mirror of
				https://github.com/optim-enterprises-bv/vault.git
				synced 2025-10-31 18:48:08 +00:00 
			
		
		
		
	Sync over some stuff
This commit is contained in:
		| @@ -11,6 +11,7 @@ func (c *Sys) Health() (*HealthResponse, error) { | |||||||
| 	r.Params.Add("sealedcode", "299") | 	r.Params.Add("sealedcode", "299") | ||||||
| 	r.Params.Add("standbycode", "299") | 	r.Params.Add("standbycode", "299") | ||||||
| 	r.Params.Add("drsecondarycode", "299") | 	r.Params.Add("drsecondarycode", "299") | ||||||
|  | 	r.Params.Add("performancestandbycode", "299") | ||||||
|  |  | ||||||
| 	ctx, cancelFunc := context.WithCancel(context.Background()) | 	ctx, cancelFunc := context.WithCancel(context.Background()) | ||||||
| 	defer cancelFunc() | 	defer cancelFunc() | ||||||
|   | |||||||
| @@ -25,7 +25,7 @@ func (c *NamespaceCreateCommand) Help() string { | |||||||
| Usage: vault namespace create [options] PATH | Usage: vault namespace create [options] PATH | ||||||
|  |  | ||||||
|   Create a child namespace. The namespace created will be relative to the |   Create a child namespace. The namespace created will be relative to the | ||||||
|   namespace provided in either VAULT_NAMESPACE environemnt variable or |   namespace provided in either the VAULT_NAMESPACE environment variable or | ||||||
|   -namespace CLI flag. |   -namespace CLI flag. | ||||||
|  |  | ||||||
|   Create a child namespace (e.g. ns1/): |   Create a child namespace (e.g. ns1/): | ||||||
|   | |||||||
| @@ -25,7 +25,7 @@ func (c *NamespaceDeleteCommand) Help() string { | |||||||
| Usage: vault namespace delete [options] PATH | Usage: vault namespace delete [options] PATH | ||||||
|  |  | ||||||
|   Delete an existing namespace. The namespace deleted will be relative to the |   Delete an existing namespace. The namespace deleted will be relative to the | ||||||
|   namespace provided in either VAULT_NAMESPACE environemnt variable or |   namespace provided in either the VAULT_NAMESPACE environment variable or | ||||||
|   -namespace CLI flag. |   -namespace CLI flag. | ||||||
|  |  | ||||||
|   Delete a namespace (e.g. ns1/): |   Delete a namespace (e.g. ns1/): | ||||||
|   | |||||||
| @@ -24,7 +24,7 @@ func (c *NamespaceLookupCommand) Help() string { | |||||||
| Usage: vault namespace create [options] PATH | Usage: vault namespace create [options] PATH | ||||||
|  |  | ||||||
|   Create a child namespace. The namespace created will be relative to the |   Create a child namespace. The namespace created will be relative to the | ||||||
|   namespace provided in either VAULT_NAMESPACE environemnt variable or |   namespace provided in either the VAULT_NAMESPACE environment variable or | ||||||
|   -namespace CLI flag. |   -namespace CLI flag. | ||||||
|  |  | ||||||
|   Get information about the namespace of the locally authenticated token: |   Get information about the namespace of the locally authenticated token: | ||||||
|   | |||||||
| @@ -62,6 +62,9 @@ type Config struct { | |||||||
| 	DisableClustering    bool        `hcl:"-"` | 	DisableClustering    bool        `hcl:"-"` | ||||||
| 	DisableClusteringRaw interface{} `hcl:"disable_clustering"` | 	DisableClusteringRaw interface{} `hcl:"disable_clustering"` | ||||||
|  |  | ||||||
|  | 	DisablePerformanceStandby    bool        `hcl:"-"` | ||||||
|  | 	DisablePerformanceStandbyRaw interface{} `hcl:"disable_performance_standby"` | ||||||
|  |  | ||||||
| 	DisableSealWrap    bool        `hcl:"-"` | 	DisableSealWrap    bool        `hcl:"-"` | ||||||
| 	DisableSealWrapRaw interface{} `hcl:"disable_sealwrap"` | 	DisableSealWrapRaw interface{} `hcl:"disable_sealwrap"` | ||||||
| } | } | ||||||
| @@ -326,6 +329,11 @@ func (c *Config) Merge(c2 *Config) *Config { | |||||||
| 		result.PidFile = c2.PidFile | 		result.PidFile = c2.PidFile | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
|  | 	result.DisablePerformanceStandby = c.DisablePerformanceStandby | ||||||
|  | 	if c2.DisablePerformanceStandby { | ||||||
|  | 		result.DisablePerformanceStandby = c2.DisablePerformanceStandby | ||||||
|  | 	} | ||||||
|  |  | ||||||
| 	result.DisableSealWrap = c.DisableSealWrap | 	result.DisableSealWrap = c.DisableSealWrap | ||||||
| 	if c2.DisableSealWrap { | 	if c2.DisableSealWrap { | ||||||
| 		result.DisableSealWrap = c2.DisableSealWrap | 		result.DisableSealWrap = c2.DisableSealWrap | ||||||
| @@ -424,6 +432,12 @@ func ParseConfig(d string, logger log.Logger) (*Config, error) { | |||||||
| 		} | 		} | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
|  | 	if result.DisablePerformanceStandbyRaw != nil { | ||||||
|  | 		if result.DisablePerformanceStandby, err = parseutil.ParseBool(result.DisablePerformanceStandbyRaw); err != nil { | ||||||
|  | 			return nil, err | ||||||
|  | 		} | ||||||
|  | 	} | ||||||
|  |  | ||||||
| 	if result.DisableSealWrapRaw != nil { | 	if result.DisableSealWrapRaw != nil { | ||||||
| 		if result.DisableSealWrap, err = parseutil.ParseBool(result.DisableSealWrapRaw); err != nil { | 		if result.DisableSealWrap, err = parseutil.ParseBool(result.DisableSealWrapRaw); err != nil { | ||||||
| 			return nil, err | 			return nil, err | ||||||
|   | |||||||
| @@ -67,6 +67,9 @@ func TestLoadConfigFile(t *testing.T) { | |||||||
| 		EnableRawEndpoint:    true, | 		EnableRawEndpoint:    true, | ||||||
| 		EnableRawEndpointRaw: true, | 		EnableRawEndpointRaw: true, | ||||||
|  |  | ||||||
|  | 		DisableSealWrap:    true, | ||||||
|  | 		DisableSealWrapRaw: true, | ||||||
|  |  | ||||||
| 		MaxLeaseTTL:        10 * time.Hour, | 		MaxLeaseTTL:        10 * time.Hour, | ||||||
| 		MaxLeaseTTLRaw:     "10h", | 		MaxLeaseTTLRaw:     "10h", | ||||||
| 		DefaultLeaseTTL:    10 * time.Hour, | 		DefaultLeaseTTL:    10 * time.Hour, | ||||||
| @@ -135,6 +138,9 @@ func TestLoadConfigFile_topLevel(t *testing.T) { | |||||||
| 		EnableRawEndpoint:    true, | 		EnableRawEndpoint:    true, | ||||||
| 		EnableRawEndpointRaw: true, | 		EnableRawEndpointRaw: true, | ||||||
|  |  | ||||||
|  | 		DisableSealWrap:    true, | ||||||
|  | 		DisableSealWrapRaw: true, | ||||||
|  |  | ||||||
| 		MaxLeaseTTL:        10 * time.Hour, | 		MaxLeaseTTL:        10 * time.Hour, | ||||||
| 		MaxLeaseTTLRaw:     "10h", | 		MaxLeaseTTLRaw:     "10h", | ||||||
| 		DefaultLeaseTTL:    10 * time.Hour, | 		DefaultLeaseTTL:    10 * time.Hour, | ||||||
| @@ -210,6 +216,8 @@ func TestLoadConfigFile_json(t *testing.T) { | |||||||
| 		PidFile:              "./pidfile", | 		PidFile:              "./pidfile", | ||||||
| 		EnableRawEndpoint:    true, | 		EnableRawEndpoint:    true, | ||||||
| 		EnableRawEndpointRaw: true, | 		EnableRawEndpointRaw: true, | ||||||
|  | 		DisableSealWrap:      true, | ||||||
|  | 		DisableSealWrapRaw:   true, | ||||||
| 	} | 	} | ||||||
| 	if !reflect.DeepEqual(config, expected) { | 	if !reflect.DeepEqual(config, expected) { | ||||||
| 		t.Fatalf("expected \n\n%#v\n\n to be \n\n%#v\n\n", config, expected) | 		t.Fatalf("expected \n\n%#v\n\n to be \n\n%#v\n\n", config, expected) | ||||||
| @@ -261,6 +269,8 @@ func TestLoadConfigFile_json2(t *testing.T) { | |||||||
|  |  | ||||||
| 		EnableRawEndpoint: true, | 		EnableRawEndpoint: true, | ||||||
|  |  | ||||||
|  | 		DisableSealWrap: true, | ||||||
|  |  | ||||||
| 		Telemetry: &Telemetry{ | 		Telemetry: &Telemetry{ | ||||||
| 			StatsiteAddr:                       "foo", | 			StatsiteAddr:                       "foo", | ||||||
| 			StatsdAddr:                         "bar", | 			StatsdAddr:                         "bar", | ||||||
|   | |||||||
| @@ -30,4 +30,5 @@ default_lease_ttl = "10h" | |||||||
| cluster_name = "testcluster" | cluster_name = "testcluster" | ||||||
| pid_file = "./pidfile" | pid_file = "./pidfile" | ||||||
| raw_storage_endpoint = true | raw_storage_endpoint = true | ||||||
|  | disable_sealwrap = true | ||||||
| disable_printable_check = true | disable_printable_check = true | ||||||
|   | |||||||
| @@ -19,5 +19,6 @@ | |||||||
| 	"cluster_name":"testcluster", | 	"cluster_name":"testcluster", | ||||||
| 	"ui":true, | 	"ui":true, | ||||||
| 	"pid_file":"./pidfile", | 	"pid_file":"./pidfile", | ||||||
| 	"raw_storage_endpoint":true | 	"raw_storage_endpoint":true, | ||||||
|  | 	"disable_sealwrap":true | ||||||
| } | } | ||||||
|   | |||||||
| @@ -33,3 +33,4 @@ default_lease_ttl = "10h" | |||||||
| cluster_name = "testcluster" | cluster_name = "testcluster" | ||||||
| pid_file = "./pidfile" | pid_file = "./pidfile" | ||||||
| raw_storage_endpoint = true | raw_storage_endpoint = true | ||||||
|  | disable_sealwrap = true | ||||||
|   | |||||||
| @@ -1,6 +1,7 @@ | |||||||
| { | { | ||||||
|   "ui":true, |   "ui":true, | ||||||
|   "raw_storage_endpoint":true, |   "raw_storage_endpoint":true, | ||||||
|  |   "disable_sealwrap":true, | ||||||
|   "listener":[ |   "listener":[ | ||||||
|     { |     { | ||||||
|       "tcp":{ |       "tcp":{ | ||||||
|   | |||||||
| @@ -1,4 +1,8 @@ | |||||||
| // +build !race | // +build !race,!hsm | ||||||
|  |  | ||||||
|  | // NOTE: we can't use this with HSM. We can't set testing mode on and it's not | ||||||
|  | // safe to use env vars since that provides an attack vector in the real world. | ||||||
|  | // | ||||||
| // The server tests have a go-metrics/exp manager race condition :(. | // The server tests have a go-metrics/exp manager race condition :(. | ||||||
|  |  | ||||||
| package command | package command | ||||||
|   | |||||||
| @@ -1,7 +1,11 @@ | |||||||
| package consts | package consts | ||||||
|  |  | ||||||
|  | import "time" | ||||||
|  |  | ||||||
| type ReplicationState uint32 | type ReplicationState uint32 | ||||||
|  |  | ||||||
|  | var ReplicationStaleReadTimeout = 2 * time.Second | ||||||
|  |  | ||||||
| const ( | const ( | ||||||
| 	_ ReplicationState = iota | 	_ ReplicationState = iota | ||||||
| 	OldReplicationPrimary | 	OldReplicationPrimary | ||||||
| @@ -21,6 +25,7 @@ const ( | |||||||
| 	ReplicationDRBootstrapping | 	ReplicationDRBootstrapping | ||||||
| 	ReplicationPerformanceDisabled | 	ReplicationPerformanceDisabled | ||||||
| 	ReplicationDRDisabled | 	ReplicationDRDisabled | ||||||
|  | 	ReplicationPerformanceStandby | ||||||
| ) | ) | ||||||
|  |  | ||||||
| func (r ReplicationState) string() string { | func (r ReplicationState) string() string { | ||||||
|   | |||||||
		Reference in New Issue
	
	Block a user
	 Jeff Mitchell
					Jeff Mitchell