7782 Commits

Author SHA1 Message Date
root
e77652d15d adding IAM Role as constrain 2016-06-14 14:49:36 +00:00
vishalnayak
75937956aa RabbitMQ docs++ 2016-06-14 10:22:30 -04:00
Jeff Mitchell
d2d0aa07d0
Cut version 0.6.0-rebuild v0.6.0-rebuild 2016-06-14 13:29:26 +00:00
Jeff Mitchell
106083ddf8 Bump tf script 2016-06-14 13:28:04 +00:00
Jeff Mitchell
39ae408ddc Bump version in ChangeLog 2016-06-14 13:26:35 +00:00
Jeff Mitchell
4b8481b5dd Bump version and remove --all behavior from dist script 2016-06-14 13:25:44 +00:00
Jeff Mitchell
f627c01df8
Cut version 0.6.0 v0.6.0 2016-06-14 07:51:08 +00:00
Jeff Mitchell
5b7e6804e1 Add updated wrapping information 2016-06-14 05:59:50 +00:00
Jeff Mitchell
926e56eff0 Merge pull request #1520 from hashicorp/wrapinfo-accessor
Add token accessor to wrap information if one exists
2016-06-14 01:54:17 -04:00
Jeff Mitchell
65cdcd6799 Add some commenting 2016-06-14 05:54:09 +00:00
Jeff Mitchell
47dc1ccd25 Add token accessor to wrap information if one exists 2016-06-13 23:58:17 +00:00
Vishal Nayak
4f039d0427 Merge pull request #1518 from hashicorp/fix-bound-ami-id
Added bound_ami_id check in login procedure of aws-ec2
2016-06-13 09:37:44 -04:00
vishalnayak
e5218943a8 Added bound_ami_id check 2016-06-13 08:56:39 -04:00
vishalnayak
adbfef8561 Allow reading of config in sql backends 2016-06-11 11:48:40 -04:00
vishalnayak
cfe0aa860e Backend() functions should return 'backend' objects.
If they return pointers to 'framework.Backend' objects, the receiver functions can't be tested.
2016-06-10 15:53:02 -04:00
Jeff Mitchell
117200c88a Fix mah broken tests 2016-06-10 14:03:56 -04:00
Jeff Mitchell
c6ded383cb cubbyhole-response-wrapping -> response-wrapping 2016-06-10 13:48:46 -04:00
Vishal Nayak
1e67cd8935 Merge pull request #1513 from hashicorp/field-data-get-default
Added GetDefaultOrZero method to FieldData
2016-06-10 11:03:01 -04:00
vishalnayak
583c968971 Added GetDefaultOrZero method to FieldData 2016-06-10 10:42:01 -04:00
Jeff Mitchell
a1adb4081f Merge pull request #1512 from hashicorp/b-aws-ec2-auth
Update aws-ec2 auth backend docs
2016-06-10 06:46:55 -04:00
Jon Benson
1e61184085 Update aws-ec2.html.md 2016-06-09 23:08:08 -07:00
vishalnayak
4e38509ac2 s/VAULT_GITHUB_AUTH_TOKEN/VAULT_AUTH_GITHUB_TOKEN 2016-06-09 14:00:56 -04:00
Jeff Mitchell
4e622714e9 changelog++ 2016-06-09 13:58:10 -04:00
Jeff Mitchell
ed82efbccc Merge pull request #1510 from hashicorp/fix-gh-renew-panic
Fix panic when renewing a github token from a previous version of Vault
2016-06-09 13:54:20 -04:00
Jeff Mitchell
6c76bcd3b6 xInt->xRaw 2016-06-09 13:54:04 -04:00
Vishal Nayak
46669ac5bb Merge pull request #1511 from hashicorp/github-auth-env
VAULT_GITHUB_AUTH_TOKEN env var to receive GitHub auth token
2016-06-09 13:53:41 -04:00
vishalnayak
0bea4ff7ff Added VAULT_GITHUB_AUTH_TOKEN env var to receive GitHub auth token 2016-06-09 13:45:56 -04:00
Jeff Mitchell
99235e83c7 Fix panic when renewing a github token from a previous version of Vault 2016-06-09 13:37:09 -04:00
Jeff Mitchell
d12bbd7066 changelog++ 2016-06-09 12:31:07 -04:00
Jeff Mitchell
9ec71452ce update sys-health docs with HEAD info 2016-06-09 12:30:23 -04:00
Jeff Mitchell
f03655053a Merge pull request #1509 from dstelter/head_health
Support HEAD requests to /v1/sys/health
2016-06-09 12:27:54 -04:00
Daniel Stelter-Gliese
f63098bb21 Support HEAD requests to /v1/sys/health
Some load balancers send HTTP HEAD requests to extract the status code.
2016-06-09 18:16:28 +02:00
Jeff Mitchell
70c9503074 Merge pull request #1506 from hashicorp/dont-validate-ttl-on-write
Don't check parsability of a `ttl` key on write.
2016-06-09 10:33:53 -04:00
Jeff Mitchell
8c04db85c1 Remove unneeded Fields in passthrough 2016-06-09 10:33:24 -04:00
Jeff Mitchell
7479621705 Don't check parsability of a ttl key on write.
On read we already ignore bad values, so we shouldn't be restricting
this on write; doing so alters expected data-in-data-out behavior. In
addition, don't issue a warning if a given `ttl` value can't be parsed,
as this can quickly get annoying if it's on purpose.

The documentation has been updated/clarified to make it clear that this
is optional behavior that doesn't affect the status of the key as POD
and the `lease_duration` returned will otherwise default to the
system/mount defaults.

Fixes #1505
2016-06-08 20:14:36 -04:00
Jeff Mitchell
6751592b3a
Cut version 0.6.0-rc1 v0.6.0-rc1 2016-06-08 16:24:58 -04:00
Jeff Mitchell
4c6d6a539f Remove filtering that seems to be no longer needed in vendor build tags 2016-06-08 16:24:48 -04:00
Jeff Mitchell
4fef72807e Update deps, this time removing appengine/go1.7 filter 2016-06-08 16:23:42 -04:00
Jeff Mitchell
fb8817896d Update deps 2016-06-08 16:14:05 -04:00
Jeff Mitchell
4ab63c8232 Merge pull request #1504 from hashicorp/token-store-roles-renewability
Add renewable flag to token store roles
2016-06-08 15:56:54 -04:00
Jeff Mitchell
527e6b91cc changelog++ 2016-06-08 15:50:24 -04:00
Laura Bennett
c21ef90dba Merge pull request #1498 from hashicorp/pki-list
PKI List Functionality
2016-06-08 15:42:50 -04:00
Jeff Mitchell
da70b0fd99 Update version to rc1 2016-06-08 15:40:13 -04:00
Jeff Mitchell
bedb0f4c7a changelog++ 2016-06-08 15:37:34 -04:00
Jeff Mitchell
faf11b3e33 Merge pull request #1503 from hashicorp/explicit-max-token-create
Add explicit max TTL capability to token creation API
2016-06-08 15:34:06 -04:00
Jeff Mitchell
a9e36480d0 Make out-of-bounds explicit max a cap+warning instead of an error 2016-06-08 15:25:17 -04:00
Jeff Mitchell
9c6a03ade9 Add renewable flag to token store roles 2016-06-08 15:17:22 -04:00
Laura Bennett
8fb5ca046c url fix 2016-06-08 14:53:33 -04:00
Jeff Mitchell
15a40fdde5 Add explicit max TTL capability to token creation API 2016-06-08 14:49:48 -04:00
Laura Bennett
2b3f6d59a5 Updates for pki/certs list functionality 2016-06-08 14:37:57 -04:00