-
Notifications
You must be signed in to change notification settings - Fork 4.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Respect the configured address's path in the client #2588
Merged
Merged
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This is necessary if you have vault sitting behind a reverse-proxy like nginx under a context path and you need to talk to vault at: https://hostname.com/vault
briankassouf
suggested changes
Apr 12, 2017
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for the submission! Just one small comment.
api/client.go
Outdated
@@ -336,7 +336,7 @@ func (c *Client) NewRequest(method, path string) *Request { | |||
User: c.addr.User, | |||
Scheme: c.addr.Scheme, | |||
Host: c.addr.Host, | |||
Path: path, | |||
Path: strings.TrimSuffix(c.addr.Path, "/") + path, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Could you use path.Join()
instead of trimming the "/"?
@briankassouf should be good to go! |
jefferai
approved these changes
Apr 13, 2017
chrishoffman
pushed a commit
that referenced
this pull request
Apr 17, 2017
* oss/master: (43 commits) Bump deps Update SSH docs to indicate deprecation of dynamic key type Bump Go version in Travis changelog++ Bump go version to 1.8.1 Consider new bounds as a criteria to allow role creation (#2600) Update 404.html.md (#2594) Add some extra documentation around ssh-keygen -L to see signed cert info. changelog++ Respect the configured address's path in the client (#2588) changelog++ Verify that a CSR specifies IP SANs before checking whether it's allowed (#2574) minor docs update changelog++ Update AES-GCM verification text changelog++ implement a no_store option for pki roles (#2565) Remove superfluous/misleading comments around some listener options Update SSH CA documentation Add press-kit ...
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This is necessary if you have vault sitting behind a reverse-proxy like
nginx under a context path and you need to talk to vault at:
https://hostname.com/vault