9692 Commits

Author SHA1 Message Date
Hanno Hecker
11aee85c0b add binddn/bindpath to search for the users bind DN 2016-01-26 15:56:41 +01:00
Jeff Mitchell
1dc52267a8 Merge pull request #972 from rajanadar/patch-7
added the delete api details to generic backend
2016-01-26 09:49:06 -05:00
Jeff Mitchell
e3e9a3980d Merge pull request #971 from rajanadar/patch-6
added the delete api details to cubbyhole
2016-01-26 09:48:47 -05:00
Jeff Mitchell
8b85f7f999 Merge pull request #969 from rajanadar/patch-4
fixing the description of the /lookup/<token> api
2016-01-26 09:48:22 -05:00
Jeff Mitchell
033650c57f Merge pull request #970 from rajanadar/patch-5
fixing an incorrect json response field name
2016-01-26 09:47:54 -05:00
Raja Nadar
8290a4cd5f added the delete api details to generic backend
documentation was missing this api description
2016-01-25 23:56:33 -08:00
Raja Nadar
45626fa148 added the delete api details to cubbyhole
cubbyhole delete api details were missing. added them.
2016-01-25 23:47:33 -08:00
Raja Nadar
4b84b49797 fixing an incorrect json response field name
changed a read-role api response field from 'revocation_cql' to 'rollback_cql'
didn't verify it using a real cassandra server test, but looked at the source code json schema definition here: 

https://github.com/hashicorp/vault/blob/master/builtin/logical/cassandra/path_roles.go
func pathRoles(b *backend) *framework.Path 

please feel free to discard the PR, if i am looking at the wrong source location or something.
2016-01-25 23:42:20 -08:00
Raja Nadar
e391200599 fixing the description of the /lookup/<token> api 2016-01-25 23:26:29 -08:00
Jeff Mitchell
4eae699f19 Merge pull request #968 from nickithewatt/aws-policies-docs
AWS secret backend use of existing policy - docs
2016-01-25 23:02:25 -05:00
Nicki Watt
a616197add AWS secret backend - docs when using existing policy 2016-01-26 01:43:14 +00:00
Nicki Watt
e10f5b2b1a Docs for AWS backend when using an existing policy 2016-01-26 01:39:24 +00:00
Devin Christensen
c11fa3d3e9 Merge 'upstream/master' into postgres_physical 2016-01-25 13:43:16 -07:00
Jeff Mitchell
6bdc7a86ab changelog++ 2016-01-25 14:48:34 -05:00
Jeff Mitchell
eafbf1eddc Merge pull request #955 from hashicorp/postgres-idle-connections
Add a max_idle_connections parameter.
2016-01-25 14:47:28 -05:00
Jeff Mitchell
1c43a0148f Document changes 2016-01-25 14:47:16 -05:00
Jeff Mitchell
aa65b3a21c Add a max_idle_connections parameter. 2016-01-25 14:47:07 -05:00
Jeff Mitchell
1ac22ab8b7 Merge pull request #966 from hashicorp/sethvargo/sdata
Add structured data
2016-01-24 13:41:02 -05:00
Seth Vargo
a45ac74607 Add structured data 2016-01-24 13:37:20 -05:00
Jeff Mitchell
145041757c Merge pull request #964 from hashicorp/patched-1.5.3
Add a Dockerfile to build 1.5.3 with patches.
2016-01-23 20:11:02 -05:00
Jeff Mitchell
270e66d7fe Add a Dockerfile to build 1.5.3 with patches.
Specifically this pulls in the following:

https://go-review.googlesource.com/12717
https://go-review.googlesource.com/17247

These fix bugs users have encountered -- the first with the PKI backend,
and the second with Vault generally, as it can bite any use of a
certificate within Vault (listener, cert credential backend, pki
backend).

These are in 1.6, but it will probably be released too late for us given
what is currently known about their release plans and our known
deadline. This lets us build our releases against a patched 1.5.3.
2016-01-23 14:50:23 -05:00
Jeff Mitchell
7be32bc9c5 changelog++ 2016-01-23 14:46:20 -05:00
Jeff Mitchell
b00acbeb5f Merge pull request #961 from rajanadar/patch-3
fixed login link,request params,add json response
2016-01-23 14:45:27 -05:00
Jeff Mitchell
c22ab64e4a Merge pull request #963 from hashicorp/fail-unsup-path
If the path is not correct, don't fail due to existence check, fail d…
2016-01-23 14:05:32 -05:00
Jeff Mitchell
fab55286b4 If the path is not correct, don't fail due to existence check, fail due to unsupported path 2016-01-23 14:05:09 -05:00
Raja Nadar
e2c9f40e9b clarify default mountpoint 2016-01-23 11:02:00 -08:00
Jeff Mitchell
49a03dbb2b Merge pull request #960 from rajanadar/patch-2
mention that this is an unauthenticated endpoint
2016-01-23 10:24:16 -05:00
Devin Christensen
91d825170d Merge 'upstream/master' into postgres_physical 2016-01-22 20:56:07 -07:00
Jeff Mitchell
98fada78e4 Fix test on 1.6 by comparing to nil instead of a nil-defined map 2016-01-22 21:26:06 -05:00
Jeff Mitchell
d343e5f4df changelog++ 2016-01-22 21:24:25 -05:00
Jeff Mitchell
233e07f8d6 Merge pull request #954 from hashicorp/backend-tainted-view
Allow backends to see taint status.
2016-01-22 21:23:12 -05:00
Raja Nadar
f936f77c45 fixed login link,request params,add json response
1. fix login link
2. added personal access token to request message
3. added a sample json response
2016-01-22 17:38:32 -08:00
Raja Nadar
711b446ef7 mention that this is an unauthenticated endpoint 2016-01-22 17:10:16 -08:00
Jeff Mitchell
e734c1befd Merge pull request #957 from rajanadar/patch-1
update sys-init.html.md
2016-01-22 19:57:20 -05:00
Raja Nadar
d484f25578 update sys-init.html.md
change response field from 'initialize' to 'initialized'
2016-01-22 16:45:59 -08:00
Devin Christensen
01c315c766 Update naming and pull DDL for upsert back out 2016-01-22 17:15:10 -07:00
Jeff Mitchell
cf95982d80 Allow backends to see taint status.
This can be seen via System(). In the PKI backend, if the CA is
reconfigured but not fully (e.g. an intermediate CSR is generated but no
corresponding cert set) and there are already leases (issued certs), the
CRL is unable to be built. As a result revocation fails. But in this
case we don't actually need revocation to be successful since the CRL is
useless after unmounting. By checking taint status we know if we can
simply fast-path out of revocation with a success in this case.

Fixes #946
2016-01-22 17:01:22 -05:00
Jeff Mitchell
2d89831f3f changelog++ 2016-01-22 13:09:21 -05:00
Jeff Mitchell
1533fccd23 Merge pull request #953 from hashicorp/init-check
Add -check flag to init.
2016-01-22 13:08:31 -05:00
Jeff Mitchell
479775806e Add -check flag to init.
Fixes #949
2016-01-22 13:06:40 -05:00
Devin Christensen
bba6cfda6a Move the upsert definition back into the code 2016-01-22 09:47:02 -07:00
Devin Christensen
8710076c39 Remove options for column configuration 2016-01-22 08:41:31 -07:00
Jeff Mitchell
e59a049f42 changelog++ 2016-01-22 10:22:43 -05:00
Jeff Mitchell
6ece93f583 Merge pull request #617 from hashicorp/f-passthrough-list
Basic list support
2016-01-22 10:15:08 -05:00
Jeff Mitchell
f8a37df06e Add some commenting 2016-01-22 10:13:49 -05:00
Jeff Mitchell
7fd1c8534e 0.7 -> 1.0 2016-01-22 10:07:32 -05:00
Jeff Mitchell
bebdd2f664 Address more list feedback 2016-01-22 10:07:32 -05:00
Jeff Mitchell
9eaef0a2a1 Update documentation and use ParseBool for list query param checking 2016-01-22 10:07:32 -05:00
Jeff Mitchell
7f8da9efa1 Error out if trying to write to a directory path 2016-01-22 10:07:32 -05:00
Jeff Mitchell
cc0d88cabe Address some listing review feedback 2016-01-22 10:07:32 -05:00