1304 Commits

Author SHA1 Message Date
Armon Dadgar
a7ebd51391 api: Support the rekey endpoints 2015-05-28 14:37:20 -07:00
Armon Dadgar
24ed178f44 http: adding rekey handlers 2015-05-28 14:28:50 -07:00
boncheff
d8a3bdc2d7 Update index.html.md
Updated the docs to show an example of how to read/write a secret using the HTTP API
2015-05-28 22:28:25 +01:00
Armon Dadgar
7606f43ea1 vault: more logging 2015-05-28 14:15:06 -07:00
Armon Dadgar
87963f9db2 vault: minor rekey cleanups 2015-05-28 12:07:52 -07:00
Armon Dadgar
56f9f20aad vault: testing rekey 2015-05-28 12:02:30 -07:00
Armon Dadgar
c1bd04b416 vault: first pass at rekey 2015-05-28 11:40:01 -07:00
Armon Dadgar
3c812e1dfa vault: ensure master key is copied to avoid memzero issues 2015-05-28 11:38:59 -07:00
Armon Dadgar
4731c48948 vault: Adding VerifyMaster to Barrier 2015-05-28 11:28:33 -07:00
Armon Dadgar
7e1f7d8c1c vault: prevent raw access to protected paths 2015-05-28 10:24:41 -07:00
Armon Dadgar
4a11980dc1 command/rotate: Adding new rotate command 2015-05-28 10:16:33 -07:00
Armon Dadgar
8f5b7dfe50 Merge pull request #269 from sheldonh/getting_started_deploy_consul
Use local Consul instance in deploy walkthrough
2015-05-28 10:06:36 -07:00
Armon Dadgar
c40371bfd2 Merge pull request #268 from sheldonh/howto_mlock
Document unprivileged mlock on Linux
2015-05-28 10:03:10 -07:00
Sheldon Hearn
c2390f2a29 Don't recommend exporting VAULT_TOKEN
It's not needed by the dev server (which writes ~/.vault-token),
and breaks the Getting Started guide (e.g. #267).
2015-05-28 14:39:35 +02:00
Sheldon Hearn
0cf95d9393 Use local Consul instance in deploy walkthrough
As per hashicorp/vault#217, demo.consul.io prevents sessions from being
created, which means you can't use it as a backend for Vault.
2015-05-28 14:11:34 +02:00
Sheldon Hearn
233a862b60 Mention disable_mlock in deploy walkthrough 2015-05-28 13:24:28 +02:00
Sheldon Hearn
d1ec264eff Clarify the disable_mlock option 2015-05-28 12:40:56 +02:00
Ken Breeman
794cca7f85 Cleaned up error handling and HA lock monitoring for zookeeper physical backend based on PR feedback. 2015-05-28 00:39:12 -04:00
Armon Dadgar
db55ac7d74 command/key-status: Adding new key-status command 2015-05-27 18:17:02 -07:00
Armon Dadgar
0d22532537 api: Adding Rotate and KeyStatus 2015-05-27 18:05:23 -07:00
Armon Dadgar
2091907ab1 http: adding key-status and rotate handlers 2015-05-27 18:02:50 -07:00
Armon Dadgar
ba66058408 vault: more logging around rotate 2015-05-27 17:56:55 -07:00
Armon Dadgar
0fa3e06cde vault: adding sys/key-status and sys/rotate 2015-05-27 17:53:42 -07:00
Armon Dadgar
083fa51bfb vault: expose information about keys 2015-05-27 17:25:36 -07:00
Armon Dadgar
2fe8158591 vault: testing barrier rekey 2015-05-27 17:17:03 -07:00
Armon Dadgar
9747230ae5 vault: first pass at rekey 2015-05-27 17:13:40 -07:00
Armon Dadgar
639e857b11 vault: testing key rotation 2015-05-27 17:10:08 -07:00
Armon Dadgar
a06ea1756c vault: first pass at key rotation 2015-05-27 17:05:02 -07:00
Armon Dadgar
b1ec5eebdc vault: keyring api changes 2015-05-27 17:04:46 -07:00
Armon Dadgar
81fb0fab43 vault: make keyring immutable 2015-05-27 16:58:55 -07:00
Armon Dadgar
e021f099ff vault: test for backwards compatability 2015-05-27 16:42:42 -07:00
Jonathan Sokolowski
dd7d64dd80 logical/consul: Combine policy and lease into single storage struct 2015-05-28 09:36:23 +10:00
Armon Dadgar
9af0a4c164 vault: share keyring persistence code 2015-05-27 16:29:59 -07:00
Armon Dadgar
dc977a03e4 vault: first pass at keyring integration 2015-05-27 16:01:25 -07:00
Armon Dadgar
4cf5fdbb03 vault: adding path for keyring 2015-05-27 15:23:43 -07:00
Armon Dadgar
1d91a42d19 vault: Adding version to key entry 2015-05-27 15:23:31 -07:00
Armon Dadgar
bd3b6ed653 vault: Ensure we always set a key InstallTime 2015-05-27 14:37:40 -07:00
Armon Dadgar
a7a4712829 vault: Adding InstallTime to key in keyring 2015-05-27 14:37:40 -07:00
Armon Dadgar
a05bcbac2e vault: Adding keyring 2015-05-27 14:37:40 -07:00
Armon Dadgar
beb4f2ff0f vault: rename key epoch to term for clarity 2015-05-27 14:37:39 -07:00
Armon Dadgar
2a71cf4f0b vault: physical -> storage for clarity 2015-05-27 14:33:58 -07:00
Armon Dadgar
7380fdf404 Merge pull request #265 from certifiedloud/master
replaced confusing term 'physical' with 'storage'. Fix for #262
2015-05-27 14:33:00 -07:00
Armon Dadgar
69320aeb33 Merge pull request #266 from hashicorp/f-http
Support for HTTP Response overwriting
2015-05-27 14:21:09 -07:00
Armon Dadgar
bc262df2aa vault: testing raw responses 2015-05-27 14:19:12 -07:00
Armon Dadgar
aa548cf901 http: support raw HTTP output 2015-05-27 14:10:00 -07:00
Armon Dadgar
11957e5480 logical: Adding special fields to do raw HTTP 2015-05-27 14:09:47 -07:00
certifiedloud
2521e90ef7 replaced confusing term 'physical' with 'storage'. 2015-05-27 14:44:17 -06:00
Armon Dadgar
f366cf2f51 vault: Expose MountPoint to secret backend. Fixes #248 2015-05-27 11:46:42 -07:00
Armon Dadgar
aa867120b3 Merge pull request #251 from DavidWittman/auth-prompt-without-args
Prompt for auth token when no args provided
2015-05-27 11:24:33 -07:00
Armon Dadgar
862b65350b Merge pull request #250 from DavidWittman/233-auth-stdin
Read from stdin with auth command
2015-05-27 11:24:14 -07:00