9692 Commits

Author SHA1 Message Date
Jeff Mitchell
600ba51eb6 Merge pull request #1289 from steve-jansen/patch-1
Fix typo in iam permission for STS
2016-04-05 08:37:12 -04:00
Mark Mickan
8deed677d2 Ensure authorized_keys file is readable when uninstalling an ssh key
Without this change, if the user running the ssh key install script doesn't
have read access to the authorized_keys file when uninstalling a key, all
keys will be deleted from the authorized_keys file.

Fixes GH #1285
2016-04-05 17:26:21 +09:30
Steve Jansen
03da496bd2 Adds note on GH-1102 fix to secret/aws doc
Add note related to #1102, which leads to a non-obvious AWS error message on 0.5.0 or earlier.
2016-04-04 21:30:41 -04:00
Steve Jansen
64b472dc57 Fix typo in iam permission for STS 2016-04-04 21:20:26 -04:00
Jeff Mitchell
f59cb0c501 Sync some seal stuff 2016-04-04 13:46:33 -04:00
Jeff Mitchell
ab93e3aa63 SealInterface 2016-04-04 10:44:22 -04:00
Jeff Mitchell
3bb3e9165d changelog++ 2016-04-02 13:34:05 -04:00
Jeff Mitchell
f5f9c098b7 Some fixups around error/warning in LDAP 2016-04-02 13:33:00 -04:00
Jeff Mitchell
3e5fe09dd0 Merge pull request #1283 from hashicorp/ldap-nogroupdn-warn
If no group DN is configured, still look for policies on local users and
2016-04-02 13:13:27 -04:00
Jeff Mitchell
aca4e79ac6 If no group DN is configured, still look for policies on local users and
return a warning, rather than just trying to do an LDAP search on an
empty string.
2016-04-02 13:11:36 -04:00
Jeff Mitchell
02be26e4ae Fix up the meta common options text function to not strip leading space and fix up commands 2016-04-01 16:50:12 -04:00
Jeff Mitchell
16c8f0b5ad Remove config from Meta; it's only used right now with the token helper. 2016-04-01 16:02:18 -04:00
Jeff Mitchell
48da40964c Move token helper out of meta 2016-04-01 14:23:15 -04:00
Jeff Mitchell
33326b30c3 Move meta into its own package 2016-04-01 13:16:05 -04:00
Riley Guerin
e62254a565 fix typo 2016-04-01 07:49:25 -07:00
Riley Guerin
5061b670db change github example team to admins
somewhat recently github has gone away from the previous model of an "owners" team 
https://help.github.com/articles/converting-your-previous-owners-team-to-the-improved-organization-permissions/

you can be an "Owner" of the org still but this does not map to vault as one *might* expect given these docs
2016-04-01 07:48:54 -07:00
Jeff Mitchell
da00982529 Update 0.6 upgrade info 2016-04-01 10:11:32 -04:00
Jeff Mitchell
9075a8fbff Add revoke-prefix changelog/website info 2016-04-01 10:06:29 -04:00
Jeff Mitchell
a0bc0dc9e5 Merge pull request #1280 from hashicorp/remove-ts-revoke-prefix
Remove auth/token/revoke-prefix in favor of sys/revoke-prefix.
2016-04-01 09:48:52 -04:00
Jeff Mitchell
1c249e21f7 changelog++ 2016-03-31 20:17:30 -04:00
Jeff Mitchell
8777cd86fb Merge pull request #1277 from hashicorp/suprious-revoke-timer-logs
Keep the expiration manager from keeping old token entries.
2016-03-31 20:16:31 -04:00
Jeff Mitchell
de5bba4162 Documentation update 2016-03-31 18:07:43 -04:00
Jeff Mitchell
34fdfbd8f5 Remove auth/token/revoke-prefix in favor of sys/revoke-prefix. 2016-03-31 18:04:05 -04:00
Jeff Mitchell
8cecf77163 changelog++ 2016-03-31 17:43:44 -04:00
Vishal Nayak
4b1e7cd0f5 Merge pull request #1278 from hashicorp/ts-prefix-checkpath
Check for auth/ in the path of the prefix for revoke-prefix in the token
2016-03-31 16:41:18 -04:00
Jeff Mitchell
bc3284572c Check for auth/ in the path of the prefix for revoke-prefix in the token
store.
2016-03-31 16:21:56 -04:00
Jeff Mitchell
37a01fa2d6 changelog++ 2016-03-31 15:38:21 -04:00
Jeff Mitchell
a657e7fa92 Keep the expiration manager from keeping old token entries.
The expiration manager would never be poked to remove token entries upon
token revocation, if that revocation was initiated in the token store
itself. It might have been to avoid deadlock, since during revocation of
tokens the expiration manager is called, which then calls back into the
token store, and so on.

This adds a way to skip that last call back into the token store if we
know that we're on the revocation path because we're in the middle of
revoking a token. That way the lease is cleaned up. This both prevents
log entries appearing for already-revoked tokens, and it also releases
timer/memory resources since we're not keeping the leases around.
2016-03-31 15:10:25 -04:00
Jeff Mitchell
5dc1d5fe2c Merge pull request #1276 from hashicorp/token-roles-blank-policies
Two items:
2016-03-31 15:09:32 -04:00
Jeff Mitchell
fd0edf26c7 Two items:
1: Fix path check in core to handle renew paths from the token store
that aren't simply renew/
2: Use token policy logic if token store role policies are empty
2016-03-31 14:52:49 -04:00
Seth Vargo
065c2a155f Merge pull request #1275 from gdevos/patch-2
Update index.html.md
2016-03-31 14:35:06 +02:00
Gérard de Vos
57215ac0aa Update index.html.md
According to the source it is expecting a description. log_raw is one of the options.
2016-03-31 14:19:03 +02:00
Seth Vargo
1a3825b508 Merge pull request #1274 from gdevos/patch-1
Update index.html.md
2016-03-31 14:07:27 +02:00
Gérard de Vos
f0e3d4abb3 Update index.html.md
description -> log_raw
2016-03-31 14:06:19 +02:00
Tobias Haag
7a82733e4d added Azure backend support
updated Godeps
added website docs
updated vendor
2016-03-30 19:49:38 -07:00
Jeff Mitchell
aa6a5fa25b Fix potential error scoping issue.
Ping #1262
2016-03-30 19:48:23 -04:00
Jeff Mitchell
61a4f4a6a2 Sort infokeys on startup and add more padding 2016-03-30 12:31:47 -04:00
Jeff Mitchell
c296363521 Merge pull request #1271 from jangie/patch-1
Update consul.html.md
2016-03-30 10:14:29 -04:00
Jang-Soo "Bruce" Lee
1005ba9fab Update consul.html.md 2016-03-30 09:57:14 -04:00
Vishal Nayak
111f5be80d Merge pull request #1268 from hashicorp/fix-audit-doc
Fix audit docs
2016-03-30 00:55:39 -04:00
vishalnayak
26ae455234 Fix audit docs 2016-03-30 00:54:40 -04:00
Jeff Mitchell
8926a7c7c7 Check for nil connection back from go-ldap, which apparently can happen even with no error
Ping #1262
2016-03-29 10:00:04 -04:00
Jeff Mitchell
16766e272e changelog++ 2016-03-24 10:34:52 -04:00
Jeff Mitchell
0108452380 Merge pull request #1258 from hashicorp/issue-1256
Properly check for policy equivalency during renewal.
2016-03-24 10:33:56 -04:00
Jeff Mitchell
c38241446c Fix using wrong var 2016-03-24 10:23:09 -04:00
Jeff Mitchell
a938ce4e70 Removing debugging comment 2016-03-24 09:48:13 -04:00
Jeff Mitchell
7ce9701800 Properly check for policy equivalency during renewal.
This introduces a function that compares two string policy sets while
ignoring the presence of "default" (since it's added by core, not the
backend), and ensuring that ordering and/or duplication are not failure
conditions.

Fixes #1256
2016-03-24 09:41:51 -04:00
Vishal Nayak
a1b59bac56 Merge pull request #1255 from hashicorp/revert-1254-master
Revert "Change mysql connection to match new"
2016-03-23 15:18:49 -04:00
Vishal Nayak
6b8f3dbe1d Revert "Change mysql connection to match new" 2016-03-23 15:18:09 -04:00
Vishal Nayak
b251010b85 Merge pull request #1254 from shokunin/master
Change mysql connection to match new
2016-03-23 15:13:18 -04:00