Armon Dadgar
96119946f3
secret/transit: allow policies to be upserted
2015-06-17 18:51:05 -07:00
Armon Dadgar
9238c6def3
secret/transit: Use special endpoint to get underlying keys. Fixes #219
2015-06-17 18:42:23 -07:00
Armon Dadgar
28dd283c93
builtin: fixing API change in logical framework
2015-06-17 14:34:11 -07:00
Armon Dadgar
05fa4a4a48
secret/postgres: Ensure sane username length. Fixes #326
2015-06-17 13:31:56 -07:00
Mitchell Hashimoto
a98c07855b
credential/github: get rid of stray tab
2015-06-16 10:05:51 -07:00
Mitchell Hashimoto
dcc84749d1
command/auth, github: improve cli docs
...
/cc @sethvargo
2015-06-16 10:05:11 -07:00
Christian Svensson
f184c5985a
Record the common name in TLS metadata
...
It is useful to be able to save the client cert's Common Name for auditing purposes when using a central CA.
This adds a "common_name" value to the Metadata structure passed from login.
2015-06-14 23:18:21 +01:00
Jonathan Sokolowski
dd7d64dd80
logical/consul: Combine policy and lease into single storage struct
2015-05-28 09:36:23 +10:00
Jonathan Sokolowski
6814b0d63e
logical/consul: custom lease time for roles
2015-05-27 09:53:46 +10:00
Ian Unruh
82bca95537
Allow dot in LDAP login username
2015-05-20 11:54:15 -07:00
Armon Dadgar
cce15445c9
auth/cert: Guard against empty certs. Fixes #214
2015-05-18 16:11:09 -07:00
Armon Dadgar
087e84d9a9
cred/app-id: ensure consistent error message
2015-05-15 11:45:57 -07:00
Armon Dadgar
f1683f907f
cred/app-id: stricter validation and error messaging
2015-05-15 11:40:45 -07:00
Jonathan Sokolowski
a4f9bacb28
credential/app-id: Test DeleteOperation
2015-05-14 22:30:02 +10:00
Etourneau Gwenn
fd682719a1
Fix Error message
2015-05-12 14:32:09 +09:00
Mitchell Hashimoto
3a9a1b2738
credential/app-id: add hash of user/app ID to metadata for logs
2015-05-11 10:46:11 -07:00
Mitchell Hashimoto
09b3a99d56
Merge pull request #184 from hashicorp/b-github-casing
...
credential/github: case insensitive mappings
2015-05-11 10:27:45 -07:00
Mitchell Hashimoto
11a009d5ab
logical/framework: PathMap is case insensitive by default
2015-05-11 10:27:04 -07:00
Mitchell Hashimoto
5d1baaace4
credential/github: case insensitive mappings
2015-05-11 10:24:39 -07:00
Giovanni Bajo
4273247923
auth/ldap: move password into InternalData
2015-05-09 22:06:34 +02:00
Giovanni Bajo
4a9be1fb5f
auth/ldap: move username into the path (to allow per-user revokation on the path)
2015-05-09 22:06:28 +02:00
Giovanni Bajo
45a151ef73
auth/ldap: fix pasto
2015-05-09 22:06:22 +02:00
Giovanni Bajo
9e8b045308
auth/ldap: implement login renew
2015-05-09 22:04:20 +02:00
Giovanni Bajo
368df9fac1
auth/ldap: document LDAP server used in tests
2015-05-09 22:04:20 +02:00
Giovanni Bajo
b41328c72d
auth/ldap: add acceptance tests
2015-05-09 22:04:20 +02:00
Giovanni Bajo
16d1d052f0
auth/ldap: add support for groups with unique members
2015-05-09 22:04:20 +02:00
Giovanni Bajo
f0c2c95909
auth/ldap: implement authorization via LDAP groups
2015-05-09 22:04:20 +02:00
Giovanni Bajo
ab269aef60
auth/ldap: add configuration path for groups
2015-05-09 22:04:20 +02:00
Giovanni Bajo
7f3313c587
Attempt connection to LDAP server at login time.
...
Also switch to a LDAP library fork which fixes a panic when
shutting down a connection immediately.
2015-05-09 22:04:19 +02:00
Giovanni Bajo
230fc30ea2
Initial implementation of the LDAP credential backend
2015-05-09 22:04:19 +02:00
Seth Vargo
3748be6491
Remove references to -var
2015-05-08 11:45:29 -04:00
Armon Dadgar
83dbdf1611
cred/app-id: Add help synopsis to login path
2015-05-07 15:45:43 -07:00
Seth Vargo
bf8ba7b1bb
Fix output from GitHub help
2015-05-07 14:13:12 -04:00
Armon Dadgar
70ae9323e2
audit/file: Create file if it does not exist. Fixes #148
2015-05-06 11:33:06 -07:00
Mitchell Hashimoto
be301bcd8a
token/disk: write token with 0600
2015-05-02 13:34:01 -07:00
Trevor Pounds
a9367c17d0
Fix documentation typo.
2015-04-28 22:15:56 -07:00
Armon Dadgar
1530403a04
audit/file: add log_raw parameter and default to hashing
2015-04-27 15:56:41 -07:00
Armon Dadgar
9c019d3f20
audit/syslog: switch defaults
2015-04-27 15:56:41 -07:00
Armon Dadgar
5c11927fa8
audit/syslog: Copy structure before hashing to avoid breaking result
2015-04-27 15:56:40 -07:00
Armon Dadgar
cee1d20015
audit/syslog: Hash everything by default, optionally disable
2015-04-27 15:56:40 -07:00
Armon Dadgar
44fb28f762
audit/syslog: first pass
2015-04-27 15:56:40 -07:00
Armon Dadgar
478a5965ee
secret/aws: Using roles instead of policy
2015-04-27 14:20:28 -07:00
Armon Dadgar
aaf10cd624
Do not root protect role configurations
2015-04-27 14:07:20 -07:00
Armon Dadgar
3330d43d44
secret/postgres: secret/mysql: roles endpoints root protected
2015-04-27 14:04:10 -07:00
Armon Dadgar
f159750509
secret/consul: replace policy with roles, and prefix the token path
2015-04-27 13:59:56 -07:00
Armon Dadgar
d425ca22df
secret/transit: rename policy to keys
2015-04-27 13:52:47 -07:00
Armon Dadgar
39f014e0b6
secret/transit: Adding more help. Fixes #41
2015-04-27 12:47:09 -07:00
Armon Dadgar
79d0c0affe
audit/file: Attempt to create directory path. Fixes #38
2015-04-27 12:40:32 -07:00
Armon Dadgar
212aa9fb5b
secret/postgresql: testing support for multiple statements
2015-04-27 12:00:07 -07:00
Armon Dadgar
db5f74f6b4
secret/postgresql: support multiple sql statements
2015-04-27 11:31:27 -07:00