10305 Commits

Author SHA1 Message Date
Jeff Mitchell
f47cafacf8 changelog++ 2018-12-14 09:22:55 -05:00
Jeff Mitchell
ca55573d38
Strip empty strings from database revocation stmts (#5955)
* Strip empty strings from database revocation stmts

It's technically valid to give empty strings as statements to run on
most databases. However, in the case of revocation statements, it's not
only generally inadvisable but can lead to lack of revocations when you
expect them. This strips empty strings from the array of revocation
statements.

It also makes two other changes:

* Return statements on read as empty but valid arrays rather than nulls,
so that typing information is inferred (this is more in line with the
rest of Vault these days)

* Changes field data for TypeStringSlice and TypeCommaStringSlice such
that a client-supplied value of `""` doesn't turn into `[]string{""}`
but rather `[]string{}`.

The latter and the explicit revocation statement changes are related,
and defense in depth.
2018-12-14 09:12:26 -05:00
Matthew Irish
36b96f7ddb update help output examples and mention openapi fragment support (#5954) 2018-12-14 09:12:03 -05:00
Jeff Mitchell
0ddc104ba3 Bump dockerfile Go version 2018-12-14 09:10:32 -05:00
Brian Kassouf
0feb99acb6
changelog++ 2018-12-13 16:46:41 -08:00
Brian Kassouf
70084e2234
Default seal type to Shamir on older seal configs (#5956) 2018-12-13 16:44:56 -08:00
Jeff Mitchell
dd459e0d16 Update Consul ACL example
Fixes #5831
2018-12-13 17:18:28 -05:00
Hugues Malphettes
66e66a1b6c
Merge branch 'master' into master 2018-12-14 05:21:41 +08:00
Jeff Mitchell
4c735a35d2 Add sidebar link for approle autoauth docs 2018-12-13 09:51:47 -05:00
Matthew Irish
d59e8127d4
changelog++ 2018-12-12 16:55:30 -06:00
Matthew Irish
1354d43056
add an auth-config adapter for jwt so that configs can be saved properly (#5936)
* add an auth-config adapter for jwt so that configs can be saved properly

* unskip some tests and add a test for jwt config

* linting
2018-12-12 16:53:45 -06:00
Hugues Malphettes
b8dbdea6a6
JWT API - List Roles: fix the path
With vault-1.0.0 and vault-0.11.4 a different path is needed to list the jwt registered roles:

```
$ vault list auth/jwt/roles
No value found at auth/jwt/roles/

$ vault list auth/jwt/role
Keys
----
myrole
```
I hope this helps!
2018-12-13 06:27:30 +08:00
Jim Kalafut
b76888bae2
changelog++ 2018-12-12 14:03:44 -08:00
Jim Kalafut
ffb61ea5f7
Add operationId field to OpenAPI output (#5876)
Fixes #5842
2018-12-12 13:59:23 -08:00
Jeff Mitchell
de1fa7a467 changelog++ 2018-12-12 15:39:06 -05:00
Lukasz Jagiello
6dc872cd10 Remove an empty line for /pki/ca_chain (#5779)
This PR fix #5778.

Easy test case to reproduce the problem:
https://play.golang.org/p/CAMdrOHT7C1

Since `certStr` is empty string during first iteration `strings.Join()`
will merge empty line with first CA cert.

Extra `strings.TrimSpace` call will remove that empty line, before
certificate will be return.
2018-12-12 15:38:35 -05:00
Jeff Mitchell
b701df4757 Update backwards compat fix from 5913 2018-12-12 15:36:28 -05:00
Nándor István Krácser
dbd195f895 Fix list plugins backward compatibility mechanism (#5913) 2018-12-12 15:33:09 -05:00
Jeff Mitchell
227997ec8e changelog++ 2018-12-12 15:30:36 -05:00
Brian Kassouf
19853770fc
changelog++ 2018-12-12 12:28:54 -08:00
Sergey Trasko
aeeed85f33 Fixed markdown for cert documentation (#5735) 2018-12-12 15:27:28 -05:00
Jeff Mitchell
969458ad8f changelog++ 2018-12-12 15:26:48 -05:00
Calvin Leung Huang
7ac17d69c0 cli/json: correctly output the number of key shares and threshold on stored keys (#5910) 2018-12-12 15:26:11 -05:00
Joel Thompson
e366aeb2e3 auth/aws: Clarify docs for cross-account access with IAM auth (#5900)
The docs hadn't been updated to reflect the ability to do cross-account
AWS IAM auth, and so it was a bit confusing as to whether that was
supported. This removes the ambiguity by explicitly mentioning AWS IAM
principals.
2018-12-12 15:21:27 -05:00
Jeff Mitchell
0a1ba70427 Merge branch 'master' of https://github.com/hashicorp/vault into master-oss 2018-12-12 15:16:50 -05:00
Jeff Mitchell
ea06a6f45b changelog++ 2018-12-12 15:08:42 -05:00
Chris Hoffman
436b834c11 adding -dev-kv-v1 flag for forcing kvv1 (#5919) 2018-12-12 12:07:18 -08:00
Þórhallur Sverrisson
8bdd74cfe6 Remove DEL characters from password input (#5837)
* Remove DEL characters from password input

iTerm password manager sends \x03\0x7f before sending a password
from its password manager to make sure the password is not being
echoed to the screen.  Unfortunately, vault login does not handle
the Space DEL sequence, causing the login to fail when using the
password manager.  This patch uses a simple method to delete the
sequence if present anywhere in the string, although it is strictly
only needed at the start of input.

* Simplify iTerm handling to only remove iTerm prefix

The logic now only removes the two byte prefix sent in by iTerm
instead of trying to remove all deletes in the string.

This has been tested to work with the iTerm password manager.

As a small correction, the byte sequence is \x20\x7f.  The
earlier commit message incorrectly stated it was \x03\x7f.
2018-12-12 15:06:10 -05:00
Noelle Daley
f075ed5d40
return correct format of random data generator (#5945) 2018-12-12 11:05:37 -08:00
Bert Roos
426016d99f Added comma for readability (#5941)
Signed-off-by: Bert Roos <Bert-R@users.noreply.github.com>
2018-12-12 09:23:20 -05:00
Graham Land
2afefe6f1c Fixing a couple of small typos (#5942) 2018-12-12 05:56:58 -08:00
Brian Kassouf
4511832bdf
Fix plugin reload when in a namespace (#5937) 2018-12-11 17:21:23 -08:00
Jeff Escalante
9b4156c94a improve bootstrap script and local development instructions 2018-12-11 19:46:52 -05:00
Jeff Mitchell
cc02c26af5 Fix tests 2018-12-11 15:04:02 -05:00
Jeff Mitchell
737a26d156 changelog++ 2018-12-11 11:29:16 -05:00
Jeff Mitchell
e5ffd6a2ca
Properly continue if cert entry is nil when tidying (#5933)
Fixes #5931
2018-12-11 11:28:14 -05:00
emily
12e3cf5c48 Update GCP auth BE docs (#5753)
Documented changes from https://github.com/hashicorp/vault-plugin-auth-gcp/pull/55
* Deprecating `project_id` for `bound_projects` and making it optional
* Deprecating `google_certs_endpoint` (unused)
* Adding group aliases 

Also, some general reformatting
2018-12-10 12:54:18 -08:00
madalynrose
3a1cb8f636
Update CHANGELOG.md 2018-12-10 12:14:51 -05:00
madalynrose
b4edf515be
Search select (#5851) 2018-12-10 11:44:37 -05:00
Jeff Mitchell
516827962c
Update PKI docs (#5929) 2018-12-10 10:24:47 -05:00
Tommy Murphy
1a7cd116a7 Correct GCE Token Parameter (#5667)
As written the GCE token curl results in an error: "non-empty audience parameter required".

Google's docs (https://cloud.google.com/compute/docs/instances/verifying-instance-identity) confirm that the parameter is 'audience' not 'aud'.
2018-12-07 15:10:30 -08:00
Noelle Daley
eef531445b
mask password on ldap auth form (#5898) 2018-12-07 13:23:42 -08:00
Matthew Irish
993166d472
changelog++ 2018-12-07 14:02:58 -06:00
Matthew Irish
6414fc32bf
UI - web cli layout (#5909)
* move console/ui-panel into nav-header component

* notch-specific CSS

* add layout test in the application for the console
2018-12-07 14:00:52 -06:00
Matthew Irish
af78f40cf8
change ui url so that it includes the trailing slash (#5890) 2018-12-05 12:25:16 -06:00
Chris Hoffman
c49d7ace7f
fixing redirect (#5908) 2018-12-05 12:06:15 -05:00
Chris Hoffman
ef4e5103e9
adding a redirect for old style upgrade guide location (#5905) 2018-12-05 10:54:10 -05:00
Chris Hoffman
a05d2a7aba
removing beta tag (#5904) 2018-12-05 10:45:22 -05:00
Jim Kalafut
d05a8df8f7 Update downloads.html.erb (#5899) 2018-12-05 10:40:33 -05:00
Chris Hoffman
579808ffd2
adding upgrade guide for 1.0 (#5903)
* adding upgrade guide for 1.0

* fixing sidebar
2018-12-05 10:33:53 -05:00