markrzasa
a110cd637c
allow a TLS server name to be configured for SSH agents ( #1720 )
2016-08-23 22:06:56 -04:00
Jeff Mitchell
1ee4cb4725
Strip trailing whitespace in token from file.
...
Fixes #1774
2016-08-23 20:22:45 -04:00
Adam Greene
66d3117cad
fix aws-ec2 formatting around ttl ( #1770 )
2016-08-23 16:07:57 -04:00
Karl Falconer
6cbae1388e
[Documentation] AppRole /login is unauthenticated ( #1771 )
2016-08-23 16:03:36 -04:00
Jeff Mitchell
dd53c4b1d8
Don't validate a dev listen address as that makes a proper Docker
...
entrypoint difficult.
Fixes #1762
2016-08-23 08:34:43 -04:00
Jeff Mitchell
c64dba556c
Swap push/pull.
2016-08-22 19:34:53 -04:00
Eric Peterson
6db65c317e
Fix grammar ( #1759 )
2016-08-22 12:17:48 -04:00
Eric Peterson
9bd1a95850
Fix spelling ( #1758 )
2016-08-22 11:56:37 -04:00
Jeff Mitchell
ec12cfa6da
Merge pull request #1756 from usererror/patch-1
...
Update tokens.html.md
2016-08-22 10:49:51 -04:00
S
7395fb02bc
Update tokens.html.md
...
Bullet points at the end were off (probably due to some line wrapping settings somewhere)
2016-08-22 10:47:11 -04:00
Jeff Mitchell
3320aeb4f6
Update upgrade guide
2016-08-22 09:33:36 -04:00
Jeff Mitchell
48eac5434b
Bump version
2016-08-22 09:19:13 -04:00
Jeff Mitchell
3369909641
Cut version 0.6.1
2016-08-21 19:40:57 -04:00
Jeff Mitchell
1642013e8b
Update version numbers
2016-08-21 19:33:52 -04:00
Jeff Mitchell
d1284944c3
Merge pull request #1755 from hashicorp/logxi
...
Convert to logxi
2016-08-21 19:28:18 -04:00
Jeff Mitchell
58b32e5432
Convert to logxi
2016-08-21 18:13:37 -04:00
Vishal Nayak
6130363383
Merge pull request #1754 from hashicorp/secret-id-read-delete
...
Seperate endpoints for read/delete using secret-id and accessor
2016-08-21 16:15:55 -04:00
vishalnayak
524ed6db37
Extract out common code
2016-08-21 15:46:11 -04:00
vishalnayak
dfe73733d5
Seperate endpoints for read/delete using secret-id and accessor
2016-08-21 14:42:49 -04:00
Jeff Mitchell
865ca94032
Initial fixups, not yet done
2016-08-20 22:39:41 -04:00
Jeff Mitchell
2860dcc60f
gofmt
2016-08-19 16:48:32 -04:00
Jeff Mitchell
840774a095
Bump tf version
2016-08-19 15:23:38 -04:00
Jeff Mitchell
0f7fa264cd
Merge pull request #1753 from hashicorp/adv-cleanup
...
Cleanup and avoid unnecessary advertisement parsing in leader check
2016-08-19 15:22:43 -04:00
Jeff Mitchell
2bb8adcbde
Cleanup and avoid unnecessary advertisement parsing in leader check
2016-08-19 14:49:11 -04:00
Jeff Mitchell
b7acf5b5ab
Rename proto service stuff and change log levels for some messages
2016-08-19 11:49:25 -04:00
Jeff Mitchell
bdcfe05517
Clustering enhancements ( #1747 )
2016-08-19 11:03:53 -04:00
vishalnayak
87c42a796b
s/advertisement/redirect
2016-08-19 10:52:14 -04:00
Jeff Mitchell
0029559ab0
Update location of LDAP docs in upgrade guide.
...
Fixes #1656
2016-08-19 10:31:31 -04:00
Jeff Mitchell
56940c282b
Force dev on when dev-ha is on
2016-08-19 08:29:34 -04:00
Vishal Nayak
fa4c80412d
Merge pull request #1751 from hashicorp/fix-aws-ec2-ttl
...
aws-ec2: se max_ttl when ttl is not set, during login
2016-08-18 16:08:49 -04:00
vishalnayak
7ce631f1dc
Pretty print the warning
2016-08-18 16:09:10 -04:00
vishalnayak
870ffd6fd8
Use shortestTTL value during renewals too
2016-08-18 15:43:58 -04:00
vishalnayak
4f1c47478e
When TTL is not set, consider the system default TTL as well
2016-08-18 15:37:59 -04:00
vishalnayak
56b8c33c95
aws-ec2: se max_ttl when ttl is not set, during login
2016-08-18 15:16:32 -04:00
Jeff Mitchell
6fc9a956bc
changelog++
2016-08-18 12:21:23 -04:00
Jeff Mitchell
5fd59b96c2
Merge pull request #1750 from hashicorp/status-code-change
...
Change uninit/sealed status codes from health endpoint
2016-08-18 12:17:38 -04:00
Jeff Mitchell
c349e697f5
Change uninit/sealed status codes from health endpoint
2016-08-18 12:10:23 -04:00
Jeff Mitchell
0691d7e92a
cl++
2016-08-18 11:28:59 -04:00
Jeff Mitchell
bbf2d0508e
Merge pull request #1749 from maf23/added_missing_ttl_doc
...
Mention ttl parameter in the documentation of /auth/aws-ec2/role/<role>
2016-08-18 07:25:20 -04:00
Martin Forssen
a617ff0f93
Mention ttl parameter in the documentation of /auth/aws-ec2/role/<role>
...
This parameter was not documented
2016-08-18 13:16:58 +02:00
Jeff Mitchell
150dd59332
Merge pull request #1744 from hashicorp/jbs-clarification
...
Add a bit of clarification
2016-08-17 17:47:06 -04:00
Jeff Mitchell
5c33356d14
Protobuf for forwarding ( #1743 )
2016-08-17 16:15:15 -04:00
Brian Shumate
a941dbdd76
Add a bit of clarification
2016-08-17 16:07:30 -04:00
Jeff Mitchell
8d6244f8e7
Don't serialize the full connection state, instead just the peer certificates, and parse them on the other side
2016-08-17 10:29:53 -04:00
Jeff Mitchell
e7261bc31f
Merge pull request #1740 from hashicorp/fix-upgrade-periodic-roles
...
Ensure we don't use a token entry period of 0 in role comparisons.
2016-08-16 16:59:56 -04:00
Jeff Mitchell
01702415c2
Ensure we don't use a token entry period of 0 in role comparisons.
...
When we added support for generating periodic tokens for root/sudo in
auth/token/create we used the token entry's period value to store the
shortest period found to eventually populate the TTL. The problem was
that we then assumed later that this value would be populated for
periodic tokens, when it wouldn't have been in the upgrade case.
Instead, use a temp var to store the proper value to use; populate
te.Period only if actually given; and check that it's not zero before
comparing against role value during renew.
2016-08-16 16:47:46 -04:00
Jeff Mitchell
c1aa89363a
Make time logic a bit clearer
2016-08-16 16:29:07 -04:00
Jeff Mitchell
02d9702fbd
Add local into handler path for forwarded requests
2016-08-16 11:46:37 -04:00
Jeff Mitchell
c6b6901059
update Dockerfile for Go 1.7 final
2016-08-16 11:23:43 -04:00
Jeff Mitchell
734e80ca56
Add permit pool to dynamodb
2016-08-15 19:45:06 -04:00