Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

auth/aws: Make disallow_reauthentication and allow_instance_migration mutually exclusive #3291

Merged
merged 6 commits into from
Nov 6, 2017

Conversation

joelthompson
Copy link
Contributor

I was browsing through the Vault docs and source code (as I am wont to do...) and realized this was a small thing.

The semantics of disallow_reauthentication and allow_instance_migration
are mutually exclusive; the former says to never allow reauthentication
while the latter says to relax the conditions under which you allow
reauthentication. disallow_reauthentication takes precedence upon login
time, but it is probably better UX to call out to users at role CRUD
time that the role they are creating has contradictory semantics.

The specific way I'm doing this could cause backwards incompatibilities, both in scripts that create/update roles as well as breaking the ability to modify existing roles with both of these set to true. I'm not sure how big of a deal it would be. Instead of erroring out, I could just return a warning and set allow_instance_migration to false; I could also add in code that detects both of these being set to true in an existing role and sets allow_instance_migration to false so I don't break existing roles. For the time being, I went with the simpler approach and would appreciate your feedback on the best way to handle this.

I'm also throwing in some typo fixes in docs from a previous PR :)

… mutually exclusive

The semantics of disallow_reauthentication and allow_instance_migration
are mutually exclusive; the former says to never allow reauthentication
while the latter says to relax the conditions under which you allow
reauthentication. disallow_reauthentication takes precedence upon login
time, but it is probably better UX to call out to users at role CRUD
time that the role they are creating has contradictory semantics.
@jefferai jefferai modified the milestones: 0.8.3, 0.8.4 Sep 19, 2017
@jefferai
Copy link
Member

jefferai commented Nov 6, 2017

Thanks!

@jefferai jefferai merged commit 50aa3d9 into hashicorp:master Nov 6, 2017
chrishoffman pushed a commit that referenced this pull request Nov 7, 2017
* oss/master: (30 commits)
  Handle 'not supplied' case for field type TypeNameString (#3546)
  Fix deprecated cassandra backend tests (#3543)
  changelog++
  auth/aws: Make disallow_reauthentication and allow_instance_migration mutually exclusive (#3291)
  changelog++
  More Mount Conflict Detection (#2919)
  Fix swallowed errors in TestRollbackManager_Join() (#3327)
  changelog++
  added AWS enpoint handling (#3416)
  Seal wrap all root tokens and their leases (#3540)
  Return group memberships of entity during read (#3526)
  Add note on support for using rec keys on /sys/rekey (#3517)
  Add third party tools list to website (#3488)
  Minor client refactoring (#3539)
  changelog++
  Add PKCS8 marshaling to PKI (#3518)
  Update SSH list roles docs (#3536)
  Update gocql dep
  changelog++
  Return role info for each role on pathRoleList (#3532)
  ...
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants