Skip to content
This repository has been archived by the owner on Jan 8, 2024. It is now read-only.

Commit

Permalink
Merge pull request #55 from seomoz/nested_policy_fix
Browse files Browse the repository at this point in the history
Nested policy fix
  • Loading branch information
nemosupremo authored May 3, 2018
2 parents ec6e513 + 920121b commit 7b7ead6
Show file tree
Hide file tree
Showing 2 changed files with 5 additions and 0 deletions.
2 changes: 2 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -63,6 +63,8 @@ VGM also supports the client environment variables used by vault such as, `VAULT

`SEAL_HTTP_STATUS` | `-seal-http-status` - *Default: `200`* - Configures HTTP Status Code to be returned when querying /status.json. By default uses 200 in both cases, but can be configured to return 429, for example, if the status is sealed.

`DEFAULT_RENEWABLE` | `-default-renewable-tokens` - *Default: `true`* - The default value for renewable on tokens created.

### Vault Startup Authorization Methods

`VAULT_TOKEN` - Vault authorization token to make requests with.
Expand Down
3 changes: 3 additions & 0 deletions policy_nested.go
Original file line number Diff line number Diff line change
Expand Up @@ -56,6 +56,9 @@ func (p policies) loadNestedPolicies(authToken string) error {

/* Copy tempPolicies to policies */
for k,v := range tempPolicies{
if v.Renewable == nil {
v.Renewable = &config.DefaultRenewable
}
p[k] = v
}

Expand Down

0 comments on commit 7b7ead6

Please sign in to comment.