mirror of
https://github.com/optim-enterprises-bv/vault.git
synced 2025-10-30 18:17:55 +00:00
Sync over some stuff
This commit is contained in:
@@ -11,6 +11,7 @@ func (c *Sys) Health() (*HealthResponse, error) {
|
|||||||
r.Params.Add("sealedcode", "299")
|
r.Params.Add("sealedcode", "299")
|
||||||
r.Params.Add("standbycode", "299")
|
r.Params.Add("standbycode", "299")
|
||||||
r.Params.Add("drsecondarycode", "299")
|
r.Params.Add("drsecondarycode", "299")
|
||||||
|
r.Params.Add("performancestandbycode", "299")
|
||||||
|
|
||||||
ctx, cancelFunc := context.WithCancel(context.Background())
|
ctx, cancelFunc := context.WithCancel(context.Background())
|
||||||
defer cancelFunc()
|
defer cancelFunc()
|
||||||
|
|||||||
@@ -25,7 +25,7 @@ func (c *NamespaceCreateCommand) Help() string {
|
|||||||
Usage: vault namespace create [options] PATH
|
Usage: vault namespace create [options] PATH
|
||||||
|
|
||||||
Create a child namespace. The namespace created will be relative to the
|
Create a child namespace. The namespace created will be relative to the
|
||||||
namespace provided in either VAULT_NAMESPACE environemnt variable or
|
namespace provided in either the VAULT_NAMESPACE environment variable or
|
||||||
-namespace CLI flag.
|
-namespace CLI flag.
|
||||||
|
|
||||||
Create a child namespace (e.g. ns1/):
|
Create a child namespace (e.g. ns1/):
|
||||||
|
|||||||
@@ -25,7 +25,7 @@ func (c *NamespaceDeleteCommand) Help() string {
|
|||||||
Usage: vault namespace delete [options] PATH
|
Usage: vault namespace delete [options] PATH
|
||||||
|
|
||||||
Delete an existing namespace. The namespace deleted will be relative to the
|
Delete an existing namespace. The namespace deleted will be relative to the
|
||||||
namespace provided in either VAULT_NAMESPACE environemnt variable or
|
namespace provided in either the VAULT_NAMESPACE environment variable or
|
||||||
-namespace CLI flag.
|
-namespace CLI flag.
|
||||||
|
|
||||||
Delete a namespace (e.g. ns1/):
|
Delete a namespace (e.g. ns1/):
|
||||||
|
|||||||
@@ -24,7 +24,7 @@ func (c *NamespaceLookupCommand) Help() string {
|
|||||||
Usage: vault namespace create [options] PATH
|
Usage: vault namespace create [options] PATH
|
||||||
|
|
||||||
Create a child namespace. The namespace created will be relative to the
|
Create a child namespace. The namespace created will be relative to the
|
||||||
namespace provided in either VAULT_NAMESPACE environemnt variable or
|
namespace provided in either the VAULT_NAMESPACE environment variable or
|
||||||
-namespace CLI flag.
|
-namespace CLI flag.
|
||||||
|
|
||||||
Get information about the namespace of the locally authenticated token:
|
Get information about the namespace of the locally authenticated token:
|
||||||
|
|||||||
@@ -62,6 +62,9 @@ type Config struct {
|
|||||||
DisableClustering bool `hcl:"-"`
|
DisableClustering bool `hcl:"-"`
|
||||||
DisableClusteringRaw interface{} `hcl:"disable_clustering"`
|
DisableClusteringRaw interface{} `hcl:"disable_clustering"`
|
||||||
|
|
||||||
|
DisablePerformanceStandby bool `hcl:"-"`
|
||||||
|
DisablePerformanceStandbyRaw interface{} `hcl:"disable_performance_standby"`
|
||||||
|
|
||||||
DisableSealWrap bool `hcl:"-"`
|
DisableSealWrap bool `hcl:"-"`
|
||||||
DisableSealWrapRaw interface{} `hcl:"disable_sealwrap"`
|
DisableSealWrapRaw interface{} `hcl:"disable_sealwrap"`
|
||||||
}
|
}
|
||||||
@@ -326,6 +329,11 @@ func (c *Config) Merge(c2 *Config) *Config {
|
|||||||
result.PidFile = c2.PidFile
|
result.PidFile = c2.PidFile
|
||||||
}
|
}
|
||||||
|
|
||||||
|
result.DisablePerformanceStandby = c.DisablePerformanceStandby
|
||||||
|
if c2.DisablePerformanceStandby {
|
||||||
|
result.DisablePerformanceStandby = c2.DisablePerformanceStandby
|
||||||
|
}
|
||||||
|
|
||||||
result.DisableSealWrap = c.DisableSealWrap
|
result.DisableSealWrap = c.DisableSealWrap
|
||||||
if c2.DisableSealWrap {
|
if c2.DisableSealWrap {
|
||||||
result.DisableSealWrap = c2.DisableSealWrap
|
result.DisableSealWrap = c2.DisableSealWrap
|
||||||
@@ -424,6 +432,12 @@ func ParseConfig(d string, logger log.Logger) (*Config, error) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if result.DisablePerformanceStandbyRaw != nil {
|
||||||
|
if result.DisablePerformanceStandby, err = parseutil.ParseBool(result.DisablePerformanceStandbyRaw); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
if result.DisableSealWrapRaw != nil {
|
if result.DisableSealWrapRaw != nil {
|
||||||
if result.DisableSealWrap, err = parseutil.ParseBool(result.DisableSealWrapRaw); err != nil {
|
if result.DisableSealWrap, err = parseutil.ParseBool(result.DisableSealWrapRaw); err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
|
|||||||
@@ -67,6 +67,9 @@ func TestLoadConfigFile(t *testing.T) {
|
|||||||
EnableRawEndpoint: true,
|
EnableRawEndpoint: true,
|
||||||
EnableRawEndpointRaw: true,
|
EnableRawEndpointRaw: true,
|
||||||
|
|
||||||
|
DisableSealWrap: true,
|
||||||
|
DisableSealWrapRaw: true,
|
||||||
|
|
||||||
MaxLeaseTTL: 10 * time.Hour,
|
MaxLeaseTTL: 10 * time.Hour,
|
||||||
MaxLeaseTTLRaw: "10h",
|
MaxLeaseTTLRaw: "10h",
|
||||||
DefaultLeaseTTL: 10 * time.Hour,
|
DefaultLeaseTTL: 10 * time.Hour,
|
||||||
@@ -135,6 +138,9 @@ func TestLoadConfigFile_topLevel(t *testing.T) {
|
|||||||
EnableRawEndpoint: true,
|
EnableRawEndpoint: true,
|
||||||
EnableRawEndpointRaw: true,
|
EnableRawEndpointRaw: true,
|
||||||
|
|
||||||
|
DisableSealWrap: true,
|
||||||
|
DisableSealWrapRaw: true,
|
||||||
|
|
||||||
MaxLeaseTTL: 10 * time.Hour,
|
MaxLeaseTTL: 10 * time.Hour,
|
||||||
MaxLeaseTTLRaw: "10h",
|
MaxLeaseTTLRaw: "10h",
|
||||||
DefaultLeaseTTL: 10 * time.Hour,
|
DefaultLeaseTTL: 10 * time.Hour,
|
||||||
@@ -210,6 +216,8 @@ func TestLoadConfigFile_json(t *testing.T) {
|
|||||||
PidFile: "./pidfile",
|
PidFile: "./pidfile",
|
||||||
EnableRawEndpoint: true,
|
EnableRawEndpoint: true,
|
||||||
EnableRawEndpointRaw: true,
|
EnableRawEndpointRaw: true,
|
||||||
|
DisableSealWrap: true,
|
||||||
|
DisableSealWrapRaw: true,
|
||||||
}
|
}
|
||||||
if !reflect.DeepEqual(config, expected) {
|
if !reflect.DeepEqual(config, expected) {
|
||||||
t.Fatalf("expected \n\n%#v\n\n to be \n\n%#v\n\n", config, expected)
|
t.Fatalf("expected \n\n%#v\n\n to be \n\n%#v\n\n", config, expected)
|
||||||
@@ -261,6 +269,8 @@ func TestLoadConfigFile_json2(t *testing.T) {
|
|||||||
|
|
||||||
EnableRawEndpoint: true,
|
EnableRawEndpoint: true,
|
||||||
|
|
||||||
|
DisableSealWrap: true,
|
||||||
|
|
||||||
Telemetry: &Telemetry{
|
Telemetry: &Telemetry{
|
||||||
StatsiteAddr: "foo",
|
StatsiteAddr: "foo",
|
||||||
StatsdAddr: "bar",
|
StatsdAddr: "bar",
|
||||||
|
|||||||
@@ -30,4 +30,5 @@ default_lease_ttl = "10h"
|
|||||||
cluster_name = "testcluster"
|
cluster_name = "testcluster"
|
||||||
pid_file = "./pidfile"
|
pid_file = "./pidfile"
|
||||||
raw_storage_endpoint = true
|
raw_storage_endpoint = true
|
||||||
|
disable_sealwrap = true
|
||||||
disable_printable_check = true
|
disable_printable_check = true
|
||||||
|
|||||||
@@ -19,5 +19,6 @@
|
|||||||
"cluster_name":"testcluster",
|
"cluster_name":"testcluster",
|
||||||
"ui":true,
|
"ui":true,
|
||||||
"pid_file":"./pidfile",
|
"pid_file":"./pidfile",
|
||||||
"raw_storage_endpoint":true
|
"raw_storage_endpoint":true,
|
||||||
|
"disable_sealwrap":true
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -33,3 +33,4 @@ default_lease_ttl = "10h"
|
|||||||
cluster_name = "testcluster"
|
cluster_name = "testcluster"
|
||||||
pid_file = "./pidfile"
|
pid_file = "./pidfile"
|
||||||
raw_storage_endpoint = true
|
raw_storage_endpoint = true
|
||||||
|
disable_sealwrap = true
|
||||||
|
|||||||
@@ -1,6 +1,7 @@
|
|||||||
{
|
{
|
||||||
"ui":true,
|
"ui":true,
|
||||||
"raw_storage_endpoint":true,
|
"raw_storage_endpoint":true,
|
||||||
|
"disable_sealwrap":true,
|
||||||
"listener":[
|
"listener":[
|
||||||
{
|
{
|
||||||
"tcp":{
|
"tcp":{
|
||||||
|
|||||||
@@ -1,4 +1,8 @@
|
|||||||
// +build !race
|
// +build !race,!hsm
|
||||||
|
|
||||||
|
// NOTE: we can't use this with HSM. We can't set testing mode on and it's not
|
||||||
|
// safe to use env vars since that provides an attack vector in the real world.
|
||||||
|
//
|
||||||
// The server tests have a go-metrics/exp manager race condition :(.
|
// The server tests have a go-metrics/exp manager race condition :(.
|
||||||
|
|
||||||
package command
|
package command
|
||||||
|
|||||||
@@ -1,7 +1,11 @@
|
|||||||
package consts
|
package consts
|
||||||
|
|
||||||
|
import "time"
|
||||||
|
|
||||||
type ReplicationState uint32
|
type ReplicationState uint32
|
||||||
|
|
||||||
|
var ReplicationStaleReadTimeout = 2 * time.Second
|
||||||
|
|
||||||
const (
|
const (
|
||||||
_ ReplicationState = iota
|
_ ReplicationState = iota
|
||||||
OldReplicationPrimary
|
OldReplicationPrimary
|
||||||
@@ -21,6 +25,7 @@ const (
|
|||||||
ReplicationDRBootstrapping
|
ReplicationDRBootstrapping
|
||||||
ReplicationPerformanceDisabled
|
ReplicationPerformanceDisabled
|
||||||
ReplicationDRDisabled
|
ReplicationDRDisabled
|
||||||
|
ReplicationPerformanceStandby
|
||||||
)
|
)
|
||||||
|
|
||||||
func (r ReplicationState) string() string {
|
func (r ReplicationState) string() string {
|
||||||
|
|||||||
Reference in New Issue
Block a user