diff --git a/vendor/github.com/hashicorp/vault-plugin-auth-kubernetes/path_login.go b/vendor/github.com/hashicorp/vault-plugin-auth-kubernetes/path_login.go index 378966307968..b4cb568d7639 100644 --- a/vendor/github.com/hashicorp/vault-plugin-auth-kubernetes/path_login.go +++ b/vendor/github.com/hashicorp/vault-plugin-auth-kubernetes/path_login.go @@ -10,6 +10,7 @@ import ( "github.com/SermoDigital/jose/crypto" "github.com/SermoDigital/jose/jws" "github.com/SermoDigital/jose/jwt" + "github.com/hashicorp/errwrap" multierror "github.com/hashicorp/go-multierror" "github.com/hashicorp/vault/helper/cidrutil" "github.com/hashicorp/vault/helper/strutil" @@ -249,7 +250,7 @@ func (b *kubeAuthBackend) parseAndValidateJWT(jwtStr string, role *roleStorageEn // validates the signature and then runs the claim validation if err := parsedJWT.Validate(cert, signingMethod); err != nil { - return err + return errwrap.Wrapf("failed to validate JWT: {{err}}", err) } return nil diff --git a/vendor/vendor.json b/vendor/vendor.json index 4d545def9e4a..3ddebd0e2313 100644 --- a/vendor/vendor.json +++ b/vendor/vendor.json @@ -1321,10 +1321,10 @@ "revisionTime": "2018-04-08T01:06:05Z" }, { - "checksumSHA1": "WnypXIUMGbOz/oAfrA5E2veXQC8=", + "checksumSHA1": "7YzPANZR2eqdB+XWgN+QtvGR9aI=", "path": "github.com/hashicorp/vault-plugin-auth-kubernetes", - "revision": "2e612c8cb9cce51bf2c4fbdb1c26ae4a9d06d8cb", - "revisionTime": "2018-06-18T15:34:39Z" + "revision": "dabfb5747165f7226d282959b77c17e3c2c29a2f", + "revisionTime": "2018-06-18T16:24:03Z" }, { "checksumSHA1": "yb6NN3tJ3pfjrP8O4Y76jNa2SyA=",