9692 Commits

Author SHA1 Message Date
Jon Benson
542d4cda62 Fix typo (#3237) 2017-08-25 09:51:33 -04:00
Brian Kassouf
41219493ec Update to go1.9 on travis 2017-08-24 15:55:04 -07:00
Brian Kassouf
3b91319458 changelog++ 2017-08-24 15:28:12 -07:00
Brian Kassouf
41db07530a Add basic autocompletion (#3223)
* Add basic autocompletion

* Add autocomplete to some common commands

* Autocomplete the generate-root flags

* Add information about autocomplete to the docs
2017-08-24 15:23:40 -07:00
Jeff Mitchell
f526091a7d Have Okta properly handle create/update for org/ttl/max_ttl. (#3236) 2017-08-24 18:18:05 -04:00
Chris Hoffman
950eaeea55 fix docs formatting 2017-08-24 11:23:26 -04:00
Christopher Pauley
446c25aacc update gcs backend tests- now strongly consistent (#3231) 2017-08-24 10:11:11 -04:00
Serg
c228f880c8 Update index.html.md (#3233) 2017-08-24 10:08:35 -04:00
Chris Hoffman
a7105536d6 Add GET variant on LIST endpoints (#3232) 2017-08-23 17:59:22 -04:00
Jeff Mitchell
58e6ad9a80 changelog++ 2017-08-23 12:01:03 -04:00
Doyoon Kim
f855da7a89 Moved PROXY protocol wrap to execute before the TLS wrap (#3195) 2017-08-23 12:00:09 -04:00
Jeff Mitchell
e80808bffc changelog++ 2017-08-22 09:51:44 -04:00
EXPEddrewery
a4f4e5bf34 Add 'Period' support to AWS IAM token renewal (#3220) 2017-08-22 09:50:53 -04:00
Seth Vargo
be57fd0594 Thread stderr through too (#3211)
* Thread stderr through too

* Small docs typo
2017-08-21 17:23:29 -04:00
Seth Vargo
9eacae526e Addd more SSH CA troubleshooting (#3201)
* Add notes about pty and other permit-* extensions

* Update troubleshooting

* Add an example of JSON for sign

* Fix a bug about what keys to push up
2017-08-21 17:22:54 -04:00
Yaroslav Lukyanov
1c3f2e8699 add new php client to the doc (#3206) 2017-08-21 13:07:03 -04:00
Jeff Mitchell
52401fd0e5 changelog++ 2017-08-18 19:48:56 -04:00
Jeff Mitchell
88e9d194fd Properly lowercase policy names. (#3210)
Previously we lowercased names on ingress but not on lookup or delete
which could cause unexpected results. Now, just unilaterally lowercase
policy names on write and delete. On get, to avoid the performance hit
of always lowercasing when not necessary since it's in the critical
path, we have a minor optimization -- we check the LRU first before
normalizing. For tokens, because they're already normalized when adding
policies during creation, this should always work; it might just be
slower for API calls.

Fixes #3187
2017-08-18 19:47:23 -04:00
Jeff Mitchell
60fec10472 Revert "Add the ability to use root credentials for AWS IAM authentication. (#3181)" (#3212)
This reverts commit e99a2cd87726986cb0896fdc445a3d5f3c11a66d.

Fixes #3198

See discussion in #3198 for context.
2017-08-18 19:46:08 -04:00
Calvin Leung Huang
4ff2ad649c Update gcp auth backend docs (#3209)
* Update gcp auth backend docs

* Minor formatting and wording fixes

* Minor formatting fixes
2017-08-18 16:25:52 -04:00
Seth Vargo
dcd2de395d Do not revoke SSH key (#3208)
There is no secret to revoke - this produces an error on the CLI
2017-08-18 15:44:20 -04:00
Seth Vargo
9a50117991
Update CHANGELOG 2017-08-18 13:02:38 -04:00
Seth Vargo
a9b384948a Merge pull request #3194 from hashicorp/sethvargo/ssh_ca_login
Add SSH CLI CA type authentication
2017-08-18 12:59:33 -04:00
Seth Vargo
edd447461a
Add host key checking for SSH CA 2017-08-18 12:59:09 -04:00
Seth Vargo
b5fd472cc1
Revoke temporary cred after creation, update warning
/cc @vishalnayak
2017-08-18 12:59:09 -04:00
Seth Vargo
72f66559eb
Initial pass at SSH CLI CA type authentication
1. The current implementation of the SSH command is heavily tied to the
assumptions of OTP/dynamic key types. The SSH CA backend is
fundamentally a different approach to login and authentication. As a
result, there was some restructuring of existing methods to share more
code and state.

2. Each authentication method (ca, otp, dynamic) are now fully-contained
in their own handle* function.

3. -mode and -role are going to be required for SSH CA, and I don't
think the magical UX (and overhead) of guessing them is a good UX. It's
confusing as to which role and how Vault guesses. We can reduce 66% of
the API calls and add more declaration to the CLI by making -mode and
-role required. This commit adds warnings for that deprecation, but
these values are both required for CA type authentication.

4. The principal and extensions are currently fixed, and I personally
believe that's good enough for the first pass at this. Until we
understand what configuration options users will want, I think we should
ship with all the local extensions enabled. Users who don't want that
can generate the key themselves directly (current behavior) or submit
PRs to make the map of extensions customizable.

5. Host key checking for the CA backend is not currently implemented.
It's not strictly required at setup, so I need to think about whether it
belongs here.

This is not ready for merge, but it's ready for early review.
2017-08-18 12:59:08 -04:00
Seth Vargo
f052e7fdf3
Add SignKey endpoint for SSH API client 2017-08-18 12:59:08 -04:00
Paulo Ribeiro
e4c87052ab Fix typo in AppRole API page (#3207) 2017-08-18 10:46:29 -04:00
Seth Vargo
3f9c0521b4 Merge pull request #3200 from macInfinity/patch-1
Update policies.html.md
2017-08-17 18:35:41 -04:00
Chris Maki
f36f0066a5 Update policies.html.md
Using the latest vault release, I was getting the following error when the policy used `write`:

Error: Error making API request.

URL: PUT http://0.0.0.0:8200/v1/sys/policy/secret
Code: 400. Errors:

* Failed to parse policy: path "secret/*": invalid capability 'write'

I think `create` is the correct new Capability.
2017-08-17 12:26:29 -07:00
Seth Vargo
4db7350e5f
YAML is literally the worst 2017-08-17 11:42:47 -04:00
Seth Vargo
8f63b9186c
Update news 2017-08-17 11:34:22 -04:00
Seth Vargo
39a600c2f6 Merge pull request #3166 from hashicorp/sethvargo/ssh_ca_expanse
Refactor SSH CA backend docs
2017-08-16 18:39:19 -04:00
Seth Vargo
1a907c81d4
Typo fix 2017-08-16 18:38:35 -04:00
Seth Vargo
1a7a39d4fd
Refactor SSH CA backend docs 2017-08-16 18:38:35 -04:00
Calvin Leung Huang
82c5118500 Improve auth-enable output for plugin backends (#3189)
* Improve auth-enable output for plugin backends

* Unquote authType on final output
2017-08-16 14:31:16 -04:00
Brian Kassouf
1d03ad7420 Fix a few links (#3188) 2017-08-16 10:27:12 -07:00
Jeff Mitchell
94abf01931 Fix ping docs location 2017-08-16 12:57:31 -04:00
Jeff Mitchell
8d76a41854
Cut version 0.8.1 v0.8.1 2017-08-16 12:41:35 -04:00
Jeff Mitchell
7c6e18d71e plugins/backend/reload -> plugins/reload/backend (#3186) 2017-08-16 12:40:38 -04:00
Calvin Leung Huang
527e23411d Fix plugin docs (#3185)
* Fix plugin docs

* Add plugin_name to auth endpoint
2017-08-16 12:36:46 -04:00
Jeff Mitchell
6c32b7d734 Bump version for release 2017-08-16 11:55:06 -04:00
Jeff Mitchell
c14d445de4 Bump go-plugin dep 2017-08-16 11:41:06 -04:00
Jeff Mitchell
5d37bd54ef Remove erroneous flag from hmac docs 2017-08-16 11:27:39 -04:00
Jeff Mitchell
a7f3f40f9e * Add ability to specify a plugin dir in dev mode (#3184)
* Change (with backwards compatibility) sha_256 to sha256 for plugin
registration
2017-08-16 11:17:50 -04:00
Jeff Mitchell
27c2386f4a Add gcp auth backend (#3183) 2017-08-16 10:31:34 -04:00
Calvin Leung Huang
16863dbe4a changelog++ 2017-08-15 22:21:42 -04:00
Calvin Leung Huang
c8388a9eba Add plugin auto-reload capability (#3171)
* Add automatic plugin reload

* Refactor builtin/backend

* Remove plugin reload at the core level

* Refactor plugin tests

* Add auto-reload test case

* Change backend to use sync.RWMutex, fix dangling test plugin processes

* Add a canary to plugin backends to avoid reloading many times (#3174)

* Call setupPluginCatalog before mount-related operations in postUnseal

* Don't create multiple system backends since core only holds a reference (#3176)

to one.
2017-08-15 22:10:32 -04:00
Jeff Mitchell
cd43a94461 changelog++ 2017-08-15 22:07:39 -04:00
Jeff Mitchell
f51e5e8b26 changelog++ 2017-08-15 22:05:40 -04:00