7782 Commits

Author SHA1 Message Date
Mike
79a884fbe8 Correct endpoint's path in Doc (#4074)
Fix typo in endpoint's path
2018-03-05 07:41:53 -05:00
Lukasz Jagiello
068d8cb974 Vault status formatting (#4073)
```
:~# vault status
Key                     Value
---                     -----
Seal Type               shamir
Sealed                  false
Total Shares            8
Threshold               2
Version                 0.9.5
Cluster Name            vault-cluster-8c85f1aa
Cluster ID              aaaaaaaa-1111-2222-3333-444444444444
HA Enabled              true
HA Cluster              https://10.0.0.1:8201
HA Mode                 standby
Active Node Address:    https://10.0.0.1:8200
```

`Active Node Address:` - is the only one with a colon at the end.

This PR fix that output style issue.
2018-03-05 07:40:59 -05:00
Jeff Mitchell
b7da6a74fd Add the ability for make dev to honor XC_OSARCH 2018-03-03 12:35:36 -05:00
Brian Kassouf
83a7d20b81
logical/framework: add a field data type for parsing integer arrays (#4064)
* logical/framework: add a field data type for parsing integer arrays

* Fix comment

* Add zero value
2018-03-02 15:01:13 -08:00
Jim Kalafut
4c66587fc8
Merge pull request #4063 from hashicorp/update-mount-docs
Change "mount" to "secrets enable" in docs
2018-03-02 14:25:55 -08:00
Jim Kalafut
9a16efe7db Change "mount" to "secrets enable" in docs 2018-03-02 12:54:28 -08:00
Jeff Mitchell
4feb8b4457 Update gitignore 2018-03-02 14:06:36 -05:00
Calvin Leung Huang
01eecf9d1a
Non-HMAC audit values (#4033)
* Add non-hmac request keys

* Update comment

* Initial audit request keys implementation

* Add audit_non_hmac_response_keys

* Move where req.NonHMACKeys gets set

* Minor refactor

* Add params to auth tune endpoints

* Sync cache on loadCredentials

* Explicitly unset req.NonHMACKeys

* Do not error if entry is nil

* Add tests

* docs: Add params to api sections

* Refactor audit.Backend and Formatter interfaces, update audit broker methods

* Add audit_broker.go

* Fix method call params in audit backends

* Remove fields from logical.Request and logical.Response, pass keys via LogInput

* Use data.GetOk to allow unsetting existing values

* Remove debug lines

* Add test for unsetting values

* Address review feedback

* Initialize values in FormatRequest and FormatResponse using input values

* Update docs

* Use strutil.StrListContains

* Use strutil.StrListContains
2018-03-02 12:18:39 -05:00
Jeff Mitchell
90f245995a Document primary_email in Okta mfa path 2018-03-02 11:54:21 -05:00
Jeff Mitchell
9c5e90cb0a Actually add PingID to the index of API pages 2018-03-02 11:49:48 -05:00
Jeff Mitchell
b1239dac18 changelog++ 2018-03-02 11:11:36 -05:00
Joel Thompson
8a115c73d9 auth/aws: Allow lists in binds (#3907)
* auth/aws: Allow lists in binds

In the aws auth method, allow a number of binds to take in lists
instead of a single string value. The intended semantic is that, for
each bind type set, clients must match at least one of each of the bind
types set in order to authenticate.
2018-03-02 11:09:14 -05:00
Jeff Mitchell
4d419aa420 Don't output warning about not storing the token if the user uses
-token-only during `vault login`.
2018-03-01 21:02:54 -05:00
Vishal Nayak
5ede80de1c
update sys/capabilities docs (#4059) 2018-03-01 11:42:39 -05:00
vishalnayak
0893bae243 changelog++ 2018-03-01 11:17:30 -05:00
Jeff Mitchell
e7524b816d Add the ability to use multiple paths for capability checking (#3663)
* Add the ability to use multiple paths for capability checking. WIP
(tests, docs).

Fixes #3336

* Added tests

* added 'paths' field

* Update docs

* return error if paths is not supplied
2018-03-01 11:14:56 -05:00
Jeff Mitchell
d3b7e62a10 changelog++ 2018-03-01 11:09:30 -05:00
Jeff Mitchell
8f2eed8555
Fix confusing error messages around help for 'vault auth' (#4058)
Fixes #4056
2018-03-01 10:55:24 -05:00
Paddy
0cd6c833fe Create a new command/config subpackage. (#4055)
* Create a new command/config subpackage.

This PR extracts the functions associated with loading and parsing
configs, and the DefaultTokenHelper, into a command/config subpackage,
just like TokenHelpers are in the command/token subpackage. The goal is
to allow other clients (in this case, the Vault and Nomad Terraform
providers, but in theory any client that wants to lean on Vault's
default behaviour) to reuse this logic and not drift from Vault, without
vendoring the entirety of Vault.

To retain backwards compatibility, I didn't remove any functions from
the command package; I just copied them into the command/config package,
and update the functions in the command package to call through to the
config package.
2018-02-28 20:09:21 -05:00
Andy Manoske
d21cbe3687
Update index.html.md
Updated for Unbound
2018-02-28 16:20:54 -08:00
Jeff Mitchell
94b5907202 changelog++ 2018-02-28 10:08:28 -05:00
Bharath B
06524611cd Config parameter "tls_disable_client_certs" is wrongly evaluated. (#4049) 2018-02-28 10:07:23 -05:00
Jeff Mitchell
747a8c4a86 Remove structs/mapstructure tags from auth/aws 2018-02-27 15:27:49 -05:00
Jeff Mitchell
6189dc04ff Remove structs package from auth/aws 2018-02-27 13:22:47 -05:00
Jeff Mitchell
f3b93fbfe6 Go 1.9.4 breaks Solaris builds 2018-02-26 18:55:02 -05:00
Jeff Mitchell
0c8d40b82a Fix the version of Go in the Dockerfile 2018-02-26 18:34:14 -05:00
Jeff Mitchell
09c2b6f1c1 changelog++ 2018-02-26 17:20:23 -05:00
Jeff Mitchell
8f328c490a Fix broken link on Consul docs 2018-02-26 13:28:15 -05:00
Jeff Mitchell
36edb4d423
Cut version 0.9.5 v0.9.5 2018-02-26 12:41:14 -05:00
Jeff Mitchell
18a1be4283 It's not a 1.10 thing apparently.
Revert "Revert "Remove netbsd/arm as it won't compile""

This reverts commit 8b43db120c5b3f15723e7ea61edcf0d4c2c7fc9f.
2018-02-26 12:40:49 -05:00
Jeff Mitchell
8b43db120c Revert "Remove netbsd/arm as it won't compile"
This reverts commit 3d4bd6f3cb083e8ee5dac980db58474382a99834.
2018-02-26 12:27:25 -05:00
Jeff Mitchell
3d4f4cdc01 Sync plugins 2018-02-26 12:24:04 -05:00
Jeff Mitchell
e296886cb6 Bump versions in preparation for release 2018-02-26 12:20:19 -05:00
Jeff Mitchell
0bf7b09ab1 changelog++ 2018-02-26 12:17:43 -05:00
Jeff Mitchell
7ff623706e Minor fixes from vet 2018-02-26 02:23:24 -05:00
Jeff Mitchell
25d029f219 Migrate Dockerfile back down to 1.9 2018-02-25 20:29:01 -05:00
vishalnayak
c2812d6761 ssh: clarify optional behavior of cidr_list 2018-02-24 06:55:55 -05:00
vishalnayak
dbb734cde5 changelog++ 2018-02-23 21:30:51 -05:00
Jason
9def33df65 Update CHANGELOG.md (#4035) 2018-02-23 21:28:56 -05:00
Jeff Mitchell
1a6debb115
Use atomic values in seal to avoid some data races (#4040) 2018-02-23 17:18:48 -05:00
Brian Kassouf
559f33c4f2 helper/gpgkeys: fix for vault 1.10 (#4038) 2018-02-23 14:47:25 -05:00
Jeff Mitchell
ec63c193fa
Move local cluster parameters to atomic values to fix some potential data races (#4036) 2018-02-23 14:47:07 -05:00
Brian Kassouf
a46b996496 Port some replicated cluster changes from ent (#4037) 2018-02-23 14:01:15 -05:00
Jeff Mitchell
2769b9fc8f Add core object to policy store for some ent uses 2018-02-23 14:00:46 -05:00
Jeff Mitchell
a84944cce9 changelog++ 2018-02-23 11:16:26 -05:00
chris trott
4987468fba Configurable Consul Service Address (#3971)
* Consul service address is blank

Setting an explicit service address eliminates the ability for Consul
to dynamically decide what it should be based on its translate_wan_addrs
setting.

translate_wan_addrs configures Consul to return its lan address to nodes
in its same datacenter but return its wan address to nodes in foreign
datacenters.

* service_address parameter for Consul storage backend

This parameter allows users to override the use of what Vault knows to
be its HA redirect address.

This option is particularly commpelling because if set to a blank
string, Consul will leverage the node configuration where the service is
registered which includes the `translate_wan_addrs` option. This option
conditionally associates nodes' lan or wan address based on where
requests originate.

* Add TestConsul_ServiceAddress

Ensures that the service_address configuration parameter is setting the
serviceAddress field of ConsulBackend instances properly.

If the "service_address" parameter is not set, the ConsulBackend
serviceAddress field must instantiate as nil to indicate that it can be
ignored.
2018-02-23 11:15:29 -05:00
Jeff Mitchell
483da4a3af Fix certutil test 2018-02-23 01:35:07 -05:00
Yoko
39e0422b76
Fixed a broken link (#4032) 2018-02-22 19:43:27 -08:00
Jeff Mitchell
add7d19433 Update comment to replication consts 2018-02-22 21:38:52 -05:00
Jeff Mitchell
08d64c01ab Add a helpful comment to replication consts 2018-02-22 21:37:54 -05:00