root
e77652d15d
adding IAM Role as constrain
2016-06-14 14:49:36 +00:00
vishalnayak
75937956aa
RabbitMQ docs++
2016-06-14 10:22:30 -04:00
Jeff Mitchell
d2d0aa07d0
Cut version 0.6.0-rebuild
v0.6.0-rebuild
2016-06-14 13:29:26 +00:00
Jeff Mitchell
106083ddf8
Bump tf script
2016-06-14 13:28:04 +00:00
Jeff Mitchell
39ae408ddc
Bump version in ChangeLog
2016-06-14 13:26:35 +00:00
Jeff Mitchell
4b8481b5dd
Bump version and remove --all behavior from dist script
2016-06-14 13:25:44 +00:00
Jeff Mitchell
f627c01df8
Cut version 0.6.0
v0.6.0
2016-06-14 07:51:08 +00:00
Jeff Mitchell
5b7e6804e1
Add updated wrapping information
2016-06-14 05:59:50 +00:00
Jeff Mitchell
926e56eff0
Merge pull request #1520 from hashicorp/wrapinfo-accessor
...
Add token accessor to wrap information if one exists
2016-06-14 01:54:17 -04:00
Jeff Mitchell
65cdcd6799
Add some commenting
2016-06-14 05:54:09 +00:00
Jeff Mitchell
47dc1ccd25
Add token accessor to wrap information if one exists
2016-06-13 23:58:17 +00:00
Vishal Nayak
4f039d0427
Merge pull request #1518 from hashicorp/fix-bound-ami-id
...
Added bound_ami_id check in login procedure of aws-ec2
2016-06-13 09:37:44 -04:00
vishalnayak
e5218943a8
Added bound_ami_id check
2016-06-13 08:56:39 -04:00
vishalnayak
adbfef8561
Allow reading of config in sql backends
2016-06-11 11:48:40 -04:00
vishalnayak
cfe0aa860e
Backend() functions should return 'backend' objects.
...
If they return pointers to 'framework.Backend' objects, the receiver functions can't be tested.
2016-06-10 15:53:02 -04:00
Jeff Mitchell
117200c88a
Fix mah broken tests
2016-06-10 14:03:56 -04:00
Jeff Mitchell
c6ded383cb
cubbyhole-response-wrapping -> response-wrapping
2016-06-10 13:48:46 -04:00
Vishal Nayak
1e67cd8935
Merge pull request #1513 from hashicorp/field-data-get-default
...
Added GetDefaultOrZero method to FieldData
2016-06-10 11:03:01 -04:00
vishalnayak
583c968971
Added GetDefaultOrZero method to FieldData
2016-06-10 10:42:01 -04:00
Jeff Mitchell
a1adb4081f
Merge pull request #1512 from hashicorp/b-aws-ec2-auth
...
Update aws-ec2 auth backend docs
2016-06-10 06:46:55 -04:00
Jon Benson
1e61184085
Update aws-ec2.html.md
2016-06-09 23:08:08 -07:00
vishalnayak
4e38509ac2
s/VAULT_GITHUB_AUTH_TOKEN/VAULT_AUTH_GITHUB_TOKEN
2016-06-09 14:00:56 -04:00
Jeff Mitchell
4e622714e9
changelog++
2016-06-09 13:58:10 -04:00
Jeff Mitchell
ed82efbccc
Merge pull request #1510 from hashicorp/fix-gh-renew-panic
...
Fix panic when renewing a github token from a previous version of Vault
2016-06-09 13:54:20 -04:00
Jeff Mitchell
6c76bcd3b6
xInt->xRaw
2016-06-09 13:54:04 -04:00
Vishal Nayak
46669ac5bb
Merge pull request #1511 from hashicorp/github-auth-env
...
VAULT_GITHUB_AUTH_TOKEN env var to receive GitHub auth token
2016-06-09 13:53:41 -04:00
vishalnayak
0bea4ff7ff
Added VAULT_GITHUB_AUTH_TOKEN env var to receive GitHub auth token
2016-06-09 13:45:56 -04:00
Jeff Mitchell
99235e83c7
Fix panic when renewing a github token from a previous version of Vault
2016-06-09 13:37:09 -04:00
Jeff Mitchell
d12bbd7066
changelog++
2016-06-09 12:31:07 -04:00
Jeff Mitchell
9ec71452ce
update sys-health docs with HEAD info
2016-06-09 12:30:23 -04:00
Jeff Mitchell
f03655053a
Merge pull request #1509 from dstelter/head_health
...
Support HEAD requests to /v1/sys/health
2016-06-09 12:27:54 -04:00
Daniel Stelter-Gliese
f63098bb21
Support HEAD requests to /v1/sys/health
...
Some load balancers send HTTP HEAD requests to extract the status code.
2016-06-09 18:16:28 +02:00
Jeff Mitchell
70c9503074
Merge pull request #1506 from hashicorp/dont-validate-ttl-on-write
...
Don't check parsability of a `ttl` key on write.
2016-06-09 10:33:53 -04:00
Jeff Mitchell
8c04db85c1
Remove unneeded Fields in passthrough
2016-06-09 10:33:24 -04:00
Jeff Mitchell
7479621705
Don't check parsability of a ttl
key on write.
...
On read we already ignore bad values, so we shouldn't be restricting
this on write; doing so alters expected data-in-data-out behavior. In
addition, don't issue a warning if a given `ttl` value can't be parsed,
as this can quickly get annoying if it's on purpose.
The documentation has been updated/clarified to make it clear that this
is optional behavior that doesn't affect the status of the key as POD
and the `lease_duration` returned will otherwise default to the
system/mount defaults.
Fixes #1505
2016-06-08 20:14:36 -04:00
Jeff Mitchell
6751592b3a
Cut version 0.6.0-rc1
v0.6.0-rc1
2016-06-08 16:24:58 -04:00
Jeff Mitchell
4c6d6a539f
Remove filtering that seems to be no longer needed in vendor build tags
2016-06-08 16:24:48 -04:00
Jeff Mitchell
4fef72807e
Update deps, this time removing appengine/go1.7 filter
2016-06-08 16:23:42 -04:00
Jeff Mitchell
fb8817896d
Update deps
2016-06-08 16:14:05 -04:00
Jeff Mitchell
4ab63c8232
Merge pull request #1504 from hashicorp/token-store-roles-renewability
...
Add renewable flag to token store roles
2016-06-08 15:56:54 -04:00
Jeff Mitchell
527e6b91cc
changelog++
2016-06-08 15:50:24 -04:00
Laura Bennett
c21ef90dba
Merge pull request #1498 from hashicorp/pki-list
...
PKI List Functionality
2016-06-08 15:42:50 -04:00
Jeff Mitchell
da70b0fd99
Update version to rc1
2016-06-08 15:40:13 -04:00
Jeff Mitchell
bedb0f4c7a
changelog++
2016-06-08 15:37:34 -04:00
Jeff Mitchell
faf11b3e33
Merge pull request #1503 from hashicorp/explicit-max-token-create
...
Add explicit max TTL capability to token creation API
2016-06-08 15:34:06 -04:00
Jeff Mitchell
a9e36480d0
Make out-of-bounds explicit max a cap+warning instead of an error
2016-06-08 15:25:17 -04:00
Jeff Mitchell
9c6a03ade9
Add renewable flag to token store roles
2016-06-08 15:17:22 -04:00
Laura Bennett
8fb5ca046c
url fix
2016-06-08 14:53:33 -04:00
Jeff Mitchell
15a40fdde5
Add explicit max TTL capability to token creation API
2016-06-08 14:49:48 -04:00
Laura Bennett
2b3f6d59a5
Updates for pki/certs list functionality
2016-06-08 14:37:57 -04:00