9692 Commits

Author SHA1 Message Date
Calvin Leung Huang
3189278c84
CLI Enhancements (#3897)
* Use Colored UI if stdout is a tty

* Add format options to operator unseal

* Add format test on operator unseal

* Add -no-color output flag, and use BasicUi if no-color flag is provided

* Move seal status formatting logic to OutputSealStatus

* Apply no-color to warnings from DeprecatedCommands as well

* Add OutputWithFormat to support arbitrary data, add format option to auth list

* Add ability to output arbitrary list data on TableFormatter

* Clear up switch logic on format

* Add format option for list-related commands

* Add format option to rest of commands that returns a client API response

* Remove initOutputYAML and initOutputJSON, and use OutputWithFormat instead

* Remove outputAsYAML and outputAsJSON, and use OutputWithFormat instead

* Remove -no-color flag, use env var exclusively to toggle colored output

* Fix compile

* Remove -no-color flag in main.go

* Add missing FlagSetOutputFormat

* Fix generate-root/decode test

* Migrate init functions to main.go

* Add no-color flag back as hidden

* Handle non-supported data types for TableFormatter.OutputList

* Pull formatting much further up to remove the need to use c.flagFormat (#3950)

* Pull formatting much further up to remove the need to use c.flagFormat

Also remove OutputWithFormat as the logic can cause issues.

* Use const for env var

* Minor updates

* Remove unnecessary check

* Fix SSH output and some tests

* Fix tests

* Make race detector not run on generate root since it kills Travis these days

* Update docs

* Update docs

* Address review feedback

* Handle --format as well as -format
2018-02-12 18:12:16 -05:00
Jeff Mitchell
d2324066c4 changelog++ 2018-02-12 17:54:15 -05:00
rmbrad
51a2aaee4c Fixes for SSH command CA mode (#3922)
* Add `valid-principals` flag to SSH command CA mode options

* Fix SSH command CA mode host certificate validation
2018-02-12 17:53:34 -05:00
Joel Thompson
d4465fdfcd auth/aws: Improve role tag docs as suggested on mailing list (#3915)
Fixes the ambiguity called out in
https://groups.google.com/forum/#!msg/vault-tool/X3s7YY0An_w/yH0KFQxlBgAJ
2018-02-12 17:39:17 -05:00
Jeff Mitchell
a8a6fda236 changelog++ 2018-02-12 17:28:11 -05:00
Jeff Mitchell
3ce120e0f9
Add transaction-like behavior for Transit persists. (#3959) 2018-02-12 17:27:28 -05:00
Jeff Mitchell
c3c4d6f62e changelog++ 2018-02-12 16:12:42 -05:00
Jeff Mitchell
a946443711
Validate Consul service name is RFC 1123 compliant (#3961) 2018-02-12 16:11:59 -05:00
Jeff Mitchell
f125cda324 Minor website wording updates 2018-02-12 15:28:06 -05:00
Jeff Mitchell
ce025b953f Document the disable_sealwrap parameter 2018-02-12 15:20:07 -05:00
Jeff Mitchell
d343b8750b Refactor fail logic in inmem 2018-02-12 11:25:48 -05:00
Jeff Mitchell
5f776f660a Convert logical.InmemStorage to a wrapper around physical/inmem.
The original reason for the split was physical's dependencies, but those
haven't been onerous for a long time. Meanwhile it's a totally separate
implementation so we could be getting faulty results from tests. Get rid
of it and use the unified physical/inmem.
2018-02-12 11:16:16 -05:00
Jeff Mitchell
313844f306 Remove package level variables from transit policy test, makes it easier to parallelize later and less magical 2018-02-12 11:04:58 -05:00
Jeff Mitchell
1bb6bf2559 Bump deps 2018-02-10 19:29:52 -05:00
Jeff Mitchell
3ea4038700 changelog++ 2018-02-10 10:08:07 -05:00
Jeff Mitchell
07f8ebbbf6
Various PKI updates (#3953) 2018-02-10 10:07:10 -05:00
Kevin Paulisse
e045cb1134 Decompress data before sending via sys/raw (#3954) 2018-02-09 18:43:48 -05:00
Jeff Mitchell
a9a322aa39
Adds the ability to bypass Okta MFA checks. (#3944)
* Adds the ability to bypass Okta MFA checks.

Unlike before, the administrator opts-in to this behavior, and is
suitably warned.

Fixes #3872
2018-02-09 17:03:49 -05:00
Jeff Mitchell
65328e9c12 Fix race in approle integ test 2018-02-09 17:01:10 -05:00
Jeff Mitchell
f4af988927
Add sealunwrapper to ease OSS downgrades (#3936) 2018-02-09 16:37:40 -05:00
Jeff Mitchell
0995bdbb0d Simplify readonly view logic 2018-02-09 15:39:27 -05:00
Vishal Nayak
e57aff9e69 Make mount view read only until after mount persist (#3910) 2018-02-09 14:04:25 -05:00
Jeff Mitchell
71336d3596 Fix compile 2018-02-09 14:04:05 -05:00
Jeff Mitchell
5d2c8b6b4e changelog++ 2018-02-09 13:55:03 -05:00
Chris Hoffman
4120046ac8 Fix auditing for transit keys with backup/restore info (#3919) 2018-02-09 13:54:18 -05:00
Jeff Mitchell
e172349823 changelog++ 2018-02-09 13:44:54 -05:00
Vishal Nayak
58cab5f59f added a flag to make common name optional if desired (#3940)
* added a flag to make common name optional if desired

* Cover one more case where cn can be empty

* remove skipping when empty; instead check for emptiness before calling validateNames

* Add verification before adding to DNS names to also fix #3918
2018-02-09 13:42:19 -05:00
vishalnayak
f8ec02b65b changelog++ 2018-02-09 10:43:13 -05:00
Vishal Nayak
5bb8fa2469
AppRole/Identity: Fix for race when creating an entity during login (#3932)
* possible fix for race in approle login while creating entity

* Add a test that hits the login request concurrently

* address review comments
2018-02-09 10:40:56 -05:00
alexandrumd
e47c7e866a Change 'rules' parameter for Policies requests (#3947)
With Vault Version: 0.9.1, the following is returned when using "rules" for policies operation:
```The following warnings were returned from the Vault server:
* 'rules' is deprecated, please use 'policy' instead```
2018-02-09 07:43:18 -05:00
Brian Kassouf
1bad693a01
changelog++ 2018-02-08 16:52:14 -08:00
Brian Kassouf
5ccb34744e
plugin/gRPC: fix panic when special paths are not set (#3946)
* plugin/gRPC: fix panic when special paths are not set

* Remove comment
2018-02-08 16:51:26 -08:00
Roger Berlind
f64bcf1a9a Updated replication table (#3929) 2018-02-08 18:11:00 -05:00
Guillaume
d6e38ddf8a Minor tweaks to Windows build scripts (#3931) 2018-02-08 18:09:39 -05:00
Jeff Mitchell
dd9f17ef7d Exclude rekey command tests from race detector 2018-02-08 13:34:45 -05:00
Jeff Mitchell
ec27e83b6e
Update relatedtools.html.md 2018-02-08 11:15:47 -05:00
Robert Kreuzer
8f475dd93f Add vaultenv to the list of related tools (#3945) 2018-02-08 10:30:45 -05:00
vishalnayak
7244efe130 changelog++ 2018-02-07 20:44:33 -05:00
Vishal Nayak
0587540fea
avoid masking of role tag response (#3941) 2018-02-07 20:43:05 -05:00
Chris Hoffman
d285fdf957
Fixing docs links and adding redirects for new guides (#3939)
* updating links

* updating links

* updating links

* updating links

* updating links

* adding redirects
2018-02-07 19:29:07 -05:00
Jeff Mitchell
9501667b35 changelog++ 2018-02-07 15:57:52 -05:00
seanjfellows
4a0d3f6036 Create audit failure metrics unconditionally (#3937) 2018-02-07 15:57:00 -05:00
Jed
b020d310e4 Lil typo fixes (#3925)
Read through the initial docs and noticed a few typos
2018-02-07 09:38:11 -05:00
emily
f59280d6d4 fix IAM diagram for GCP auth method docs (#3927) 2018-02-07 09:37:11 -05:00
Andy Manoske
665406c360
Merge pull request #3855 from hashicorp/new-guides
New Vault Guides
2018-02-06 18:13:06 -08:00
Andy Manoske
8c9aa394cc
Merge branch 'master' into new-guides 2018-02-06 13:09:22 -08:00
vishalnayak
29dc99bbf4 changelog++ 2018-02-06 15:46:22 -05:00
Vishal Nayak
462caf4c6d
AppRole: Cleanup accessor indexes and dangling accessor indexes (#3924)
* Cleanup accessor indexes and dangling accessor indexes

* Add a test that exercises the accessor cleanup
2018-02-06 15:44:48 -05:00
Jeff Mitchell
85c7b528e2
Change grpc's max sent/recv size to a very large value. (#3912) 2018-02-06 13:52:35 -05:00
John Eismeier
acc37c3cc9 Fix some typos (#3923) 2018-02-06 13:35:01 -05:00