Armon Dadgar
a7b1ec6592
Merge pull request #241 from abedra/doc_fixes
...
Fix typo in app-id docs
2015-05-20 12:27:09 -07:00
Ian Unruh
2e1bce27a9
Allow dot in LDAP login username
2015-05-20 11:54:15 -07:00
James Stremick
64182d57c3
AWS dependency update
2015-05-20 11:46:21 -04:00
James Stremick
53979d6f30
Physical S3 backend implementation
2015-05-20 10:59:03 -04:00
Aaron Bedra
ed9b44bb44
Fix typo in app-id docs
2015-05-20 09:36:54 -05:00
Seth Vargo
05e59edb02
Merge pull request #239 from ijin/patch-1
...
Document that Vault Server needs to be running for vault help path
2015-05-20 12:28:31 +02:00
Seth Vargo
4f34a670e6
Merge pull request #232 from dmccarney/master
...
Minor documentation typo fixes.
2015-05-20 12:27:47 +02:00
Michael H. Oshita
e2a923a887
Document that Vault Server needs to be running for vault help path
...
Confused initial, I tried running `vault help secret` by itself and found out that the server needs to be running to execute this command.
Furthermore, the client needs `VAULT_ADDR` configured (`http://127.0.0.1:8200 ` in dev mode, since it uses https by default) to interact with the server.
2015-05-20 17:06:59 +09:00
Jonathan Sokolowski
be2538aca3
http: Extract IP from RemoteAddr correctly
2015-05-20 15:23:41 +10:00
Paul Hinze
513a8edc67
Merge pull request #230 from hashicorp/b-tf-mod-ports
...
terraform: allow SG rule customization
2015-05-19 15:56:33 -05:00
Paul Hinze
46a7dafcf4
terraform: allow SG rule customization
...
Switches SG rules to from nested to top-level resources and exports the
SG ids so that users of the module can define additional rules for their
Vault instances and/or the Vault ELB.
While this change should be backwards compatible, applying the new rules
might result in a very brief interruption of Vault service as:
(1) Old nested-resource SG rules are cleared
(2) New SG rules are applied one by one
2015-05-19 15:08:37 -05:00
Daniel McCarney
c7bf89cf60
Add missing word to storage backend threat model.
2015-05-19 12:11:48 -07:00
Daniel McCarney
af1aabe397
Fix "the a lease ID" typo.
2015-05-19 12:07:07 -07:00
Daniel McCarney
dc5e1a714a
Fix "all everything" typo in Secrets description.
2015-05-19 11:59:20 -07:00
Armon Dadgar
4981b8de29
Merge pull request #224 from ianunruh/feature/unseal-msg
...
Improve unseal CLI message
2015-05-19 11:33:23 -07:00
Armon Dadgar
c81207c6bd
Merge pull request #225 from ianunruh/fix/gh-213
...
HTTP should return 503 when sealed
2015-05-19 11:32:37 -07:00
Seth Vargo
7c8af14f4c
Merge pull request #221 from ianunruh/fix/api-docs
...
Remove non-existent unseal API argument
2015-05-19 15:44:32 +02:00
Ian Unruh
63199e5af4
HTTP should return 503 when sealed
2015-05-19 00:59:19 -07:00
Ian Unruh
faa07cc165
Improve unseal CLI message
2015-05-19 00:34:18 -07:00
David Wittman
b04332f8fc
Fail gracefully if a phys backend is not supplied
2015-05-18 22:55:12 -05:00
Ian Unruh
c0409b69ae
Remove non-existent unseal API argument
2015-05-18 19:59:18 -07:00
Armon Dadgar
cc966d6b52
auth/cert: Guard against empty certs. Fixes #214
2015-05-18 16:11:09 -07:00
Armon Dadgar
9c916386de
Update github.html.md
...
Fixing incorrect documentation about case sensitivity
2015-05-18 09:37:31 -07:00
Armon Dadgar
3f3133b066
Merge pull request #204 from nrocine/master
...
Added implementation details to the GitHub Auth Docs on the Vault Website
2015-05-18 09:36:35 -07:00
Armon Dadgar
91801e607a
Merge pull request #218 from jefferai/master
...
Add website/build to gitignore
2015-05-18 09:35:57 -07:00
Jeff Mitchell
0db6b5e233
Add website/build to gitignore
2015-05-18 10:55:13 -04:00
Armon Dadgar
d15eed47ad
vault: reproducing GH-203
2015-05-15 17:48:03 -07:00
Armon Dadgar
3bcd32228d
vault: lease renewal should not create new lease entry
2015-05-15 17:47:39 -07:00
Armon Dadgar
18795a4b26
vault: Adding test based on bug report
2015-05-15 17:19:41 -07:00
Armon Dadgar
0b84e86483
vault: Adding more logging
2015-05-15 17:19:32 -07:00
Armon Dadgar
8be1d884b8
Merge pull request #201 from hashicorp/sethvargo/tls_disable
...
Explicitly check if tls_disable == 1
2015-05-15 16:16:42 -07:00
Seth Vargo
88d5d6a4c8
Use strconv.ParseBool
2015-05-15 16:41:30 -04:00
Seth Vargo
a2831b0144
Explicitly check if tls_disable == 1
2015-05-15 16:39:30 -04:00
Seth Vargo
8c6afd8409
Merge pull request #211 from hashicorp/sethvargo/update_middleman
...
Use new middleman-hashicorp
2015-05-15 16:31:57 -04:00
Seth Vargo
7c6033c728
Use new middleman-hashicorp
2015-05-15 16:15:58 -04:00
Armon Dadgar
af118da257
Merge pull request #202 from hashicorp/sethvargo/error_message
...
Improve error message when TLS is disabled
2015-05-15 12:52:37 -07:00
Armon Dadgar
56659a2db2
cred/app-id: ensure consistent error message
2015-05-15 11:45:57 -07:00
Armon Dadgar
8cff23f29b
cred/app-id: stricter validation and error messaging
2015-05-15 11:40:45 -07:00
Armon Dadgar
3b1df5a8ca
website: clarify the app-id parameters
2015-05-15 11:39:05 -07:00
Armon Dadgar
4f6aab2eb7
Merge pull request #200 from jsok/app-id-delete-operation
...
credential/app-id: Support deleting user-ids from mapping
2015-05-15 11:35:22 -07:00
Armon Dadgar
501d81a4ef
Merge pull request #207 from NathanMcCauley/master
...
update info on keywhiz vs vault
2015-05-15 10:33:59 -07:00
Nathan McCauley
dd6de90a3f
update info on keywhiz
2015-05-15 00:34:25 -07:00
Jonathan Sokolowski
d58512b3f8
logical/framework: Fix help text in PathMap
2015-05-15 07:56:32 +10:00
Nils Rocine
6481c13bcc
Added details in the github auth docs for the website. These details clarify end-to-end use of the github auth backend. Specifically: noting how to create a usable GitHub PAT and an example of how to auth with the PAT.
2015-05-14 13:20:58 -07:00
Seth Vargo
fc2ac74c5f
Improve error message when TLS is disabled
...
Fixes #198
2015-05-14 10:33:38 -04:00
Seth Vargo
031d33e2e5
Remove reference to Vagrantfile
...
Fixes #186
2015-05-14 09:48:36 -04:00
Seth Vargo
e6007de65a
Merge pull request #199 from tpounds/fix-doc-typo
...
Fix minor documentation typo.
2015-05-14 09:47:43 -04:00
Jonathan Sokolowski
6746a24c78
credential/app-id: Test DeleteOperation
2015-05-14 22:30:02 +10:00
Jonathan Sokolowski
283e8ccacb
logical/framework: Add delete to PathMap
2015-05-14 22:28:33 +10:00
Jonathan Sokolowski
896f9cd4d3
logical/framework: Add delete to PathStruct
2015-05-14 22:25:30 +10:00