Seth Vargo
624acb34b0
Add note about paid training
2016-05-16 16:45:02 -04:00
Sean Chittenden
339c0a4127
Speling police
2016-05-15 09:58:36 -07:00
Vishal Nayak
943789a11e
Merge pull request #1300 from hashicorp/aws-auth-backend
...
AWS EC2 instances authentication backend
2016-05-14 19:42:03 -04:00
vishalnayak
b53f0cb624
Rename 'role_name' to 'role'
2016-05-13 14:31:13 -04:00
Jeff Mitchell
5bf134a00f
Merge pull request #1407 from z00m1n/patch-1
...
fix PostgreSQL sample code
2016-05-12 17:07:48 -07:00
cmclaughlin
2bc546c55c
Document configuring listener to use a CA cert
2016-05-12 15:34:47 -07:00
Steven Samuel Cole
131108373e
fix PostgreSQL sample code
...
The current sample configuration line fails with `Error initializing backend of type postgresql: failed to check for native upsert: pq: unsupported sslmode "disabled"; only "require" (default), "verify-full", "verify-ca", and "disable" supported`.
2016-05-12 23:22:41 +02:00
vishalnayak
4aa01d390a
Update docs and path names to the new patterns
2016-05-12 11:45:10 -04:00
Jeff Mitchell
67a746be30
Add explicit maximum TTLs to token store roles.
2016-05-11 16:51:18 -04:00
vishalnayak
7a10134f87
Merge branch 'master-oss' into aws-auth-backend
2016-05-10 14:50:00 -04:00
Jeff Mitchell
9de0ea081a
Don't revoke CA certificates with leases.
2016-05-09 19:53:28 -04:00
Jeff Mitchell
3ca09fdf30
Merge pull request #1346 from hashicorp/disable-all-caches
...
Disable all caches
2016-05-07 16:33:45 -04:00
Jeff Mitchell
50e3f7d40e
Merge remote-tracking branch 'origin/master' into aws-auth-backend
2016-05-05 10:04:52 -04:00
Chris Jansen
0ea77f7dda
Add scala vault library to list of client libs
2016-05-04 18:04:28 +01:00
Jeff Mitchell
37d425f873
Update website docs re token store role period parsing
2016-05-04 02:17:20 -04:00
vishalnayak
ef83605f58
Change image/ to a more flexible /role endpoint
2016-05-03 23:36:59 -04:00
Jeff Mitchell
b18854be70
Plumb disabling caches through the policy store
2016-05-02 22:36:44 -04:00
vishalnayak
7945e4668a
Allow custom endpoint URLs to be supplied to make EC2 API calls
2016-05-02 17:21:52 -04:00
Seth Vargo
84229a5756
Track enhanced links
2016-05-02 15:57:23 -04:00
Jeff Mitchell
7fd49439f6
Merge branch 'master-oss' into aws-auth-backend
2016-04-29 14:23:16 +00:00
Jeff Mitchell
a0db3f10dc
Fix fetching parameters in token store when it's optionally in the URL
2016-04-28 15:15:37 -04:00
vishalnayak
0b44a62e8f
Added allow_instance_migration to the role tag
2016-04-28 11:43:48 -04:00
vishalnayak
a2c024ff96
Updated docs
2016-04-28 11:25:47 -04:00
vishalnayak
329361f951
Removed existence check on blacklist/roletags, docs fixes
2016-04-27 21:29:32 -04:00
vishalnayak
06a174c2f0
tidy endpoint fixes
2016-04-26 10:22:29 -04:00
vishalnayak
4f46bbaa32
Added cooldown period for periodic tidying operation
2016-04-26 10:22:29 -04:00
vishalnayak
7c39fffe0d
Removed redundant AWS public certificate. Docs update.
2016-04-26 10:22:29 -04:00
vishalnayak
cd3e9e3b5b
Support providing multiple certificates.
...
Append all the certificates to the PKCS#7 parser during signature verification.
2016-04-26 10:22:29 -04:00
Jeff Mitchell
1e50a88e6b
Updating to docs
2016-04-26 10:22:29 -04:00
vishalnayak
9a988ffdee
Docs update
2016-04-26 10:22:29 -04:00
Sean Chittenden
00d1e5abd7
Change to the pre-0.6.4 Consul Check API
...
Consul is never going to pass in more than 1K of output. This mitigates the pre-0.6.4 concern.
2016-04-25 18:01:13 -07:00
Sean Chittenden
f1c170e003
Add a small bit of wording re: disable_registration
...
Consul service registration for Vault requires Consul 0.6.4.
2016-04-25 18:01:13 -07:00
Sean Chittenden
529f3e50c4
Provide documentation and example output
2016-04-25 18:01:13 -07:00
Sean Chittenden
53dd43650e
Various refactoring to clean up code organization
...
Brought to you by: Dept of 2nd thoughts before pushing enter on `git push`
2016-04-25 18:01:13 -07:00
Sean Chittenden
f2dc2f636e
Comment nits
2016-04-25 18:00:54 -07:00
Jeff Mitchell
a036704426
Merge pull request #1266 from sepiroth887/azure_backend
...
added Azure Blobstore backend support
2016-04-25 15:53:09 -04:00
Jeff Mitchell
6e1288d23f
Merge pull request #1282 from rileytg/patch-1
...
change github example team to admins
2016-04-25 15:45:01 -04:00
Seth Vargo
c3a5bf11d4
Do not allow referrer to modify the parent
...
http://mathiasbynens.github.io/rel-noopener/
2016-04-22 23:41:09 -04:00
Sean Chittenden
8611270e58
Wordsmith the docs around the list
command.
...
Prompted by: feedback from conference attendees at PGConf '16
2016-04-20 18:13:58 -04:00
Jeff Mitchell
b44d2c01c0
Use UseNumber() on json.Decoder to have numbers be json.Number objects
...
instead of float64. This fixes some display bugs.
2016-04-20 18:38:20 +00:00
Jeff Mitchell
ccce78a6d0
Add vault-php-sdk to libraries page
2016-04-20 13:59:39 +00:00
Jeff Mitchell
e702a63320
Backtick "region" in S3 config
2016-04-15 17:03:35 -04:00
vishalnayak
e53b9dbadb
Provide clarity for output statements of idempotent calls.
2016-04-14 15:46:45 +00:00
vishalnayak
691052c3f4
Clarify token-revoke operation
2016-04-14 15:34:01 +00:00
Seth Vargo
f170066c19
Clarify delete operation
...
One thing that has been a point of confusion for users is Vault's
response when deleting a key that does not actually exist in the system.
For example, consider:
$ vault delete secret/foo
Success! Deleted 'secret/foo'
This message is misleading if the secret does not exist, especially if
the same command is run twice in a row.
Obviously the reason for this is clear - returning an error if a secret
does not exist would reveal the existence of a secret (the same reason
everything on S3 is a 403 or why GitHub repos 404 instead of 403 if you
do not have permission to view them).
I think we can make the UX a little bit better by adding just a few
words to the output:
$ vault delete secret/foo
Success! Deleted 'secret/foo' if it existed
This makes it clear that the operation was only performed if the secret
existed, but it does not reveal any more information.
2016-04-14 10:38:10 +01:00
Jeff Mitchell
110c483ffc
Update cert website docs
2016-04-13 16:28:23 +00:00
Simon Dick
5f936c4a07
Should be renew not revoke
2016-04-12 14:04:26 +01:00
Adam Kunicki
08af95b9e0
Add unofficial client library written in Kotlin
...
I've been working on a Vault client written in Kotlin. Still a work in progress but will soon be on-par with the official Ruby client.
2016-04-11 09:37:42 -07:00
Christopher "Chief" Najewicz
14ae646878
Update github doc with note about slugifying team
2016-04-10 11:11:40 -04:00
Sean Chittenden
4e6d8b9e70
Merge pull request #1297 from hashicorp/f-bsd-mlock
...
F bsd mlock
2016-04-06 13:57:34 -07:00