9692 Commits

Author SHA1 Message Date
Lars Lehtonen
79b1c910fe Handle dropped checkok pattern in postgresql package (#3046) 2017-07-26 12:28:02 -04:00
James Phillips
06a19456ff Fixes a typo in the VSI doc. (#3047) 2017-07-26 12:18:52 -04:00
Lars Lehtonen
aade17cddc fix swallowed error in vault package. (#2993) 2017-07-26 12:15:54 -04:00
Xiang Li
64d412e111 physical: add default timeout for etcd3 requests (#3053) 2017-07-26 12:10:12 -04:00
Jeremy Voorhis
6e311aa598 s/alterate/alternate/ (#3056) 2017-07-26 11:44:06 -04:00
Vishal Nayak
96e8ffea5a docs: Identity Store (#3055) 2017-07-25 18:33:17 -04:00
Jeff Mitchell
3fb82dbb66
Cut version 0.8.0-beta1 v0.8.0-beta1 2017-07-25 17:44:33 -04:00
Calvin Leung Huang
ce1e883a4f Do not send storage on HandleRequest and HandleExistenceCheck on plugins 2017-07-25 16:57:26 -04:00
Jeff Mitchell
b0ce99d22f Update dockerfile to use debian stable 2017-07-25 16:44:31 -04:00
Jeff Mitchell
75c8c88c47 Sirupsen->sirupsen 2017-07-25 15:49:10 -04:00
Jeff Mitchell
78afc7ccea Remove uppercase Sirupsen logrus dep 2017-07-25 15:36:14 -04:00
Jeff Mitchell
9edac90975 Update version and changelog for 0.8 beta 2017-07-25 15:21:35 -04:00
Chris Hoffman
07ba8cd2eb changelog++ 2017-07-25 13:25:21 -04:00
Chris Hoffman
c7229785ff root protect /sys/revoke-force/* (#2876) 2017-07-25 11:59:43 -04:00
Chris Hoffman
d4b9c17793 moving client calls to new endpoint (#2867) 2017-07-25 11:58:33 -04:00
Chris Hoffman
5e4ba4a7b6 changelog++ 2017-07-23 09:01:34 -04:00
Chris Hoffman
317ae32ca7 CockroachDB Physical Backend (#2713) 2017-07-23 08:54:33 -04:00
Calvin Leung Huang
6dc20ce022 changelog++ 2017-07-20 14:18:52 -04:00
Calvin Leung Huang
31322ce00e changelog++ 2017-07-20 14:17:00 -04:00
Calvin Leung Huang
2b0f80b981 Backend plugin system (#2874)
* Add backend plugin changes

* Fix totp backend plugin tests

* Fix logical/plugin InvalidateKey test

* Fix plugin catalog CRUD test, fix NoopBackend

* Clean up commented code block

* Fix system backend mount test

* Set plugin_name to omitempty, fix handleMountTable config parsing

* Clean up comments, keep shim connections alive until cleanup

* Include pluginClient, disallow LookupPlugin call from within a plugin

* Add wrapper around backendPluginClient for proper cleanup

* Add logger shim tests

* Add logger, storage, and system shim tests

* Use pointer receivers for system view shim

* Use plugin name if no path is provided on mount

* Enable plugins for auth backends

* Add backend type attribute, move builtin/plugin/package

* Fix merge conflict

* Fix missing plugin name in mount config

* Add integration tests on enabling auth backend plugins

* Remove dependency cycle on mock-plugin

* Add passthrough backend plugin, use logical.BackendType to determine lease generation

* Remove vault package dependency on passthrough package

* Add basic impl test for passthrough plugin

* Incorporate feedback; set b.backend after shims creation on backendPluginServer

* Fix totp plugin test

* Add plugin backends docs

* Fix tests

* Fix builtin/plugin tests

* Remove flatten from PluginRunner fields

* Move mock plugin to logical/plugin, remove totp and passthrough plugins

* Move pluginMap into newPluginClient

* Do not create storage RPC connection on HandleRequest and HandleExistenceCheck

* Change shim logger's Fatal to no-op

* Change BackendType to uint32, match UX backend types

* Change framework.Backend Setup signature

* Add Setup func to logical.Backend interface

* Move OptionallyEnableMlock call into plugin.Serve, update docs and comments

* Remove commented var in plugin package

* RegisterLicense on logical.Backend interface (#3017)

* Add RegisterLicense to logical.Backend interface

* Update RegisterLicense to use callback func on framework.Backend

* Refactor framework.Backend.RegisterLicense

* plugin: Prevent plugin.SystemViewClient.ResponseWrapData from getting JWTs

* plugin: Revert BackendType to remove TypePassthrough and related references

* Fix typo in plugin backends docs
2017-07-20 13:28:40 -04:00
Jeff Mitchell
987616895d changelog++ 2017-07-18 15:16:14 -04:00
Brian Kassouf
7b4239e9e7 Dynamically load and invalidate the token store salt (#3021)
* Dynaically load and invalidate the token store salt

* Pass salt function into the router
2017-07-18 09:02:03 -07:00
Jeff Mitchell
79c47b9433 Bump deps 2017-07-18 10:15:54 -04:00
Joel Thompson
88910d0b1c Improve sts header parsing (#3013) 2017-07-18 09:51:45 -04:00
Jeff Mitchell
6f26cea0ab changelog++ 2017-07-18 09:49:48 -04:00
Gobin Sougrakpam
638ef2c9b8 Adding option to set custom vault client timeout using env variable VAULT_CLIENT_TIMEOUT (#3022) 2017-07-18 09:48:31 -04:00
Joel Thompson
98e3c9e3af Let AWS auth CLI helper only generate login data (#3015)
* Let AWS auth CLI helper only generate login data

This will be useful to other golang clients so they can manage the login
process themselves.

Also helps for #2855

* Respond to PR feedback
2017-07-18 08:34:48 -04:00
vishalnayak
e1e874bba0 doc fix 2017-07-18 04:55:00 -04:00
Chris Hoffman
fab73e1f7a fixing Validate() for field data on TypeNameString (#3030) 2017-07-17 13:44:47 -07:00
Calvin Leung Huang
f2a89bb077 changelog++ 2017-07-17 15:03:04 -04:00
Calvin Leung Huang
071e1e6999 Enforce alphanumeric requirement in RandomAlphaNumeric (#3010)
* Enforce alphanumeric requirement in RandomAlphaNumeric

* credsutil: Update comments and tests from feedback
2017-07-17 14:51:27 -04:00
Chris Hoffman
508183a1b3 Add field type TypeNameString (#3028) 2017-07-17 11:39:58 -07:00
Andy Manoske
41fefd49bd Update configuration.html.md (#3029) 2017-07-17 14:37:32 -04:00
Jeff Mitchell
06391c6810 changelog++ 2017-07-17 13:06:04 -04:00
Jeff Mitchell
6876ee8a2c Add max_parallel to mssql and postgresql (#3026)
For storage backends, set max open connections to value of max_parallel.
2017-07-17 13:04:49 -04:00
Jeff Mitchell
5479c891f1 changelog++ 2017-07-17 11:09:29 -04:00
Joel Thompson
9a0c544092 Properly store iam_server_id_header_value (#3014)
In auth/aws/config/client, when only the iam_server_id_header_value was
being updated on an existing config, it wouldn't get stored because I
was trying to avoid unnecessarily flushing the cache of AWS clients, and
the flag to not flush the cache also meant that the updated entry didn't
get written back to the storage. This now adds a new flag for when
other changes occur that don't require flushing the cache but do require
getting written to the storage. It also adds a test for this explicitly.

Fixes #3004
2017-07-17 11:08:57 -04:00
Jeff Mitchell
debe0fbe70 changelog++ 2017-07-17 11:00:02 -04:00
Joel Thompson
284b346a9f Look up proper AWS account ID on aws token renew (#3012)
Also properly handle renewing tokens when bound_iam_principal_arn has a
path component.

Fixes #2990
2017-07-17 10:59:18 -04:00
Jeff Mitchell
af7c2ab14d changelog++ 2017-07-17 10:51:18 -04:00
Gobin Sougrakpam
d3dee1375f Adding validation for certificates to be proper x509 PEM encoded (#3016) 2017-07-17 10:49:50 -04:00
Seth Vargo
31e8349197 Update Policies and Auth concepts pages (#3011) 2017-07-14 11:15:22 -04:00
Jeff Mitchell
b83d9980db changelog++ 2017-07-14 11:05:51 -04:00
Jeff Mitchell
4e4c9aa721 Add metrics counters for audit log failures (#3001)
Fixes #2863
2017-07-14 11:03:56 -04:00
Jeff Mitchell
2404b64750 changelog++ 2017-07-14 11:03:41 -04:00
Jeff Mitchell
ba649324f7 Opportunistically try re-opening file audit fd on error (#2999)
Addresses a pain point from
https://github.com/hashicorp/vault/issues/2863#issuecomment-309434605
2017-07-14 11:03:01 -04:00
Jeff Mitchell
e2fee08488 changelog++ 2017-07-13 19:07:54 -04:00
Jeff Mitchell
c24f56d91c Add approle role name to metadata (#2985) 2017-07-13 19:07:15 -04:00
Jeff Mitchell
cdd68aff95 Reformat some wrapping docs 2017-07-13 19:02:15 -04:00
Jeff Mitchell
203807aea7 Revert "Remove wrapping/wrap from default policy and add a note about guarantees (#2957)" (#3008)
This reverts commit b2d2459711d9cb7552daf1cc2330c07d31ef4f51.
2017-07-13 18:47:29 -04:00