mirror of
				https://github.com/optim-enterprises-bv/vault.git
				synced 2025-10-31 18:48:08 +00:00 
			
		
		
		
	Use hmac-sha256 for protecting secrets in audit entries
This commit is contained in:
		| @@ -140,10 +140,14 @@ func TestHash(t *testing.T) { | |||||||
| 		}, | 		}, | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	localSalt, err := salt.NewSalt(nil, &salt.Config{ | 	inmemStorage := &logical.InmemStorage{} | ||||||
| 		HMAC:       sha256.New, | 	inmemStorage.Put(&logical.StorageEntry{ | ||||||
| 		HMACType:   "hmac-sha256", | 		Key:   "salt", | ||||||
| 		StaticSalt: "foo", | 		Value: []byte("foo"), | ||||||
|  | 	}) | ||||||
|  | 	localSalt, err := salt.NewSalt(inmemStorage, &salt.Config{ | ||||||
|  | 		HMAC:     sha256.New, | ||||||
|  | 		HMACType: "hmac-sha256", | ||||||
| 	}) | 	}) | ||||||
| 	if err != nil { | 	if err != nil { | ||||||
| 		t.Fatalf("Error instantiating salt: %s", err) | 		t.Fatalf("Error instantiating salt: %s", err) | ||||||
|   | |||||||
| @@ -207,7 +207,6 @@ func (c *Core) newAuditBackend(t string, view logical.Storage, conf map[string]s | |||||||
| 		return nil, fmt.Errorf("unknown backend type: %s", t) | 		return nil, fmt.Errorf("unknown backend type: %s", t) | ||||||
| 	} | 	} | ||||||
| 	salter, err := salt.NewSalt(view, &salt.Config{ | 	salter, err := salt.NewSalt(view, &salt.Config{ | ||||||
| 		HashFunc: salt.SHA256Hash, |  | ||||||
| 		HMAC:     sha256.New, | 		HMAC:     sha256.New, | ||||||
| 		HMACType: "hmac-sha256", | 		HMACType: "hmac-sha256", | ||||||
| 	}) | 	}) | ||||||
|   | |||||||
		Reference in New Issue
	
	Block a user
	 Jeff Mitchell
					Jeff Mitchell