Chris Hoffman
f3fd22db39
fix unseal reset test ( #3528 )
2017-11-03 09:31:39 -04:00
Jeff Mitchell
6eb744e379
Fix some tests
2017-11-02 15:35:06 -04:00
Jeff Mitchell
cd6d67d84b
Final sync
2017-10-23 17:39:21 -04:00
Jeff Mitchell
d51b13fca6
Multi value test seal ( #2281 )
2017-01-17 15:43:10 -05:00
Jeff Mitchell
ac0f45e45c
Add nonce to unseal to allow seeing if the operation has reset ( #2276 )
2017-01-17 11:47:06 -05:00
Jeff Mitchell
d9f97198bd
Set number of pester retries to zero by default and make seal command… ( #2093 )
...
* Set number of pester retries to zero by default and make seal command return 403 if unauthorized instead of 500
* Fix build
* Use 403 instead and update test
* Change another 500 to 403
2016-11-16 14:08:09 -05:00
Jeff Mitchell
a82b44df3d
Error when an invalid (as opposed to incorrect) unseal key is given. ( #1782 )
...
Fixes #1777
2016-08-24 14:15:25 -04:00
vishalnayak
e5e02332c5
Removed duplicated check in tests
2016-07-29 14:18:53 -04:00
vishalnayak
8f1ccc6eff
Add cluster information to 'vault status'
2016-07-29 14:13:53 -04:00
vishalnayak
5c38276598
Added Vault version informationto the 'status' command
2016-07-28 17:37:35 -04:00
vishalnayak
55cf44bc91
Storing local and global cluster name/id to storage and returning them in health status
2016-07-26 02:32:42 -04:00
vishalnayak
ef97199360
Added JSON Decode and Encode helpers.
...
Changed all the occurances of Unmarshal to use the helpers.
Fixed http/ package tests.
2016-07-06 12:25:40 -04:00
Jeff Mitchell
6b0c692385
Provide 'sys/step-down' and 'vault step-down'
...
This endpoint causes the node it's hit to step down from active duty.
It's a noop if the node isn't active or not running in HA mode. The node
will wait one second before attempting to reacquire the lock, to give
other nodes a chance to grab it.
Fixes #1093
2016-02-26 19:43:55 -05:00
Jeff Mitchell
f3ef23318d
Create more granular ACL capabilities.
...
This commit splits ACL policies into more fine-grained capabilities.
This both drastically simplifies the checking code and makes it possible
to support needed workflows that are not possible with the previous
method. It is backwards compatible; policies containing a "policy"
string are simply converted to a set of capabilities matching previous
behavior.
Fixes #724 (and others).
2016-01-08 13:05:14 -05:00
Jeff Mitchell
d7f528a768
Add reset support to the unseal command.
...
Reset clears the provided unseal keys, allowing the process to be begun
again. Includes documentation and unit test changes.
Fixes #695
2015-10-28 15:59:39 -04:00
Jeff Mitchell
f1a301922d
Remove cookie authentication.
2015-08-21 19:46:23 -07:00
Mitchell Hashimoto
d666e79a3a
http: /sys/seal requires a token
2015-03-31 11:45:44 -07:00
Mitchell Hashimoto
d93bdacbbd
vault: require root token for seal
2015-03-31 09:59:02 -07:00
Mitchell Hashimoto
e657ac8b52
http: /sys/seal-status should return 400 if still uninitialized
2015-03-30 23:36:03 -07:00
Armon Dadgar
06e30b425e
Fixing compilation errors due to API change
2015-03-24 16:20:05 -07:00
Mitchell Hashimoto
2d92c2ee10
fix all tests
2015-03-15 17:10:33 -07:00
Mitchell Hashimoto
48c05995e5
http: make TestServer public
2015-03-13 12:53:09 -07:00
Mitchell Hashimoto
d2642529b7
vault: public testing methods
2015-03-13 12:53:09 -07:00
Mitchell Hashimoto
e3fbe54a04
http: mask user error away from unseal since its not actionable
2015-03-12 11:26:59 -07:00
Mitchell Hashimoto
d564131cef
http: test all seal endpoints
2015-03-12 11:12:44 -07:00
Mitchell Hashimoto
549631a896
http: prefix with v1
2015-03-12 10:47:31 -07:00
Mitchell Hashimoto
1115518349
http: tests
2015-03-12 10:46:45 -07:00