Hanno Hecker
11aee85c0b
add binddn/bindpath to search for the users bind DN
2016-01-26 15:56:41 +01:00
Jeff Mitchell
1dc52267a8
Merge pull request #972 from rajanadar/patch-7
...
added the delete api details to generic backend
2016-01-26 09:49:06 -05:00
Jeff Mitchell
e3e9a3980d
Merge pull request #971 from rajanadar/patch-6
...
added the delete api details to cubbyhole
2016-01-26 09:48:47 -05:00
Jeff Mitchell
8b85f7f999
Merge pull request #969 from rajanadar/patch-4
...
fixing the description of the /lookup/<token> api
2016-01-26 09:48:22 -05:00
Jeff Mitchell
033650c57f
Merge pull request #970 from rajanadar/patch-5
...
fixing an incorrect json response field name
2016-01-26 09:47:54 -05:00
Raja Nadar
8290a4cd5f
added the delete api details to generic backend
...
documentation was missing this api description
2016-01-25 23:56:33 -08:00
Raja Nadar
45626fa148
added the delete api details to cubbyhole
...
cubbyhole delete api details were missing. added them.
2016-01-25 23:47:33 -08:00
Raja Nadar
4b84b49797
fixing an incorrect json response field name
...
changed a read-role api response field from 'revocation_cql' to 'rollback_cql'
didn't verify it using a real cassandra server test, but looked at the source code json schema definition here:
https://github.com/hashicorp/vault/blob/master/builtin/logical/cassandra/path_roles.go
func pathRoles(b *backend) *framework.Path
please feel free to discard the PR, if i am looking at the wrong source location or something.
2016-01-25 23:42:20 -08:00
Raja Nadar
e391200599
fixing the description of the /lookup/<token> api
2016-01-25 23:26:29 -08:00
Jeff Mitchell
4eae699f19
Merge pull request #968 from nickithewatt/aws-policies-docs
...
AWS secret backend use of existing policy - docs
2016-01-25 23:02:25 -05:00
Nicki Watt
a616197add
AWS secret backend - docs when using existing policy
2016-01-26 01:43:14 +00:00
Nicki Watt
e10f5b2b1a
Docs for AWS backend when using an existing policy
2016-01-26 01:39:24 +00:00
Devin Christensen
c11fa3d3e9
Merge 'upstream/master' into postgres_physical
2016-01-25 13:43:16 -07:00
Jeff Mitchell
6bdc7a86ab
changelog++
2016-01-25 14:48:34 -05:00
Jeff Mitchell
eafbf1eddc
Merge pull request #955 from hashicorp/postgres-idle-connections
...
Add a max_idle_connections parameter.
2016-01-25 14:47:28 -05:00
Jeff Mitchell
1c43a0148f
Document changes
2016-01-25 14:47:16 -05:00
Jeff Mitchell
aa65b3a21c
Add a max_idle_connections parameter.
2016-01-25 14:47:07 -05:00
Jeff Mitchell
1ac22ab8b7
Merge pull request #966 from hashicorp/sethvargo/sdata
...
Add structured data
2016-01-24 13:41:02 -05:00
Seth Vargo
a45ac74607
Add structured data
2016-01-24 13:37:20 -05:00
Jeff Mitchell
145041757c
Merge pull request #964 from hashicorp/patched-1.5.3
...
Add a Dockerfile to build 1.5.3 with patches.
2016-01-23 20:11:02 -05:00
Jeff Mitchell
270e66d7fe
Add a Dockerfile to build 1.5.3 with patches.
...
Specifically this pulls in the following:
https://go-review.googlesource.com/12717
https://go-review.googlesource.com/17247
These fix bugs users have encountered -- the first with the PKI backend,
and the second with Vault generally, as it can bite any use of a
certificate within Vault (listener, cert credential backend, pki
backend).
These are in 1.6, but it will probably be released too late for us given
what is currently known about their release plans and our known
deadline. This lets us build our releases against a patched 1.5.3.
2016-01-23 14:50:23 -05:00
Jeff Mitchell
7be32bc9c5
changelog++
2016-01-23 14:46:20 -05:00
Jeff Mitchell
b00acbeb5f
Merge pull request #961 from rajanadar/patch-3
...
fixed login link,request params,add json response
2016-01-23 14:45:27 -05:00
Jeff Mitchell
c22ab64e4a
Merge pull request #963 from hashicorp/fail-unsup-path
...
If the path is not correct, don't fail due to existence check, fail d…
2016-01-23 14:05:32 -05:00
Jeff Mitchell
fab55286b4
If the path is not correct, don't fail due to existence check, fail due to unsupported path
2016-01-23 14:05:09 -05:00
Raja Nadar
e2c9f40e9b
clarify default mountpoint
2016-01-23 11:02:00 -08:00
Jeff Mitchell
49a03dbb2b
Merge pull request #960 from rajanadar/patch-2
...
mention that this is an unauthenticated endpoint
2016-01-23 10:24:16 -05:00
Devin Christensen
91d825170d
Merge 'upstream/master' into postgres_physical
2016-01-22 20:56:07 -07:00
Jeff Mitchell
98fada78e4
Fix test on 1.6 by comparing to nil instead of a nil-defined map
2016-01-22 21:26:06 -05:00
Jeff Mitchell
d343e5f4df
changelog++
2016-01-22 21:24:25 -05:00
Jeff Mitchell
233e07f8d6
Merge pull request #954 from hashicorp/backend-tainted-view
...
Allow backends to see taint status.
2016-01-22 21:23:12 -05:00
Raja Nadar
f936f77c45
fixed login link,request params,add json response
...
1. fix login link
2. added personal access token to request message
3. added a sample json response
2016-01-22 17:38:32 -08:00
Raja Nadar
711b446ef7
mention that this is an unauthenticated endpoint
2016-01-22 17:10:16 -08:00
Jeff Mitchell
e734c1befd
Merge pull request #957 from rajanadar/patch-1
...
update sys-init.html.md
2016-01-22 19:57:20 -05:00
Raja Nadar
d484f25578
update sys-init.html.md
...
change response field from 'initialize' to 'initialized'
2016-01-22 16:45:59 -08:00
Devin Christensen
01c315c766
Update naming and pull DDL for upsert back out
2016-01-22 17:15:10 -07:00
Jeff Mitchell
cf95982d80
Allow backends to see taint status.
...
This can be seen via System(). In the PKI backend, if the CA is
reconfigured but not fully (e.g. an intermediate CSR is generated but no
corresponding cert set) and there are already leases (issued certs), the
CRL is unable to be built. As a result revocation fails. But in this
case we don't actually need revocation to be successful since the CRL is
useless after unmounting. By checking taint status we know if we can
simply fast-path out of revocation with a success in this case.
Fixes #946
2016-01-22 17:01:22 -05:00
Jeff Mitchell
2d89831f3f
changelog++
2016-01-22 13:09:21 -05:00
Jeff Mitchell
1533fccd23
Merge pull request #953 from hashicorp/init-check
...
Add -check flag to init.
2016-01-22 13:08:31 -05:00
Jeff Mitchell
479775806e
Add -check flag to init.
...
Fixes #949
2016-01-22 13:06:40 -05:00
Devin Christensen
bba6cfda6a
Move the upsert definition back into the code
2016-01-22 09:47:02 -07:00
Devin Christensen
8710076c39
Remove options for column configuration
2016-01-22 08:41:31 -07:00
Jeff Mitchell
e59a049f42
changelog++
2016-01-22 10:22:43 -05:00
Jeff Mitchell
6ece93f583
Merge pull request #617 from hashicorp/f-passthrough-list
...
Basic list support
2016-01-22 10:15:08 -05:00
Jeff Mitchell
f8a37df06e
Add some commenting
2016-01-22 10:13:49 -05:00
Jeff Mitchell
7fd1c8534e
0.7 -> 1.0
2016-01-22 10:07:32 -05:00
Jeff Mitchell
bebdd2f664
Address more list feedback
2016-01-22 10:07:32 -05:00
Jeff Mitchell
9eaef0a2a1
Update documentation and use ParseBool for list query param checking
2016-01-22 10:07:32 -05:00
Jeff Mitchell
7f8da9efa1
Error out if trying to write to a directory path
2016-01-22 10:07:32 -05:00
Jeff Mitchell
cc0d88cabe
Address some listing review feedback
2016-01-22 10:07:32 -05:00