7782 Commits

Author SHA1 Message Date
Vishal Nayak
0dd95f0d24 Merge pull request #1754 from hashicorp/secret-id-read-delete
Seperate endpoints for read/delete using secret-id and accessor
2016-08-21 16:15:55 -04:00
vishalnayak
7d772e445f Extract out common code 2016-08-21 15:46:11 -04:00
vishalnayak
1a62fb64c2 Seperate endpoints for read/delete using secret-id and accessor 2016-08-21 14:42:49 -04:00
Jeff Mitchell
826146f9e8 Initial fixups, not yet done 2016-08-20 22:39:41 -04:00
Jeff Mitchell
357ecb4dfe gofmt 2016-08-19 16:48:32 -04:00
Jeff Mitchell
cb106531db Bump tf version 2016-08-19 15:23:38 -04:00
Jeff Mitchell
87690f02d4 Merge pull request #1753 from hashicorp/adv-cleanup
Cleanup and avoid unnecessary advertisement parsing in leader check
2016-08-19 15:22:43 -04:00
Jeff Mitchell
f9c44a4458 Cleanup and avoid unnecessary advertisement parsing in leader check 2016-08-19 14:49:11 -04:00
Jeff Mitchell
4bcf591dfa Rename proto service stuff and change log levels for some messages 2016-08-19 11:49:25 -04:00
Jeff Mitchell
edd6379466 Clustering enhancements (#1747) 2016-08-19 11:03:53 -04:00
vishalnayak
c9393a7dae s/advertisement/redirect 2016-08-19 10:52:14 -04:00
Jeff Mitchell
4e4de5f41a Update location of LDAP docs in upgrade guide.
Fixes #1656
2016-08-19 10:31:31 -04:00
Jeff Mitchell
e20eaea59f Force dev on when dev-ha is on 2016-08-19 08:29:34 -04:00
Vishal Nayak
e3cd98dae0 Merge pull request #1751 from hashicorp/fix-aws-ec2-ttl
aws-ec2: se max_ttl when ttl is not set, during login
2016-08-18 16:08:49 -04:00
vishalnayak
0fbc9b1d7b Pretty print the warning 2016-08-18 16:09:10 -04:00
vishalnayak
a57588303d Use shortestTTL value during renewals too 2016-08-18 15:43:58 -04:00
vishalnayak
eac454a385 When TTL is not set, consider the system default TTL as well 2016-08-18 15:37:59 -04:00
vishalnayak
22e4577725 aws-ec2: se max_ttl when ttl is not set, during login 2016-08-18 15:16:32 -04:00
Jeff Mitchell
f104d0c1d0 changelog++ 2016-08-18 12:21:23 -04:00
Jeff Mitchell
5999d3386c Merge pull request #1750 from hashicorp/status-code-change
Change uninit/sealed status codes from health endpoint
2016-08-18 12:17:38 -04:00
Jeff Mitchell
58a7c8999e Change uninit/sealed status codes from health endpoint 2016-08-18 12:10:23 -04:00
Jeff Mitchell
48dbc9d1b5 cl++ 2016-08-18 11:28:59 -04:00
Jeff Mitchell
d2d9c884d7 Merge pull request #1749 from maf23/added_missing_ttl_doc
Mention ttl parameter in the documentation of /auth/aws-ec2/role/<role>
2016-08-18 07:25:20 -04:00
Martin Forssen
7f25a25301 Mention ttl parameter in the documentation of /auth/aws-ec2/role/<role>
This parameter was not documented
2016-08-18 13:16:58 +02:00
Jeff Mitchell
fece3ca069 Merge pull request #1744 from hashicorp/jbs-clarification
Add a bit of clarification
2016-08-17 17:47:06 -04:00
Jeff Mitchell
86ac08ba8b Protobuf for forwarding (#1743) 2016-08-17 16:15:15 -04:00
Brian Shumate
31f7e58be2 Add a bit of clarification 2016-08-17 16:07:30 -04:00
Jeff Mitchell
09491388f4 Don't serialize the full connection state, instead just the peer certificates, and parse them on the other side 2016-08-17 10:29:53 -04:00
Jeff Mitchell
b5653fc8e3 Merge pull request #1740 from hashicorp/fix-upgrade-periodic-roles
Ensure we don't use a token entry period of 0 in role comparisons.
2016-08-16 16:59:56 -04:00
Jeff Mitchell
35c139c262 Ensure we don't use a token entry period of 0 in role comparisons.
When we added support for generating periodic tokens for root/sudo in
auth/token/create we used the token entry's period value to store the
shortest period found to eventually populate the TTL. The problem was
that we then assumed later that this value would be populated for
periodic tokens, when it wouldn't have been in the upgrade case.

Instead, use a temp var to store the proper value to use; populate
te.Period only if actually given; and check that it's not zero before
comparing against role value during renew.
2016-08-16 16:47:46 -04:00
Jeff Mitchell
5253c84e0e Make time logic a bit clearer 2016-08-16 16:29:07 -04:00
Jeff Mitchell
1beb65611e Add local into handler path for forwarded requests 2016-08-16 11:46:37 -04:00
Jeff Mitchell
18fe7034ad update Dockerfile for Go 1.7 final 2016-08-16 11:23:43 -04:00
Jeff Mitchell
565b45d57a Add permit pool to dynamodb 2016-08-15 19:45:06 -04:00
Jeff Mitchell
e65b48a7e4 Actually show the error occurring if a file audit log can't be opened 2016-08-15 16:26:36 -04:00
Jeff Mitchell
abb14c42bc Use dockertest for physical consul tests, and always run them 2016-08-15 16:20:32 -04:00
Matt Hurne
587b481a29 AppRole documentation tweaks (#1735)
* Fix spelling error in AppRole docs

* Add force flag to sample command to generate a secret ID in AppRole docs

* Update sample output for AppRole login in docs
2016-08-15 16:12:08 -04:00
Jeff Mitchell
edde7d0068 changelog++ 2016-08-15 16:02:06 -04:00
Jeff Mitchell
ed48b008ce Provide base64 keys in addition to hex encoded. (#1734)
* Provide base64 keys in addition to hex encoded.

Accept these at unseal/rekey time.

Also fix a bug where backup would not be honored when doing a rekey with
no operation currently ongoing.
2016-08-15 16:01:15 -04:00
Jeff Mitchell
98d6218cfc
Cut version 0.6.1-rc3 v0.6.1-rc3 2016-08-15 09:54:06 -04:00
Jeff Mitchell
68b2b86073 Bump version 2016-08-15 09:49:18 -04:00
Jeff Mitchell
c7fcc9e0e3 changelog++ 2016-08-15 09:45:23 -04:00
Jeff Mitchell
645540012f Request forwarding (#1721)
Add request forwarding.
2016-08-15 09:42:42 -04:00
Jeff Mitchell
5eaab9f104 Merge pull request #1732 from hashicorp/pre0.6.1-restore-compat
Restore compatibility with pre-0.6.1 servers for CLI/Go API calls
2016-08-15 08:15:11 -04:00
Jeff Mitchell
6eca449261 Parameter change
Both revocation times are UTC so clarify via parameter name that it's just a formatting difference. Also leave as a time.Time here, as it automatically marshals into RFC3339.
2016-08-14 21:43:57 -04:00
Jeff Mitchell
92cb23fc85 Restore compatibility with pre-0.6.1 servers for CLI/Go API calls 2016-08-14 14:52:45 -04:00
Jeff Mitchell
edbe830db9 changelog++ 2016-08-14 07:21:05 -04:00
Jeff Mitchell
3e118a7754 Merge pull request #1725 from hashicorp/periodic-authtokencreate
Add periodic support for root/sudo tokens to auth/token/create
2016-08-14 07:17:38 -04:00
Jeff Mitchell
69d4b6fbde Add another test and fix some output 2016-08-14 07:17:14 -04:00
vishalnayak
1a10df3292 Fix typo. Fixes #1731. 2016-08-14 02:13:46 -04:00