cubbyhole
* Fix tests
* use requestContext in rollback and expiration managers
2018-01-08 10:31:38 -08:00
vishalnayak
e6daa3782a
Return the revocation_sql from role read all the time
2016-10-27 12:24:31 -04:00
vishalnayak
8293b19a98
Added revocation_sql to the website docs
2016-10-27 12:15:08 -04:00
Jeff Mitchell
37df43d534
Postgres revocation sql, beta mode ( #1972 )
2016-10-05 13:52:59 -04:00
Jeff Mitchell
7d1f0facb8
Add arbitrary string slice parsing.
...
Like the KV function, this supports either separated strings or JSON
strings, base64-encoded or not.
Fixes #1619 in theory.
2016-08-03 14:24:16 -04:00
Jeff Mitchell
9cf06240e0
Add list support for postgres roles
2016-01-28 14:41:50 -05:00
Jeff Mitchell
45e32756ea
WriteOperation -> UpdateOperation
2016-01-08 13:03:03 -05:00
Jeff Mitchell
d3aebadc3c
Fix wording
2015-10-29 12:58:29 -04:00
vishalnayak
41678f18ae
Vault: Fix wild card paths for all backends
2015-08-21 00:56:13 -07:00
Armon Dadgar
212aa9fb5b
secret/postgresql: testing support for multiple statements
2015-04-27 12:00:07 -07:00
Armon Dadgar
db5f74f6b4
secret/postgresql: support multiple sql statements
2015-04-27 11:31:27 -07:00
Mitchell Hashimoto
65de2d6375
logical/postgresql: support deleting roles and reading them
2015-04-18 21:59:59 -07:00
Mitchell Hashimoto
90936ff77c
logical/postgers: update docs properly
2015-04-18 18:42:26 -07:00
Mitchell Hashimoto
979e42be35
logical/postgresql: creating roles
2015-04-18 18:09:33 -07:00