7782 Commits

Author SHA1 Message Date
Jeff Mitchell
a78033566c Changelogify 2015-11-03 11:43:57 -05:00
Jeff Mitchell
5ccccde6da Fix trailing whitespace complaints 2015-11-03 10:52:20 -05:00
Jeff Mitchell
5e0b16fe69 Use TypeDurationSecond instead of TypeString 2015-11-03 10:52:20 -05:00
Jeff Mitchell
ef21eb6ee4 Clarify that CRLs are not fetched by Vault 2015-11-03 10:52:20 -05:00
Jeff Mitchell
af4af078fa Address first round of feedback from review 2015-11-03 10:52:20 -05:00
Jeff Mitchell
90a9f25d80 Add documentation for CRLs and some minor cleanup. 2015-11-03 10:52:20 -05:00
Jeff Mitchell
b54cb9966c Add tests for the crls path, and fix a couple bugs 2015-11-03 10:52:20 -05:00
Jeff Mitchell
d785ba6d7f Drastically simplify the method and logic; keep an in-memory cache and use that for most operations, only affecting the backend storage when needed. 2015-11-03 10:52:20 -05:00
Jeff Mitchell
2737066e09 Add delete method, and ability to delete only one serial as well as an entire set. 2015-11-03 10:52:20 -05:00
Jeff Mitchell
5eac0671ae Add CRLSets endpoints; write method is done. Add verification logic to
login path. Change certs "ttl" field to be a string to match common
backend behavior.
2015-11-03 10:52:19 -05:00
Jeff Mitchell
376fe3601b Merge pull request #744 from hashicorp/issue-733
Run preSeal if postUnseal fails.
2015-11-03 10:50:23 -05:00
Jeff Mitchell
7a66911ae1 Update deps 2015-11-02 13:43:12 -05:00
Jeff Mitchell
966e7c621f errwrap -> go-multierror + errwrap 2015-11-02 13:29:33 -05:00
Jeff Mitchell
fda17ccbbd Run preSeal if postUnseal fails.
This also ensures that every error path out of postUnseal returns an
error.

Fixes #733
2015-11-02 13:29:33 -05:00
Jeff Mitchell
a382dd2145 Merge pull request #741 from hashicorp/sethvargo/update_deps
Update deps
2015-11-02 12:21:36 -05:00
Seth Vargo
3e2c4ffb7b Fix breaking API changes 2015-10-30 18:22:48 -04:00
Seth Vargo
f8cdc40c6a Update deps 2015-10-30 18:07:00 -04:00
Jeff Mitchell
9c71f59294 Merge pull request #740 from hashicorp/issue-739
Implement LookupSelf, RevokeSelf, and RenewSelf in the API client
2015-10-30 17:28:18 -04:00
Jeff Mitchell
b11cb5d964 Implement LookupSelf, RevokeSelf, and RenewSelf in the API client
Fixes #739
2015-10-30 17:27:33 -04:00
Jeff Mitchell
8cf0d1444a If we fail to open a file path, show which it is in the error output 2015-10-30 14:30:21 -04:00
Jeff Mitchell
27c2bad4a6 Merge pull request #730 from hashicorp/issue-713
Write HMAC-SHA256'd client token to audited requests
2015-10-30 13:36:22 -04:00
Jeff Mitchell
6ded941254 Note that the dev server does not fork
Fixes #710.
2015-10-30 12:47:56 -04:00
Jeff Mitchell
c0eec7ed8b Merge pull request #737 from hashicorp/issue-615
Return data on a token with one use left if there is no Lease ID
2015-10-30 12:42:19 -04:00
Jeff Mitchell
8a11c2d3c7 Update Postgres tests and changelogify 2015-10-30 12:41:45 -04:00
Jeff Mitchell
fab86fa23f Return data on a token with one use left if there is no Lease ID
Fixes #615
2015-10-30 12:35:42 -04:00
Jeff Mitchell
eebf1471c3 Merge pull request #736 from hashicorp/issue-699
Revoke permissions before dropping user in postgresql.
2015-10-30 12:01:03 -04:00
Jeff Mitchell
d066aea418 Revoke permissions before dropping user in postgresql.
Currently permissions are not revoked, which can lead revocation to not
actually work properly. This attempts to revoke all permissions and only
then drop the role.

Fixes issue #699
2015-10-30 11:58:52 -04:00
Jeff Mitchell
ec0fef0005 Merge pull request #735 from hashicorp/unexport-create-roottoken
Make the token store's Create and RootToken functions non-exported.
2015-10-30 11:04:29 -04:00
Jeff Mitchell
035ba4a659 Make the token store's Create and RootToken functions non-exported.
Nothing requires them to be exported, and I don't want anything in the
future to think it's okay to simply create a root token when it likes.
2015-10-30 10:59:26 -04:00
Jeff Mitchell
1c91ab9159 Merge pull request #731 from hashicorp/sethvargo/trail
Force a trailing slash
2015-10-29 16:22:52 -04:00
Seth Vargo
1edde809ba Force a trailing slash 2015-10-29 16:21:39 -04:00
Jeff Mitchell
1cd129015f Write HMAC-SHA256'd client token to audited requests
Fixes #713
2015-10-29 13:26:18 -04:00
Jeff Mitchell
d3aebadc3c Fix wording 2015-10-29 12:58:29 -04:00
Jeff Mitchell
9a835a99cc Merge pull request #729 from hashicorp/issue-697
Documentation update around path/key name encryption.
2015-10-29 11:22:50 -04:00
Jeff Mitchell
cee292a06a Documentation update around path/key name encryption.
Make it clear that path/key names in generic are not encrypted.

Fixes #697
2015-10-29 11:21:40 -04:00
Jeff Mitchell
b065bdd1d0 Merge pull request #728 from hashicorp/issue-718
Check TTL provided to generic backend on write
2015-10-29 11:06:30 -04:00
Jeff Mitchell
385209c6ba Check TTL provided to generic backend on write
If existing entries have unparseable TTLs, return the value plus a
warning, rather than an error.

Fixes #718
2015-10-29 11:05:21 -04:00
Jeff Mitchell
b2bb7b579b Merge pull request #725 from hashicorp/add-reset-for-unseal
Add reset support to the unseal command.
2015-10-28 16:05:58 -04:00
Jeff Mitchell
d7f528a768 Add reset support to the unseal command.
Reset clears the provided unseal keys, allowing the process to be begun
again. Includes documentation and unit test changes.

Fixes #695
2015-10-28 15:59:39 -04:00
Jeff Mitchell
40486da446 Fix cache disabling 2015-10-28 13:05:56 -04:00
Jeff Mitchell
b0f24dc820 Minor format fix in environment documentation 2015-10-28 09:56:28 -04:00
Seth Vargo
43cfa275af Use vendored fastly logo 2015-10-26 12:13:03 -04:00
Jeff Mitchell
f5f4398772 Merge pull request #719 from hashicorp/sethvargo/releases
Use releases for releases
2015-10-26 09:43:00 -04:00
Seth Vargo
512e391d80 Use releases for releases 2015-10-26 00:06:17 -04:00
Jeff Mitchell
da8dd9fb04 Merge pull request #717 from jantman/patch-1
add GitHub Enterprise base_url to docs
2015-10-23 09:39:54 -04:00
Jason Antman
0cf323ce07 add documentation for GitHub Auth Backend 'ttl' and 'max_ttl' parameters 2015-10-23 09:30:48 -04:00
Jason Antman
887257b811 add GitHub Enterprise base_url to docs
In https://github.com/hashicorp/vault/issues/716 @jefferai confirmed that the GitHub Auth Backend supports GitHub enterprise using an undocumented ``base_url`` parameter. This adds that parameter to the relevant documentation page.
2015-10-23 09:18:07 -04:00
Jeff Mitchell
e1fc4dde6f Update changelog 2015-10-23 09:18:03 -04:00
Jeff Mitchell
37205a2e80 Merge pull request #715 from voutasaurus/master
Resolves issue 704 (Windows VAULT_ADDR env var)
2015-10-23 09:17:10 -04:00
Jeff Mitchell
9e0b78a7dd Bump Godeps 2015-10-23 09:14:09 -04:00