10543 Commits

Author SHA1 Message Date
Jeff Mitchell
66c226c593
Refactor common token fields and operations into a helper (#5953) 2019-01-30 16:23:28 -05:00
Jeff Mitchell
aa9e55b874 changelog++ 2019-01-30 16:22:25 -05:00
Jeff Mitchell
9e86438ccd Add role ID to token metadata and internal data 2019-01-30 16:17:31 -05:00
Jeff Mitchell
b6f40b5fec Add role_id as an alias name source for AWS and change the defaults 2019-01-30 15:51:45 -05:00
Donald Guy
977ce260ad Docs: Azure auth example using metadata service (#6124)
There are probably better ways to massage this but I think it would be helpful to have something like this included
2019-01-30 12:13:39 -08:00
nathan r. hruby
0bd2337a93
Merge pull request #6130 from hashicorp/nrh/website-gems
Fix Website Gems
2019-01-30 11:58:49 -07:00
nathan r. hruby
4e16a4646d bump dato and rack to fix website builds 2019-01-30 11:10:49 -07:00
Jim Kalafut
bf549d30d2
Add fields to support UI/display uses, along with OpenAPI mappings (#6082) 2019-01-29 15:35:37 -08:00
Matthias Bartelmeß
4894e3b928 Typo in mongodb engine (#6125) 2019-01-29 11:44:45 -08:00
Jeff Mitchell
7043a08b8a Bump Dockerfile Go version 2019-01-29 13:43:29 -05:00
Jeff Mitchell
de380ce624 Allow devel in go version check and bump to 1.11 2019-01-29 11:27:04 -05:00
Matthew Irish
cd2ecf9eba
changelog++ 2019-01-29 09:45:54 -06:00
Matthew Irish
e48d759db2
add entity lookup to the default policy (#6105)
* add entity lookup to the default policy

* only use id for lookup

* back in with name
2019-01-29 09:43:59 -06:00
Jeff Mitchell
de6299c4d0 changelog++ 2019-01-29 00:53:01 -05:00
Noelle Daley
679c09e60f
UI/gate wizard (#6094)
* check for capabilities when finding matching paths

* disable wizard items that user does not have access to

* make hasPermissions accept an array of capabilities

* refactor features-selection

* fix tests

* implement feedback
2019-01-28 14:49:25 -08:00
Brian Shumate
8a1ef9051b Update documentation for command operator unseal (#6117)
- Add migrate command option
2019-01-28 10:27:51 -05:00
Jeff Mitchell
f55dafbf6a Force circonus v2 as directed by them 2019-01-28 10:27:02 -05:00
Jeff Mitchell
6500c3ca0d Update update deps script 2019-01-26 18:43:35 -05:00
Jeff Mitchell
6ffb167199 changelog++ 2019-01-26 16:48:53 -05:00
Gordon Shankman
91a37b23cc Adding support for SSE in the S3 storage backend. (#5996) 2019-01-26 16:48:08 -05:00
Jeff Mitchell
240f7687bc changelog++ 2019-01-25 14:11:58 -05:00
Jeff Mitchell
57a316c271
First part of perf standby entity race fix (#6106) 2019-01-25 14:08:42 -05:00
Jeff Mitchell
655d5f89f2 Move a common block up a level 2019-01-24 18:29:22 -05:00
Calvin Leung Huang
a15ed85273 docs: update agent sample config (#6096) 2019-01-24 07:25:03 -05:00
Becca Petrin
4537210236 Convert MSSQL tests to Docker (#6095)
* create working mssql docker container

* update tests
2019-01-24 07:24:31 -05:00
Jeff Mitchell
905e93480d minor linting change 2019-01-23 17:19:06 -05:00
Jeff Mitchell
98430896dd Fix build 2019-01-23 16:52:51 -05:00
Jeff Mitchell
e774948d24 Fix build 2019-01-23 16:52:06 -05:00
Jeff Mitchell
445924962f changelog++ 2019-01-23 16:35:56 -05:00
Seth Vargo
f0ab6b525e Continuously attempt to unseal if sealed keys are supported (#6039)
* Add helper for checking if an error is a fatal error

The double-double negative was really confusing, and this pattern is used a few places in Vault. This negates the double negative, making the devx a bit easier to follow.

* Check return value of UnsealWithStoredKeys in sys/init

* Return proper error types when attempting unseal with stored key

Prior to this commit, "nil" could have meant unsupported auto-unseal, a transient error, or success. This updates the function to return the correct error type, signaling to the caller whether they should retry or fail.

* Continuously attempt to unseal if sealed keys are supported

This fixes a bug that occurs on bootstrapping an initial cluster. Given a collection of Vault nodes and an initialized storage backend, they will all go into standby waiting for initialization. After one node is initialized, the other nodes had no mechanism by which they "re-check" to see if unseal keys are present. This adds a goroutine to the server command which continually waits for unseal keys to exist. It exits in the following conditions:

- the node is unsealed
- the node does not support stored keys
- a fatal error occurs (as defined by Vault)
- the server is shutting down

In all other situations, the routine wakes up at the specified interval and attempts to unseal with the stored keys.
2019-01-23 16:34:34 -05:00
Jeff Mitchell
345a445430
Prefix path rename (#6089)
* Rename Prefix -> Path in internal struct

* Update test
2019-01-23 15:04:49 -05:00
Jeff Mitchell
583dfdfa03 changelog++ 2019-01-23 14:35:51 -05:00
Jeff Mitchell
a8b3bc9301
Update to latest etcd and use the new repository packages (#6087)
This will be necessary for go mod work

Additionally, the srv api has changed. This adapts to it.
2019-01-23 14:35:03 -05:00
Jeff Mitchell
a878f73d3c
Rename glob -> prefix in ACL internals (#6086)
Really, it's a prefix
2019-01-23 13:55:40 -05:00
Jeff Mitchell
ddc1a66d97 Add missing value to policy ShallowClone
Not related to a bug, just happened to notice it.
2019-01-23 13:20:04 -05:00
Jeff Mitchell
a819de5c29 changelog++ 2019-01-23 12:33:10 -05:00
Jeff Mitchell
5d6f25d569
Implement JWS-compatible signature marshaling (#6077)
This currently only applies to ECDSA signatures, and is a toggleable
option.
2019-01-23 12:31:34 -05:00
Noel Cower
21e062d9d8 Merge all configuration fields (#6028)
This changes (*Config).Merge to merge all fields of a Config.
Previously, when merging Configs, some configuration fields were
ignored and completely lost, including APIAddr, ClusterAddr, and
a couple boolean fields. This only occurs when using multiple config
files and does not affect single config files (even when loading from
a directory -- Merge is only called after a second file is loaded).

- Fix APIAddr not being merged.
- Fix ClusterAddr not being merged.
- Fix DisablePrintableCheck not being merged.
- Fix DisableClustering not being merged. The DisableClusteringRaw
  value is also preserved so that it can be used in overrides for
  storage fields.
- Use merged top-level config as storage field overrides.
- Update config dir test fixtures to set some fields missed by
  (*Config).Merge previously.
2019-01-23 11:27:21 -05:00
Jim Kalafut
bbb9e51d36
Update existing alias metadata during authentication (#6068) 2019-01-23 08:26:50 -08:00
Becca Petrin
516520ab4e swap the forked aliyun sdk for the original (#6024) 2019-01-23 11:24:51 -05:00
Stuart Moore
3b256fe211 Typo fix in gcpckms.go (#6081) 2019-01-23 07:52:31 -05:00
Jeff Mitchell
9747d800ad Sync up code 2019-01-22 17:44:13 -05:00
Jeff Mitchell
114e1c5934 Sync seal testing 2019-01-22 17:23:20 -05:00
Jeff Mitchell
b9a8be5261 Sync logical_system 2019-01-22 17:21:53 -05:00
Jeff Mitchell
67f0b0e328 Update testhelpers to allow passing in custom handler 2019-01-22 17:16:26 -05:00
Clint
79edf2349f
Merge pull request #6070 from gitirabassi/master
Small fixes to docs and indexes for InfluxDB plugin
2019-01-22 12:20:10 -06:00
Thomas L. Kula
8a43842b6d Incredibly tiny comment fix on secret.go (#6078) 2019-01-21 16:57:39 -05:00
Jim Kalafut
fb5eb3509a
Add Sprintf capability to logical.ErrorResponse (#6076)
Roughly 25% of calls to logical.ErrorResponse() include an inner fmt.Sprintf() call.
This PR would simplify these cases:

`return logical.ErrorResponse(fmt.Sprintf("unable to read role '%s'", role))`

  could become

`return logical.ErrorResponse("unable to read role '%s'", role)`

With only a single parameter passed in, behavior is unchanged.
2019-01-18 15:12:38 -08:00
Becca Petrin
794e4e0cb5
Check ec2 instance metadata for region (#6025) 2019-01-18 14:49:24 -08:00
Noelle Daley
20deed3a3d
Add Policy-based Navigation (#5967)
* add permissions service

* start template helper

* match prefixed paths

* gate sidebar links

* land on first page user has access to

* show nav when user first logs in

* clear paths when user logs out

* add tests

* implement feedback

* show all nav items if no policy is found

* update onboarding wizard

* fix some unrelated tests

* add support for namespaces

* gate wizard

* unstage package and lockfile
2019-01-18 14:04:40 -08:00