mirror of
https://github.com/optim-enterprises-bv/vault.git
synced 2025-10-29 09:42:25 +00:00
Correct drift between ENT and OSS (#15966)
This commit is contained in:
@@ -21,7 +21,6 @@ func TestPathConfigRotateRoot(t *testing.T) {
|
||||
SecretAccessKey: aws.String("buzz2"),
|
||||
},
|
||||
},
|
||||
DeleteAccessKeyOutput: &iam.DeleteAccessKeyOutput{},
|
||||
GetUserOutput: &iam.GetUserOutput{
|
||||
User: &iam.User{
|
||||
UserName: aws.String("ellen"),
|
||||
|
||||
@@ -14,7 +14,6 @@ import (
|
||||
"golang.org/x/term"
|
||||
|
||||
wrapping "github.com/hashicorp/go-kms-wrapping"
|
||||
"github.com/hashicorp/vault/helper/constants"
|
||||
|
||||
"github.com/docker/docker/pkg/ioutils"
|
||||
"github.com/hashicorp/consul/api"
|
||||
@@ -22,6 +21,7 @@ import (
|
||||
"github.com/hashicorp/go-secure-stdlib/reloadutil"
|
||||
uuid "github.com/hashicorp/go-uuid"
|
||||
cserver "github.com/hashicorp/vault/command/server"
|
||||
"github.com/hashicorp/vault/helper/constants"
|
||||
"github.com/hashicorp/vault/helper/metricsutil"
|
||||
"github.com/hashicorp/vault/internalshared/configutil"
|
||||
"github.com/hashicorp/vault/internalshared/listenerutil"
|
||||
|
||||
@@ -74,6 +74,7 @@ func (a *Alias) SentinelKeys() []string {
|
||||
return []string{
|
||||
"id",
|
||||
"mount_type",
|
||||
"mount_accessor",
|
||||
"mount_path",
|
||||
"meta",
|
||||
"metadata",
|
||||
|
||||
@@ -427,5 +427,5 @@ SET @stmt = 'IF EXISTS (SELECT name FROM [master].[sys].[server_principals] WHER
|
||||
EXEC (@stmt)`
|
||||
|
||||
const alterLoginSQL = `
|
||||
ALTER LOGIN [{{username}}] WITH PASSWORD = '{{password}}'
|
||||
ALTER LOGIN [{{username}}] WITH PASSWORD = '{{password}}'
|
||||
`
|
||||
|
||||
@@ -218,13 +218,12 @@ func (c *Core) setupCluster(ctx context.Context) error {
|
||||
|
||||
// Create a certificate
|
||||
if c.localClusterCert.Load().([]byte) == nil {
|
||||
c.logger.Debug("generating local cluster certificate")
|
||||
|
||||
host, err := uuid.GenerateUUID()
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
host = fmt.Sprintf("fw-%s", host)
|
||||
c.logger.Debug("generating local cluster certificate", "host", host)
|
||||
template := &x509.Certificate{
|
||||
Subject: pkix.Name{
|
||||
CommonName: host,
|
||||
|
||||
@@ -779,7 +779,8 @@ func (c *Core) periodicCheckKeyUpgrades(ctx context.Context, stopCh chan struct{
|
||||
// keys (e.g. from replication being activated) and we need to seal to
|
||||
// be unsealed again.
|
||||
entry, _ := c.barrier.Get(ctx, poisonPillPath)
|
||||
if entry != nil && len(entry.Value) > 0 {
|
||||
entryDR, _ := c.barrier.Get(ctx, poisonPillDRPath)
|
||||
if (entry != nil && len(entry.Value) > 0) || (entryDR != nil && len(entryDR.Value) > 0) {
|
||||
c.logger.Warn("encryption keys have changed out from underneath us (possibly due to replication enabling), must be unsealed again")
|
||||
// If we are using raft storage we do not want to shut down
|
||||
// raft during replication secondary enablement. This will
|
||||
|
||||
Reference in New Issue
Block a user