9692 Commits

Author SHA1 Message Date
Pierre-Alain TORET
2276847640 Allow to build on DragonFlyBSD (#5950) 2019-01-07 09:06:51 -08:00
Jeff Escalante
d9795ece43 remove extra analytics page call (#5997) 2019-01-07 11:18:55 -05:00
Thomas Kula
4fa24dd0d4 Fix small typo in azure.html.md (#6004) 2019-01-07 10:03:22 -05:00
Aric Walker
e65100c315 Remove duplicate "Users can" from policy md (#6002) 2019-01-07 07:02:28 -08:00
Chris Hoffman
50e31e5414
changelog++ 2019-01-04 16:32:04 -05:00
Chris Hoffman
3a68a8b852
changelog++ 2019-01-04 16:31:30 -05:00
Seth Vargo
9293594176 Reduce required permissions for the GCPCKMS auto-unsealer (#5999)
This changes the behavior of the GCPCKMS auto-unsealer setup to attempt
encryption instead of a key lookup. Key lookups are a different API
method not covered by roles/cloudkms.cryptoKeyEncrypterDecrypter. This
means users must grant an extended scope to their service account
(granting the ability to read key data) which only seems to be used to
validate the existence of the key.

Worse, the only roles that include this permission are overly verbose
(e.g. roles/viewer which gives readonly access to everything in the
project and roles/cloudkms.admin which gives full control over all key
operations). This leaves the user stuck between choosing to create a
custom IAM role (which isn't fun) or grant overly broad permissions.

By changing to an encrypt call, we get better verification of the unseal
permissions and users can reduce scope to a single role.
2019-01-04 16:29:31 -05:00
Jeff Mitchell
916dc767cb changelog++ 2019-01-04 15:08:37 -05:00
Jeff Mitchell
9af595ec61
Don't read AWS env vars (#5974)
* Don't read AWS env vars

Let AWS SDK env cred chain provider do it for us

Fixes #5965
2019-01-04 15:03:57 -05:00
Jeff Mitchell
2dcd0aed2a
Change credential_types output to credential_type (#5975)
Fixes #5972
2019-01-04 14:49:53 -05:00
Jim Kalafut
cefe45d3e2
Add tests for OpenAPI operation ids (#5998) 2019-01-04 11:46:54 -08:00
Seth Vargo
02f1739155 Fix audit docs (#6000)
These appear to have been converted to (bad) HTML. This returns them to
their original markdown format.
2019-01-04 13:45:50 -06:00
Iain Gray
fe9f34dd2c Update DG to Vault 1.0 (#5855)
* Update DG to Vault 1.0

* as per comments  - chrishoffman

* Removed stray bracket and added quotes

* updated as per conversations with Dan
2019-01-03 10:10:37 -05:00
bjorndolk
93955ec98e Physical postgres docker test (#5926)
* Docker support for postgres backend testing

* Bug in handling of postgres connection url for non docker testing

* Test should fail if it cannot retrieve pg version

* internal helperfunctions pascalCasing
2019-01-03 09:25:32 -05:00
Mike Wickett
636a058f1a website: add print styles for docs (#5958) 2019-01-03 09:24:10 -05:00
Graham Land
431cc5f9a6 Docs: Add Auto Unseal Rekey example (#5952)
* Add KMS Rekey example

I've had customers looking for AWS KMS rekeying examples today - when using pgp keys.
This example would have clarified what they needed to do.

* Replaced KMS reference with Auto Unseal

``` bash
Rekey an Auto Unseal vault and encrypt the resulting recovery keys with PGP:
```
2019-01-03 09:23:43 -05:00
Chris Hoffman
4872720c31
changelog++ 2019-01-03 09:21:49 -05:00
Becca Petrin
d2789f4000
Merge pull request #5892 from jen20/jen20/dynamodb-capacity-doc
docs: Clarify the utility of DynamoDB capacities
2018-12-20 11:54:26 -08:00
Matthew Irish
dc30fa9cf3
UI secret navigation improvements (#5976)
* don't pass id when using createRecord

* add find nearest ancestor mixin

* re-throw the error if we've deleted something and encounter a 404

* use the with-nav-to-nearest-ancestor mixin

* add some comments

* add acceptance test to verify new behavior

* yield final transition in ec task
2018-12-20 13:46:37 -06:00
Pawel Gorczynski
fe0bb20c04 Extended info message regarding VAULT_ADDR env variable for Windows when running server -dev (#5970)
* Improved info message for Windows when running `server -dev`

Improvement for https://github.com/hashicorp/vault/issues/3405

* output updated to:

You may need to set the following environment variable:
PowerShell:
    $env:VAULT_ADDR="http://127.0.0.1:8200"
cmd.exe:
    set VAULT_ADDR=http://127.0.0.1:8200
2018-12-20 10:27:21 -08:00
Noelle Daley
7cf6b245fb
fix policies sidebar title (#5980) 2018-12-20 09:34:03 -08:00
Becca Petrin
3f00589181
Merge pull request #5947 from hmalphettes/master
Docs: JWT API - List Roles: fix the path
2018-12-20 09:15:57 -08:00
Becca Petrin
e294ac3230
Merge pull request #5940 from hashicorp/je.website-local-run-docs
Improve local development instruction
2018-12-20 09:11:13 -08:00
Brian Kassouf
798f6bed1f
Update operator_rekey.go (#5983) 2018-12-20 09:05:50 -08:00
Jim Kalafut
70408512ac
Simplify base62.Random (#5982)
Also move existing base62 encode/decode operations to their only points
of use.
2018-12-20 07:40:01 -08:00
R.B. Boyer
b10ae71509 website: fix simple typo (#5979) 2018-12-19 14:46:54 -08:00
Clint
24de42ff7b
add MSSQL storage docs to sidebar (#5978) 2018-12-19 14:06:42 -06:00
Matthew Irish
fb3511922a
UI - fix perf standby feature display (#5971)
* add performanceStandbyCount to license model

* use count to determine if perf standby is an active feature

* rename test file and add tests for new perf standby behavior

* Update ui/app/templates/components/license-info.hbs

* update display language
2018-12-18 11:01:12 -06:00
Graham Land
0a703fda30 Docs: Add example for Vault init Auto Unseal with PGP Keys (#5951)
* Add example for AWS KMS AutoUnseal with PGP Keys

A customer could not figure how to get this working today. 
This example would have helped them. We don't mention KMS anywhere in this section.

* Changed reference from AWS KMS to Auto Unseal

``` bash
Initialize Auto Unseal, but encrypt the recovery keys with pgp keys:
```
2018-12-18 11:42:10 -05:00
Janosch Maier
34bdc25343 Docs: Fix project resource name in gcp roleset documentation (#5966)
The resource name when referring to a GCP project needs to have a "s". This PR adds the missing letter in the documentation.
2018-12-17 16:22:02 -08:00
vishalnayak
40bd37eda7 Upgrade guide for 0.11.6 2018-12-14 12:22:50 -05:00
Jeff Mitchell
08df121c8b
Cut version 1.0.1 v1.0.1 2018-12-14 11:05:50 -05:00
Jeff Mitchell
4523aa261a Attempt to fix dockerfile again 2018-12-14 11:05:42 -05:00
Jeff Mitchell
2fd62e9020 Changes in Go don't like the old import path 2018-12-14 10:56:03 -05:00
Jeff Mitchell
8bcd7a2454 Prep for release 2018-12-14 10:42:59 -05:00
Jeff Mitchell
18e014ee93 Update plugins 2018-12-14 10:42:11 -05:00
Jeff Mitchell
b128fedea8 changelog++ 2018-12-14 09:38:17 -05:00
Jeff Mitchell
f47cafacf8 changelog++ 2018-12-14 09:22:55 -05:00
Jeff Mitchell
ca55573d38
Strip empty strings from database revocation stmts (#5955)
* Strip empty strings from database revocation stmts

It's technically valid to give empty strings as statements to run on
most databases. However, in the case of revocation statements, it's not
only generally inadvisable but can lead to lack of revocations when you
expect them. This strips empty strings from the array of revocation
statements.

It also makes two other changes:

* Return statements on read as empty but valid arrays rather than nulls,
so that typing information is inferred (this is more in line with the
rest of Vault these days)

* Changes field data for TypeStringSlice and TypeCommaStringSlice such
that a client-supplied value of `""` doesn't turn into `[]string{""}`
but rather `[]string{}`.

The latter and the explicit revocation statement changes are related,
and defense in depth.
2018-12-14 09:12:26 -05:00
Matthew Irish
36b96f7ddb update help output examples and mention openapi fragment support (#5954) 2018-12-14 09:12:03 -05:00
Jeff Mitchell
0ddc104ba3 Bump dockerfile Go version 2018-12-14 09:10:32 -05:00
Brian Kassouf
0feb99acb6
changelog++ 2018-12-13 16:46:41 -08:00
Brian Kassouf
70084e2234
Default seal type to Shamir on older seal configs (#5956) 2018-12-13 16:44:56 -08:00
Jeff Mitchell
dd459e0d16 Update Consul ACL example
Fixes #5831
2018-12-13 17:18:28 -05:00
Hugues Malphettes
66e66a1b6c
Merge branch 'master' into master 2018-12-14 05:21:41 +08:00
Jeff Mitchell
4c735a35d2 Add sidebar link for approle autoauth docs 2018-12-13 09:51:47 -05:00
Matthew Irish
d59e8127d4
changelog++ 2018-12-12 16:55:30 -06:00
Matthew Irish
1354d43056
add an auth-config adapter for jwt so that configs can be saved properly (#5936)
* add an auth-config adapter for jwt so that configs can be saved properly

* unskip some tests and add a test for jwt config

* linting
2018-12-12 16:53:45 -06:00
Hugues Malphettes
b8dbdea6a6
JWT API - List Roles: fix the path
With vault-1.0.0 and vault-0.11.4 a different path is needed to list the jwt registered roles:

```
$ vault list auth/jwt/roles
No value found at auth/jwt/roles/

$ vault list auth/jwt/role
Keys
----
myrole
```
I hope this helps!
2018-12-13 06:27:30 +08:00
Jim Kalafut
b76888bae2
changelog++ 2018-12-12 14:03:44 -08:00