9692 Commits

Author SHA1 Message Date
David Wittman
d86fe916cb Read from stdin with auth command 2015-05-23 13:23:37 -05:00
Ian Unruh
75eed4e4bd Add libraries section to HTTP docs 2015-05-22 14:32:14 -07:00
Armon Dadgar
5562fe654f Merge pull request #257 from ianunruh/feature/read-field
Add ability to read raw field from secret
2015-05-22 11:57:21 -07:00
Ian Unruh
0f9270bdd3 Add read field flag to documentation 2015-05-22 11:33:28 -07:00
Ian Unruh
c6b5d957de Add ability to read raw field from secret 2015-05-22 11:28:23 -07:00
Armon Dadgar
cf80538de1 godeps: Updating aws-sdk-go 2015-05-22 11:12:35 -07:00
Armon Dadgar
537807ce8d Merge pull request #256 from jefferai/f-fix-aws-err
AWS changed their error interface; fix compile breakage.
2015-05-22 11:09:20 -07:00
Jeff Mitchell
33467b16e5 AWS changed their error interface; fix compile breakage. 2015-05-21 16:15:21 -04:00
Armon Dadgar
bb6addc58f command/renew: typo fix. Fixes #240 2015-05-21 11:03:25 -07:00
Ken Breeman
0805ce27e6 Restore backwards compatibility for zookeeper physical backend. Vault already prevents locks and data from overlapping internally. 2015-05-20 23:15:31 -04:00
David Wittman
9797143038 Prompt for auth token when no args provided
This makes `vault auth` work as documented:

> If no -method is specified, then the token is expected. If it is not
> given on the command-line, it will be asked via user input. If the
> token is "-", it will be read from stdin.
2015-05-20 22:10:02 -05:00
Ken Breeman
87b8f19d06 Merge branch 'master' into physical_zookeeper_ha
Conflicts:
	physical/zookeeper.go
2015-05-20 22:59:37 -04:00
Ken Breeman
df0d430c00 Implement HA lock loss detection for zookeeper physical backend 2015-05-20 22:54:35 -04:00
Armon Dadgar
b474fa6dc5 server: Minor copy change 2015-05-20 17:49:16 -07:00
Armon Dadgar
628e102419 Merge pull request #222 from DavidWittman/config-backend-check
Fail gracefully if a physical backend is not supplied
2015-05-20 17:47:45 -07:00
Armon Dadgar
4828206841 Merge pull request #238 from jsok/remote-addr-port
Set RemoteAddr correctly on logical.Request
2015-05-20 17:44:51 -07:00
Armon Dadgar
f0af785493 physical/s3: skip unit test if missing ENV vars 2015-05-20 17:42:41 -07:00
Armon Dadgar
5afcd735e3 website: doc cleanup 2015-05-20 17:42:29 -07:00
Armon Dadgar
ab77e05b1f Merge pull request #242 from jstremick/f-physical-s3-backend
Physical S3 backend implementation
2015-05-20 17:00:44 -07:00
James Stremick
cdf3ea9688 Removed erroneous mutex and tests. Delete operates on a single key now 2015-05-20 19:53:35 -04:00
Armon Dadgar
61f2e86f4e command/listener: Request TLS client cert. Fixes #214 2015-05-20 16:01:40 -07:00
Armon Dadgar
e099bfa2fe Merge pull request #245 from ianunruh/fix/gh-244
Allow dot in LDAP login username
2015-05-20 14:43:18 -07:00
Armon Dadgar
5f86dd3451 Merge pull request #246 from joemiller/patch-1
fix doc example to submit valid json in POST body
2015-05-20 14:40:58 -07:00
joe miller
d1100c6293 fix doc example to submit valid json in POST body
I don't know if there is some version of curl that auto-generates json but the example didn't work for me on curl 7.32.0. Submitting the data as JSON works though.
2015-05-20 13:11:54 -07:00
Armon Dadgar
590a1582be Merge pull request #241 from abedra/doc_fixes
Fix typo in app-id docs
2015-05-20 12:27:09 -07:00
Ian Unruh
82bca95537 Allow dot in LDAP login username 2015-05-20 11:54:15 -07:00
James Stremick
a3570fc017 AWS dependency update 2015-05-20 11:46:21 -04:00
James Stremick
a8faf25397 Physical S3 backend implementation 2015-05-20 10:59:03 -04:00
Aaron Bedra
2cf2cc927c Fix typo in app-id docs 2015-05-20 09:36:54 -05:00
Seth Vargo
0ede02a08c Merge pull request #239 from ijin/patch-1
Document that Vault Server needs to be running for vault help path
2015-05-20 12:28:31 +02:00
Seth Vargo
ee611d4b77 Merge pull request #232 from dmccarney/master
Minor documentation typo fixes.
2015-05-20 12:27:47 +02:00
Michael H. Oshita
c495d07d8a Document that Vault Server needs to be running for vault help path
Confused initial, I tried running `vault help secret` by itself and found out that the server needs to be running to execute this command.

Furthermore, the client needs `VAULT_ADDR` configured (`http://127.0.0.1:8200` in dev mode, since it uses https by default) to interact with the server.
2015-05-20 17:06:59 +09:00
Jonathan Sokolowski
c022d109dd http: Extract IP from RemoteAddr correctly 2015-05-20 15:23:41 +10:00
Paul Hinze
c5bce9e6c6 Merge pull request #230 from hashicorp/b-tf-mod-ports
terraform: allow SG rule customization
2015-05-19 15:56:33 -05:00
Paul Hinze
e9f4d0f219 terraform: allow SG rule customization
Switches SG rules to from nested to top-level resources and exports the
SG ids so that users of the module can define additional rules for their
Vault instances and/or the Vault ELB.

While this change should be backwards compatible, applying the new rules
might result in a very brief interruption of Vault service as:

 (1) Old nested-resource SG rules are cleared
 (2) New SG rules are applied one by one
2015-05-19 15:08:37 -05:00
Daniel McCarney
bae60e4afa Add missing word to storage backend threat model. 2015-05-19 12:11:48 -07:00
Daniel McCarney
159317edeb Fix "the a lease ID" typo. 2015-05-19 12:07:07 -07:00
Daniel McCarney
05d7225d22 Fix "all everything" typo in Secrets description. 2015-05-19 11:59:20 -07:00
Armon Dadgar
787cc6ec51 Merge pull request #224 from ianunruh/feature/unseal-msg
Improve unseal CLI message
2015-05-19 11:33:23 -07:00
Armon Dadgar
512bf8f666 Merge pull request #225 from ianunruh/fix/gh-213
HTTP should return 503 when sealed
2015-05-19 11:32:37 -07:00
Seth Vargo
1e2dc91e79 Merge pull request #221 from ianunruh/fix/api-docs
Remove non-existent unseal API argument
2015-05-19 15:44:32 +02:00
Ian Unruh
3ca704bdbb HTTP should return 503 when sealed 2015-05-19 00:59:19 -07:00
Ian Unruh
045b5a9c84 Improve unseal CLI message 2015-05-19 00:34:18 -07:00
David Wittman
792e3a26f4 Fail gracefully if a phys backend is not supplied 2015-05-18 22:55:12 -05:00
Ian Unruh
eeb0bccd73 Remove non-existent unseal API argument 2015-05-18 19:59:18 -07:00
Armon Dadgar
cce15445c9 auth/cert: Guard against empty certs. Fixes #214 2015-05-18 16:11:09 -07:00
Armon Dadgar
45f14256fe Update github.html.md
Fixing incorrect documentation about case sensitivity
2015-05-18 09:37:31 -07:00
Armon Dadgar
381db8d22c Merge pull request #204 from nrocine/master
Added implementation details to the GitHub Auth Docs on the Vault Website
2015-05-18 09:36:35 -07:00
Armon Dadgar
83bcac9cac Merge pull request #218 from jefferai/master
Add website/build to gitignore
2015-05-18 09:35:57 -07:00
Jeff Mitchell
e7abb000e3 Add website/build to gitignore 2015-05-18 10:55:13 -04:00