1
0
Commit Graph

29 Commits

Author SHA1 Message Date
hc-github-team-es-release-engineering
48ab1eae08
[DO NOT MERGE UNTIL EOY] EOY license fixes 1.14.x (#24390) 2024-01-02 10:36:20 -08:00
Hamid Ghaf
e55c18ed12
adding copyright header (#19555)
* adding copyright header

* fix fmt and a test
2023-03-15 09:00:52 -07:00
Jim Kalafut
a72a5ff754
Rename master key to root key (#13324)
* See what it looks like to replace "master key" with "root key".  There are two places that would require more challenging code changes: the storage path `core/master`, and its contents (the JSON-serialized EncodedKeyringtructure.)

* Restore accidentally deleted line

* Add changelog

* Update root->recovery

* Fix test

Co-authored-by: Nick Cabatoff <ncabatoff@hashicorp.com>
2021-12-06 17:12:20 -08:00
Scott Miller
e5316a9e2f
OSS side barrier encryption tracking and automatic rotation (#11007)
* Automatic barrier key rotation, OSS portion

* Fix build issues

* Vendored version

* Add missing encs field, not sure where this got lost.
2021-02-25 14:27:25 -06:00
Scott Miller
0ac5634f3e
Test for overflow of the capacity value (#9317) 2020-06-25 11:22:13 -05:00
ncabatoff
afcba41190
Shamir seals now come in two varieties: legacy and new-style. (#7694)
Shamir seals now come in two varieties: legacy and new-style. Legacy
Shamir is automatically converted to new-style when a rekey operation
is performed. All new Vault initializations using Shamir are new-style.

New-style Shamir writes an encrypted master key to storage, just like
AutoUnseal. The stored master key is encrypted using the shared key that
is split via Shamir's algorithm. Thus when unsealing, we take the key
fragments given, combine them into a Key-Encryption-Key, and use that
to decrypt the master key on disk. Then the master key is used to read
the keyring that decrypts the barrier.
2019-10-18 14:46:00 -04:00
Lexman
47a54ac8bc
oss changes for entropy augmentation feature (#7670)
* oss changes for entropy augmentation feature

* fix oss command/server/config tests

* update go.sum

* fix logical_system and http/ tests

* adds vendored files

* removes unused variable
2019-10-17 10:33:00 -07:00
Jeff Mitchell
170521481d
Create sdk/ and api/ submodules (#6583) 2019-04-12 17:54:35 -04:00
Jeff Mitchell
e9256ed477
Split SubView functionality into logical.StorageView (#6141)
This lets other parts of Vault that can't depend on the vault package
take advantage of the subview functionality.

This also allows getting rid of BarrierStorage and vault.Entry, two
totally redundant abstractions.
2019-01-31 09:25:18 -05:00
Josh Soref
e43b76ef97 Spelling (#4119) 2018-03-20 14:54:10 -04:00
Jeff Mitchell
b27093b63c
Add context to barrier encryptor interface 2018-01-19 05:28:47 -05:00
Brian Kassouf
8142b42d95 Add context to storage backends and wire it through a lot of places (#3817) 2018-01-19 01:44:44 -05:00
Jeff Mitchell
c2cef877f4 Port over some changes 2017-11-30 09:43:07 -05:00
Jeff Mitchell
98168dc791 Sync over 2017-10-23 16:43:07 -04:00
Jeff Mitchell
5780c8eca0 More rep porting (#2391)
* More rep porting

* Add a bit more porting
2017-02-16 23:09:39 -05:00
Armon Dadgar
3f7c295c88 vault: adding ability to reload master key 2015-05-29 14:29:55 -07:00
Armon Dadgar
7d0a72d9d6 vault: moving upgrade path into barrier 2015-05-28 16:42:32 -07:00
Armon Dadgar
c261f66b2b vault: support keyring reload 2015-05-28 16:09:15 -07:00
Armon Dadgar
32ccf77a61 vault: adding barrier AddKey 2015-05-28 15:52:26 -07:00
Armon Dadgar
4731c48948 vault: Adding VerifyMaster to Barrier 2015-05-28 11:28:33 -07:00
Armon Dadgar
083fa51bfb vault: expose information about keys 2015-05-27 17:25:36 -07:00
Armon Dadgar
9747230ae5 vault: first pass at rekey 2015-05-27 17:13:40 -07:00
Armon Dadgar
a06ea1756c vault: first pass at key rotation 2015-05-27 17:05:02 -07:00
Armon Dadgar
4cf5fdbb03 vault: adding path for keyring 2015-05-27 15:23:43 -07:00
Armon Dadgar
24cd1d33e6 vault: Split SecurityBarrier interface to BarrierStorage 2015-04-10 16:43:35 -07:00
Mitchell Hashimoto
923ff65959 logical: put structs here, vault uses them 2015-03-15 14:27:06 -07:00
Armon Dadgar
6c88eae73e vault: Improve error when unseal key is wrong 2015-03-12 11:27:41 -07:00
Armon Dadgar
c2672f2868 vault: sanity check key length 2015-03-12 11:20:38 -07:00
Armon Dadgar
9f6ecdabc9 vault: First pass at a barrier 2015-03-05 13:27:35 -08:00