vishalnayak
e4ae98d1e5
core: adding error server logs for failure to update mount table
2017-01-11 20:21:34 -05:00
Vishal Nayak
895c7850bc
Merge pull request #2261 from MonsantoCo/github-map-list
...
Support LIST on auth/github/map/teams and /users
2017-01-11 19:58:06 -05:00
Brian Rodgers
edee04feb6
Support LIST on auth/github/map/teams and /users
2017-01-11 15:09:01 -06:00
vishalnayak
42cff07157
rekey: added check to ensure that length of PGP keys and the shares are matching
2017-01-11 13:29:10 -05:00
Vishal Nayak
3754d68d44
Merge pull request #2257 from bkrodgers/git-config-read
...
Added a 'read' for github config
2017-01-11 12:23:00 -05:00
Brian Rodgers
2615412734
Added a nil check for config and renamed org field internally.
2017-01-11 11:04:15 -06:00
Jeff Mitchell
c084f5f3ed
Set c.standby true in non-HA context. ( #2259 )
...
This value is the key for some checks in core logic. In a non-HA
environment, if the core was sealed it would never be set back to true.
2017-01-11 11:13:09 -05:00
Matthew Irish
231f00dff2
Transit key actions ( #2254 )
...
* add supports_* for transit key reads
* update transit docs with new supports_* fields
2017-01-11 10:05:06 -06:00
Adam Shannon
5ecfe3c477
physical/zk: Ignore ErrNoNode when deleting znodes ( #2256 )
2017-01-11 09:42:30 -05:00
Cameron Stokes
08603054ff
Note about VAULT_UI environment variable. ( #2255 )
2017-01-11 09:29:45 -05:00
Vishal Nayak
ec4a0e77ec
Merge pull request #2258 from rajanadar/patch-4
...
fix lookup-self response json
2017-01-11 02:24:45 -05:00
Raja Nadar
c5a059743b
fix lookup-self response json
...
reflect the true 0.6.4 response.
2017-01-10 23:19:49 -08:00
Brian Rodgers
5a6baeaca3
Added a 'read' for github config
2017-01-10 18:21:31 -06:00
Vishal Nayak
d2c51af5cb
Merge pull request #2252 from hashicorp/mountentry-clone
...
Adding Tainted to MountEntry.Clone
2017-01-10 10:28:13 -05:00
Jeff Mitchell
5deac7c5cb
changelog++
2017-01-10 09:48:56 -05:00
joe miller
a76a49732d
sign-verbatim should set use_csr_common_name to true ( #2243 )
2017-01-10 09:47:59 -05:00
vishalnayak
1a1d1ab905
Adding Tainted to MountEntry.Clone
2017-01-10 08:32:33 -05:00
Jeff Mitchell
ebfba76f98
Remove documenting that the token to revoke can be part of the URL as ( #2250 )
...
this should never be used and only remains for backwards compat.
Fixes #2248
2017-01-09 22:09:29 -05:00
Jeff Mitchell
454ddd4c48
Use dockertest.v2 ( #2247 )
...
New dockertest has a totally different API and will require some serious
refactoring. This will tide over until then by pinning the API version.
2017-01-09 13:46:54 -05:00
Jeff Mitchell
c334fba459
Fix up exclusion rules for dynamic system view IsPrimary
2017-01-07 18:31:43 -05:00
Jeff Mitchell
8561d38c35
Fix up invalidations in noopbackend
2017-01-07 18:22:34 -05:00
Armon Dadgar
745df0a88c
Adding interface methods to logical.Backend for parity ( #2242 )
2017-01-07 18:18:22 -05:00
Jeff Mitchell
01484439db
Rename gRPC request forwarding method
2017-01-06 17:08:43 -05:00
Jeff Mitchell
e6a5dd211c
Split Unseal into Unseal and unsealInternal
2017-01-06 16:30:43 -05:00
Jeff Mitchell
bd81ed1e0a
Port some updates
2017-01-06 15:42:18 -05:00
Jeff Mitchell
f2de741431
Update Makefile protoc commands
2017-01-06 15:11:51 -05:00
Jeff Mitchell
7f71ce6672
Clarify text around redirect addr being required
2017-01-06 15:07:01 -05:00
Xiang Li
eedf879ae4
etcd3: remove wrong keys checking for prefix request ( #2231 )
2017-01-05 07:48:46 -05:00
Jeff Mitchell
92b7707c65
When a JWT wrapping token is returned, audit the inner token both for
...
request and response. This makes it far easier to properly check
validity elsewhere in Vault because we simply replace the request client
token with the inner value.
2017-01-04 23:50:24 -05:00
vishalnayak
50811daa5f
Fixed return types
2017-01-04 16:58:25 -05:00
Jeff Mitchell
d256ae265b
Add read locks to LookupToken/ValidateWrappingToken ( #2232 )
2017-01-04 16:52:03 -05:00
Jeff Mitchell
de5d4f8f08
Bump deps
2017-01-04 16:47:38 -05:00
Jeff Mitchell
0dd5a2a6ba
JWT wrapping tokens ( #2172 )
2017-01-04 16:44:03 -05:00
Vishal Nayak
c39ebc4ccd
Merge pull request #2229 from hashicorp/b-generate-root-output
...
Fix generate-root help and progress output.
2017-01-04 16:42:56 -05:00
Cameron Stokes
eb8343625f
Fix generate-root help and progress output.
2017-01-04 09:01:17 -08:00
Vishal Nayak
ba9f57a27e
Merge pull request #2227 from windowsrefund/add-bind-to-doc
...
prevent startup error when user has multiple private IPs configured l…
2017-01-03 15:35:56 -05:00
windowsrefund
b77ad87bd5
prevent startup error when user has multiple private IPs configured locally
2017-01-03 15:24:11 -05:00
Xiang Li
e086a81353
physical: add etcd3 backend ( #2168 )
2017-01-03 14:43:46 -05:00
vishalnayak
4a35912d73
Removed unused methods
2017-01-03 12:51:35 -05:00
Michael Hofer
f86bd98021
Add link to vault-client vc written in go ( #2225 )
2017-01-03 11:29:54 -05:00
Jeff Mitchell
3316219d41
changelog++
2017-01-03 11:17:28 -05:00
Dan Everton
bf4896ae66
Page results from S3. ( #2224 )
...
S3 results require paging to ensure that all results are returned. This
PR changes the S3 physical backend to use the new ListObjectV2 method
and pages through all the results.
Fixes #2223 .
2017-01-03 11:15:48 -05:00
Conor Mongey
1c7f9a6954
Update go-syslog package ( #2219 )
2016-12-31 10:22:25 -06:00
Randy Fay
a192e03fb5
Add cookbook section, with root token generation technique
2016-12-30 09:19:55 -07:00
Phil Porada
d0039e0df0
Adds a link to the latest releases CHANGELOG on the downloads.html page ( #2205 )
2016-12-29 19:57:16 -06:00
Chris Hoffman
a719619344
Adding Vault.NET C# Library ( #2213 )
2016-12-29 19:26:47 -06:00
Stenio Ferreira
e9519ebd26
Fixed docs - auth backend aws had a typo on API example ( #2211 )
2016-12-28 11:41:50 -06:00
Jeff Mitchell
0d92169aef
Update vs HSM text
2016-12-28 11:23:50 -05:00
Félix Cantournet
0d6d4211b8
all: test: Fix govet warnings
...
Fix calls to t.Fatal() with formatting.
Fixed some calls to Fatalf() with wrong formatting
2016-12-21 19:44:07 +01:00
Daniel Heitmann
1ae7dafd57
Replace app-id with approle due to deprecation ( #2197 )
...
According to the documentation the App-ID backend is deprecated in favor of the AppRole backend since Vault 0.6.1.
2016-12-20 13:29:42 -05:00