vault/api
Jeff Mitchell f3f30022d0 Add forced revocation.
In some situations, it can be impossible to revoke leases (for instance,
if someone has gone and manually removed users created by Vault). This
can not only cause Vault to cycle trying to revoke them, but it also
prevents mounts from being unmounted, leaving them in a tainted state
where the only operations allowed are to revoke (or rollback), which
will never successfully complete.

This adds a new endpoint that works similarly to `revoke-prefix` but
ignores errors coming from a backend upon revocation (it does not ignore
errors coming from within the expiration manager, such as errors
accessing the data store). This can be used to force Vault to abandon
leases.

Like `revoke-prefix`, this is a very sensitive operation and requires
`sudo`. It is implemented as a separate endpoint, rather than an
argument to `revoke-prefix`, to ensure that control can be delegated
appropriately, as even most administrators should not normally have
this privilege.

Fixes #1135
2016-03-03 10:13:59 -05:00
..
test-fixtures moved the test cert keys to appropriate test-fixtures folder 2016-02-29 15:49:08 -05:00
api_test.go Use a pointer config instead 2015-04-23 11:13:52 -04:00
auth.go api: client library methods to get tokens 2015-04-04 17:53:59 -07:00
auth_token.go Add some documentation to the API revoke functions 2016-02-03 11:42:13 -05:00
auth_token_test.go Fix up unit tests to expect new values 2016-01-29 19:36:56 -05:00
client.go Add VAULT_TLS_SERVER_NAME environment variable 2016-02-25 17:28:49 +01:00
client_test.go moved the test cert keys to appropriate test-fixtures folder 2016-02-29 15:49:08 -05:00
help.go command/help 2015-04-02 22:42:05 -07:00
logical.go Updates and documentation 2016-01-22 10:07:32 -05:00
request.go Remove cookie authentication. 2015-08-21 19:46:23 -07:00
request_test.go api: Allow reseting of request body 2015-04-20 10:44:51 -07:00
response.go http: fix mount endpoints 2015-03-16 10:51:13 -07:00
secret.go Add the ability for warnings to be added to responses. These are 2015-10-07 16:18:39 -04:00
secret_test.go Add unit tests 2015-10-07 20:17:06 -04:00
SPEC.md Update documentation to be consistent with return codes 2015-12-10 10:26:40 -05:00
ssh.go ssh-helper api changes 2016-02-23 00:16:00 -05:00
ssh_agent.go Use tls_skip_verify in vault-ssh-helper 2016-02-23 17:32:49 -05:00
ssh_agent_test.go fix api tests 2016-02-26 17:01:40 -05:00
sys.go api: separate sys out further 2015-03-11 17:46:41 -05:00
sys_audit.go Reintroduce the ability to look up obfuscated values in the audit log 2015-11-18 20:26:03 -05:00
sys_auth.go api: client library methods to get tokens 2015-04-04 17:53:59 -07:00
sys_generate_root.go Return status for rekey/root generation at init time. This mitigates a 2016-02-12 14:24:36 -05:00
sys_init.go Address comments from review. 2015-08-25 15:33:58 -07:00
sys_leader.go api: Support sys/leader endpoint 2015-04-20 12:04:13 -07:00
sys_lease.go Add forced revocation. 2016-03-03 10:13:59 -05:00
sys_mounts.go Parse and return MountConfigOutput from API 2016-02-02 17:11:05 -06:00
sys_mounts_test.go Parse and return MountConfigOutput from API 2016-02-02 17:11:05 -06:00
sys_policy.go api: fixing 404 handling of GetPolicy 2015-07-13 19:20:00 +10:00
sys_rekey.go Return status for rekey/root generation at init time. This mitigates a 2016-02-12 14:24:36 -05:00
sys_rotate.go api: Adding Rotate and KeyStatus 2015-05-27 18:05:23 -07:00
sys_seal.go Add reset support to the unseal command. 2015-10-28 15:59:39 -04:00