vishalnayak
75937956aa
RabbitMQ docs++
2016-06-14 10:22:30 -04:00
Jeff Mitchell
5b7e6804e1
Add updated wrapping information
2016-06-14 05:59:50 +00:00
Jon Benson
1e61184085
Update aws-ec2.html.md
2016-06-09 23:08:08 -07:00
vishalnayak
4e38509ac2
s/VAULT_GITHUB_AUTH_TOKEN/VAULT_AUTH_GITHUB_TOKEN
2016-06-09 14:00:56 -04:00
vishalnayak
0bea4ff7ff
Added VAULT_GITHUB_AUTH_TOKEN env var to receive GitHub auth token
2016-06-09 13:45:56 -04:00
Jeff Mitchell
9ec71452ce
update sys-health docs with HEAD info
2016-06-09 12:30:23 -04:00
Jeff Mitchell
7479621705
Don't check parsability of a ttl
key on write.
...
On read we already ignore bad values, so we shouldn't be restricting
this on write; doing so alters expected data-in-data-out behavior. In
addition, don't issue a warning if a given `ttl` value can't be parsed,
as this can quickly get annoying if it's on purpose.
The documentation has been updated/clarified to make it clear that this
is optional behavior that doesn't affect the status of the key as POD
and the `lease_duration` returned will otherwise default to the
system/mount defaults.
Fixes #1505
2016-06-08 20:14:36 -04:00
Jeff Mitchell
4ab63c8232
Merge pull request #1504 from hashicorp/token-store-roles-renewability
...
Add renewable flag to token store roles
2016-06-08 15:56:54 -04:00
Laura Bennett
c21ef90dba
Merge pull request #1498 from hashicorp/pki-list
...
PKI List Functionality
2016-06-08 15:42:50 -04:00
Jeff Mitchell
9c6a03ade9
Add renewable flag to token store roles
2016-06-08 15:17:22 -04:00
Laura Bennett
8fb5ca046c
url fix
2016-06-08 14:53:33 -04:00
Jeff Mitchell
15a40fdde5
Add explicit max TTL capability to token creation API
2016-06-08 14:49:48 -04:00
Laura Bennett
2b3f6d59a5
Updates for pki/certs list functionality
2016-06-08 14:37:57 -04:00
Jeff Mitchell
3a5a11529b
Merge pull request #1502 from hashicorp/pr-1425
...
Staging area for me to fix up PR 1425
2016-06-08 12:31:31 -04:00
Jeff Mitchell
708375b999
Update docs
2016-06-08 12:23:04 -04:00
Jeff Mitchell
17ea8c20a4
Update docs with max_parallel
2016-06-08 12:22:18 -04:00
Jeff Mitchell
5136b8c08c
Add permit pool and cleanhttp support to Swift
2016-06-08 12:20:21 -04:00
Jeff Mitchell
8103675f72
Merge remote-tracking branch 'origin/master' into pr-1425
2016-06-08 12:10:29 -04:00
Vishal Nayak
8b15722fb4
Merge pull request #788 from doubledutch/master
...
RabbitMQ Secret Backend
2016-06-08 10:02:24 -04:00
Jeff Mitchell
83771f1e72
Add more entries to the 0.6 upgrade notes
2016-06-06 16:04:02 -04:00
Vinay Hiremath
eae87ca9b8
Small grammatical error
...
"invaliding" => "invalidating"
2016-06-03 11:07:54 -07:00
Jeff Mitchell
4d5686452b
Merge pull request #1324 from hashicorp/sethvargo/doc_gpg
...
Add a page for step-by-step gpg/keybase
2016-06-03 13:24:57 -04:00
Jeff Mitchell
bcf7f3ddb9
Make some updates to PGP documentation
2016-06-03 13:23:20 -04:00
vishalnayak
ab017967e4
Provide option to disable host key checking
2016-06-01 11:08:24 -04:00
vishalnayak
386abbad9e
Address review feedback
2016-06-01 10:36:58 -04:00
vishalnayak
5500df40cb
rename aws.html.md as aws-ec2.html.md
2016-05-30 14:11:15 -04:00
vishalnayak
b3ca9cf14b
Rename aws as aws-ec2
2016-05-30 14:11:15 -04:00
vishalnayak
8ae663f498
Allow * to be set for allowed_users
2016-05-30 03:12:43 -04:00
vishalnayak
c945b8b3f2
Do not allow any username to login if allowed_users is not set
2016-05-30 03:01:47 -04:00
Jeff Mitchell
77981d56aa
Remove reference to cookies altogether
...
Fixes #1437
2016-05-26 09:29:41 -04:00
vishalnayak
ce5152212c
Typo fix: s/Vault/Consul
2016-05-24 18:22:20 -04:00
Seth Vargo
5cfd4b597e
Use updated architecture diagram
...
As much as we love @armon's omnigraffle, this new diagram better matches
the Vault branding 😄 .
2016-05-23 20:10:51 -04:00
Kevin Pike
493f69c657
Update rabbitmq lease docs
2016-05-20 23:28:41 -07:00
Jeff Mitchell
205ba863ea
Add cubbyhole wrapping documentation
2016-05-19 13:33:51 -04:00
Jeff Mitchell
8c3e9c4753
Merge pull request #1318 from steve-jansen/aws-logical-assume-role
...
Add sts:AssumeRole support to the AWS secret backend
2016-05-19 12:17:27 -04:00
Stuart Glenn
5d4fc775b7
Add documentation on Swift backend configuration
2016-05-16 17:29:40 -05:00
Sean Chittenden
339c0a4127
Speling police
2016-05-15 09:58:36 -07:00
Vishal Nayak
943789a11e
Merge pull request #1300 from hashicorp/aws-auth-backend
...
AWS EC2 instances authentication backend
2016-05-14 19:42:03 -04:00
vishalnayak
b53f0cb624
Rename 'role_name' to 'role'
2016-05-13 14:31:13 -04:00
Jeff Mitchell
5bf134a00f
Merge pull request #1407 from z00m1n/patch-1
...
fix PostgreSQL sample code
2016-05-12 17:07:48 -07:00
cmclaughlin
2bc546c55c
Document configuring listener to use a CA cert
2016-05-12 15:34:47 -07:00
Steven Samuel Cole
131108373e
fix PostgreSQL sample code
...
The current sample configuration line fails with `Error initializing backend of type postgresql: failed to check for native upsert: pq: unsupported sslmode "disabled"; only "require" (default), "verify-full", "verify-ca", and "disable" supported`.
2016-05-12 23:22:41 +02:00
vishalnayak
4aa01d390a
Update docs and path names to the new patterns
2016-05-12 11:45:10 -04:00
Jeff Mitchell
67a746be30
Add explicit maximum TTLs to token store roles.
2016-05-11 16:51:18 -04:00
vishalnayak
7a10134f87
Merge branch 'master-oss' into aws-auth-backend
2016-05-10 14:50:00 -04:00
Jeff Mitchell
9de0ea081a
Don't revoke CA certificates with leases.
2016-05-09 19:53:28 -04:00
Jeff Mitchell
3ca09fdf30
Merge pull request #1346 from hashicorp/disable-all-caches
...
Disable all caches
2016-05-07 16:33:45 -04:00
Steve Jansen
69740e57e0
Adds sts:AssumeRole support to the AWS secret backend
...
Support use cases where you want to provision STS tokens
using Vault, but, you need to call AWS APIs that are blocked
for federated tokens. For example, STS federated tokens cannot
invoke IAM APIs, such as Terraform scripts containing
`aws_iam_*` resources.
2016-05-05 23:32:41 -04:00
Jeff Mitchell
50e3f7d40e
Merge remote-tracking branch 'origin/master' into aws-auth-backend
2016-05-05 10:04:52 -04:00
Chris Jansen
0ea77f7dda
Add scala vault library to list of client libs
2016-05-04 18:04:28 +01:00