Commit Graph

4449 Commits

Author SHA1 Message Date
Mikhail Zholobov 0b9d0c1cec Update website Vagrantfile (#1689)
* Upgrade base box to `bento/ubuntu-16.04`
* Remove JS stuff
* Install `git` and `bundler`
* Add gpg key for RVM
2016-08-24 13:53:00 -04:00
markrzasa a110cd637c allow a TLS server name to be configured for SSH agents (#1720) 2016-08-23 22:06:56 -04:00
Jeff Mitchell 1ee4cb4725 Strip trailing whitespace in token from file.
Fixes #1774
2016-08-23 20:22:45 -04:00
Adam Greene 66d3117cad fix aws-ec2 formatting around ttl (#1770) 2016-08-23 16:07:57 -04:00
Karl Falconer 6cbae1388e [Documentation] AppRole /login is unauthenticated (#1771) 2016-08-23 16:03:36 -04:00
Jeff Mitchell dd53c4b1d8 Don't validate a dev listen address as that makes a proper Docker
entrypoint difficult.

Fixes #1762
2016-08-23 08:34:43 -04:00
Jeff Mitchell c64dba556c Swap push/pull. 2016-08-22 19:34:53 -04:00
Eric Peterson 6db65c317e Fix grammar (#1759) 2016-08-22 12:17:48 -04:00
Eric Peterson 9bd1a95850 Fix spelling (#1758) 2016-08-22 11:56:37 -04:00
Jeff Mitchell ec12cfa6da Merge pull request #1756 from usererror/patch-1
Update tokens.html.md
2016-08-22 10:49:51 -04:00
S 7395fb02bc Update tokens.html.md
Bullet points at the end were off (probably due to some line wrapping settings somewhere)
2016-08-22 10:47:11 -04:00
Jeff Mitchell 3320aeb4f6 Update upgrade guide 2016-08-22 09:33:36 -04:00
Jeff Mitchell 48eac5434b Bump version 2016-08-22 09:19:13 -04:00
Jeff Mitchell 3369909641
Cut version 0.6.1 2016-08-21 19:40:57 -04:00
Jeff Mitchell 1642013e8b Update version numbers 2016-08-21 19:33:52 -04:00
Jeff Mitchell d1284944c3 Merge pull request #1755 from hashicorp/logxi
Convert to logxi
2016-08-21 19:28:18 -04:00
Jeff Mitchell 58b32e5432 Convert to logxi 2016-08-21 18:13:37 -04:00
Vishal Nayak 6130363383 Merge pull request #1754 from hashicorp/secret-id-read-delete
Seperate endpoints for read/delete using secret-id and accessor
2016-08-21 16:15:55 -04:00
vishalnayak 524ed6db37 Extract out common code 2016-08-21 15:46:11 -04:00
vishalnayak dfe73733d5 Seperate endpoints for read/delete using secret-id and accessor 2016-08-21 14:42:49 -04:00
Jeff Mitchell 865ca94032 Initial fixups, not yet done 2016-08-20 22:39:41 -04:00
Jeff Mitchell 2860dcc60f gofmt 2016-08-19 16:48:32 -04:00
Jeff Mitchell 840774a095 Bump tf version 2016-08-19 15:23:38 -04:00
Jeff Mitchell 0f7fa264cd Merge pull request #1753 from hashicorp/adv-cleanup
Cleanup and avoid unnecessary advertisement parsing in leader check
2016-08-19 15:22:43 -04:00
Jeff Mitchell 2bb8adcbde Cleanup and avoid unnecessary advertisement parsing in leader check 2016-08-19 14:49:11 -04:00
Jeff Mitchell b7acf5b5ab Rename proto service stuff and change log levels for some messages 2016-08-19 11:49:25 -04:00
Jeff Mitchell bdcfe05517 Clustering enhancements (#1747) 2016-08-19 11:03:53 -04:00
vishalnayak 87c42a796b s/advertisement/redirect 2016-08-19 10:52:14 -04:00
Jeff Mitchell 0029559ab0 Update location of LDAP docs in upgrade guide.
Fixes #1656
2016-08-19 10:31:31 -04:00
Jeff Mitchell 56940c282b Force dev on when dev-ha is on 2016-08-19 08:29:34 -04:00
Vishal Nayak fa4c80412d Merge pull request #1751 from hashicorp/fix-aws-ec2-ttl
aws-ec2: se max_ttl when ttl is not set, during login
2016-08-18 16:08:49 -04:00
vishalnayak 7ce631f1dc Pretty print the warning 2016-08-18 16:09:10 -04:00
vishalnayak 870ffd6fd8 Use shortestTTL value during renewals too 2016-08-18 15:43:58 -04:00
vishalnayak 4f1c47478e When TTL is not set, consider the system default TTL as well 2016-08-18 15:37:59 -04:00
vishalnayak 56b8c33c95 aws-ec2: se max_ttl when ttl is not set, during login 2016-08-18 15:16:32 -04:00
Jeff Mitchell 6fc9a956bc changelog++ 2016-08-18 12:21:23 -04:00
Jeff Mitchell 5fd59b96c2 Merge pull request #1750 from hashicorp/status-code-change
Change uninit/sealed status codes from health endpoint
2016-08-18 12:17:38 -04:00
Jeff Mitchell c349e697f5 Change uninit/sealed status codes from health endpoint 2016-08-18 12:10:23 -04:00
Jeff Mitchell 0691d7e92a cl++ 2016-08-18 11:28:59 -04:00
Jeff Mitchell bbf2d0508e Merge pull request #1749 from maf23/added_missing_ttl_doc
Mention ttl parameter in the documentation of /auth/aws-ec2/role/<role>
2016-08-18 07:25:20 -04:00
Martin Forssen a617ff0f93 Mention ttl parameter in the documentation of /auth/aws-ec2/role/<role>
This parameter was not documented
2016-08-18 13:16:58 +02:00
Jeff Mitchell 150dd59332 Merge pull request #1744 from hashicorp/jbs-clarification
Add a bit of clarification
2016-08-17 17:47:06 -04:00
Jeff Mitchell 5c33356d14 Protobuf for forwarding (#1743) 2016-08-17 16:15:15 -04:00
Brian Shumate a941dbdd76 Add a bit of clarification 2016-08-17 16:07:30 -04:00
Jeff Mitchell 8d6244f8e7 Don't serialize the full connection state, instead just the peer certificates, and parse them on the other side 2016-08-17 10:29:53 -04:00
Jeff Mitchell e7261bc31f Merge pull request #1740 from hashicorp/fix-upgrade-periodic-roles
Ensure we don't use a token entry period of 0 in role comparisons.
2016-08-16 16:59:56 -04:00
Jeff Mitchell 01702415c2 Ensure we don't use a token entry period of 0 in role comparisons.
When we added support for generating periodic tokens for root/sudo in
auth/token/create we used the token entry's period value to store the
shortest period found to eventually populate the TTL. The problem was
that we then assumed later that this value would be populated for
periodic tokens, when it wouldn't have been in the upgrade case.

Instead, use a temp var to store the proper value to use; populate
te.Period only if actually given; and check that it's not zero before
comparing against role value during renew.
2016-08-16 16:47:46 -04:00
Jeff Mitchell c1aa89363a Make time logic a bit clearer 2016-08-16 16:29:07 -04:00
Jeff Mitchell 02d9702fbd Add local into handler path for forwarded requests 2016-08-16 11:46:37 -04:00
Jeff Mitchell c6b6901059 update Dockerfile for Go 1.7 final 2016-08-16 11:23:43 -04:00