Jeff Mitchell
600ba51eb6
Merge pull request #1289 from steve-jansen/patch-1
...
Fix typo in iam permission for STS
2016-04-05 08:37:12 -04:00
Mark Mickan
8deed677d2
Ensure authorized_keys file is readable when uninstalling an ssh key
...
Without this change, if the user running the ssh key install script doesn't
have read access to the authorized_keys file when uninstalling a key, all
keys will be deleted from the authorized_keys file.
Fixes GH #1285
2016-04-05 17:26:21 +09:30
Steve Jansen
03da496bd2
Adds note on GH-1102 fix to secret/aws doc
...
Add note related to #1102 , which leads to a non-obvious AWS error message on 0.5.0 or earlier.
2016-04-04 21:30:41 -04:00
Steve Jansen
64b472dc57
Fix typo in iam permission for STS
2016-04-04 21:20:26 -04:00
Jeff Mitchell
f59cb0c501
Sync some seal stuff
2016-04-04 13:46:33 -04:00
Jeff Mitchell
ab93e3aa63
SealInterface
2016-04-04 10:44:22 -04:00
Jeff Mitchell
3bb3e9165d
changelog++
2016-04-02 13:34:05 -04:00
Jeff Mitchell
f5f9c098b7
Some fixups around error/warning in LDAP
2016-04-02 13:33:00 -04:00
Jeff Mitchell
3e5fe09dd0
Merge pull request #1283 from hashicorp/ldap-nogroupdn-warn
...
If no group DN is configured, still look for policies on local users and
2016-04-02 13:13:27 -04:00
Jeff Mitchell
aca4e79ac6
If no group DN is configured, still look for policies on local users and
...
return a warning, rather than just trying to do an LDAP search on an
empty string.
2016-04-02 13:11:36 -04:00
Jeff Mitchell
02be26e4ae
Fix up the meta common options text function to not strip leading space and fix up commands
2016-04-01 16:50:12 -04:00
Jeff Mitchell
16c8f0b5ad
Remove config from Meta; it's only used right now with the token helper.
2016-04-01 16:02:18 -04:00
Jeff Mitchell
48da40964c
Move token helper out of meta
2016-04-01 14:23:15 -04:00
Jeff Mitchell
33326b30c3
Move meta into its own package
2016-04-01 13:16:05 -04:00
Riley Guerin
e62254a565
fix typo
2016-04-01 07:49:25 -07:00
Riley Guerin
5061b670db
change github example team to admins
...
somewhat recently github has gone away from the previous model of an "owners" team
https://help.github.com/articles/converting-your-previous-owners-team-to-the-improved-organization-permissions/
you can be an "Owner" of the org still but this does not map to vault as one *might* expect given these docs
2016-04-01 07:48:54 -07:00
Jeff Mitchell
da00982529
Update 0.6 upgrade info
2016-04-01 10:11:32 -04:00
Jeff Mitchell
9075a8fbff
Add revoke-prefix changelog/website info
2016-04-01 10:06:29 -04:00
Jeff Mitchell
a0bc0dc9e5
Merge pull request #1280 from hashicorp/remove-ts-revoke-prefix
...
Remove auth/token/revoke-prefix in favor of sys/revoke-prefix.
2016-04-01 09:48:52 -04:00
Jeff Mitchell
1c249e21f7
changelog++
2016-03-31 20:17:30 -04:00
Jeff Mitchell
8777cd86fb
Merge pull request #1277 from hashicorp/suprious-revoke-timer-logs
...
Keep the expiration manager from keeping old token entries.
2016-03-31 20:16:31 -04:00
Jeff Mitchell
de5bba4162
Documentation update
2016-03-31 18:07:43 -04:00
Jeff Mitchell
34fdfbd8f5
Remove auth/token/revoke-prefix in favor of sys/revoke-prefix.
2016-03-31 18:04:05 -04:00
Jeff Mitchell
8cecf77163
changelog++
2016-03-31 17:43:44 -04:00
Vishal Nayak
4b1e7cd0f5
Merge pull request #1278 from hashicorp/ts-prefix-checkpath
...
Check for auth/ in the path of the prefix for revoke-prefix in the token
2016-03-31 16:41:18 -04:00
Jeff Mitchell
bc3284572c
Check for auth/ in the path of the prefix for revoke-prefix in the token
...
store.
2016-03-31 16:21:56 -04:00
Jeff Mitchell
37a01fa2d6
changelog++
2016-03-31 15:38:21 -04:00
Jeff Mitchell
a657e7fa92
Keep the expiration manager from keeping old token entries.
...
The expiration manager would never be poked to remove token entries upon
token revocation, if that revocation was initiated in the token store
itself. It might have been to avoid deadlock, since during revocation of
tokens the expiration manager is called, which then calls back into the
token store, and so on.
This adds a way to skip that last call back into the token store if we
know that we're on the revocation path because we're in the middle of
revoking a token. That way the lease is cleaned up. This both prevents
log entries appearing for already-revoked tokens, and it also releases
timer/memory resources since we're not keeping the leases around.
2016-03-31 15:10:25 -04:00
Jeff Mitchell
5dc1d5fe2c
Merge pull request #1276 from hashicorp/token-roles-blank-policies
...
Two items:
2016-03-31 15:09:32 -04:00
Jeff Mitchell
fd0edf26c7
Two items:
...
1: Fix path check in core to handle renew paths from the token store
that aren't simply renew/
2: Use token policy logic if token store role policies are empty
2016-03-31 14:52:49 -04:00
Seth Vargo
065c2a155f
Merge pull request #1275 from gdevos/patch-2
...
Update index.html.md
2016-03-31 14:35:06 +02:00
Gérard de Vos
57215ac0aa
Update index.html.md
...
According to the source it is expecting a description. log_raw is one of the options.
2016-03-31 14:19:03 +02:00
Seth Vargo
1a3825b508
Merge pull request #1274 from gdevos/patch-1
...
Update index.html.md
2016-03-31 14:07:27 +02:00
Gérard de Vos
f0e3d4abb3
Update index.html.md
...
description -> log_raw
2016-03-31 14:06:19 +02:00
Tobias Haag
7a82733e4d
added Azure backend support
...
updated Godeps
added website docs
updated vendor
2016-03-30 19:49:38 -07:00
Jeff Mitchell
aa6a5fa25b
Fix potential error scoping issue.
...
Ping #1262
2016-03-30 19:48:23 -04:00
Jeff Mitchell
61a4f4a6a2
Sort infokeys on startup and add more padding
2016-03-30 12:31:47 -04:00
Jeff Mitchell
c296363521
Merge pull request #1271 from jangie/patch-1
...
Update consul.html.md
2016-03-30 10:14:29 -04:00
Jang-Soo "Bruce" Lee
1005ba9fab
Update consul.html.md
2016-03-30 09:57:14 -04:00
Vishal Nayak
111f5be80d
Merge pull request #1268 from hashicorp/fix-audit-doc
...
Fix audit docs
2016-03-30 00:55:39 -04:00
vishalnayak
26ae455234
Fix audit docs
2016-03-30 00:54:40 -04:00
Jeff Mitchell
8926a7c7c7
Check for nil connection back from go-ldap, which apparently can happen even with no error
...
Ping #1262
2016-03-29 10:00:04 -04:00
Jeff Mitchell
16766e272e
changelog++
2016-03-24 10:34:52 -04:00
Jeff Mitchell
0108452380
Merge pull request #1258 from hashicorp/issue-1256
...
Properly check for policy equivalency during renewal.
2016-03-24 10:33:56 -04:00
Jeff Mitchell
c38241446c
Fix using wrong var
2016-03-24 10:23:09 -04:00
Jeff Mitchell
a938ce4e70
Removing debugging comment
2016-03-24 09:48:13 -04:00
Jeff Mitchell
7ce9701800
Properly check for policy equivalency during renewal.
...
This introduces a function that compares two string policy sets while
ignoring the presence of "default" (since it's added by core, not the
backend), and ensuring that ordering and/or duplication are not failure
conditions.
Fixes #1256
2016-03-24 09:41:51 -04:00
Vishal Nayak
a1b59bac56
Merge pull request #1255 from hashicorp/revert-1254-master
...
Revert "Change mysql connection to match new"
2016-03-23 15:18:49 -04:00
Vishal Nayak
6b8f3dbe1d
Revert "Change mysql connection to match new"
2016-03-23 15:18:09 -04:00
Vishal Nayak
b251010b85
Merge pull request #1254 from shokunin/master
...
Change mysql connection to match new
2016-03-23 15:13:18 -04:00