Jeff Mitchell
256a6b2b33
Fix test build
2018-06-09 18:18:00 -04:00
Jeff Mitchell
405bce896c
Bump Go version in cross Dockerfile
2018-06-09 18:09:45 -04:00
Jeff Mitchell
f23ff11abe
Fast-path root
2018-06-09 17:41:46 -04:00
Jeff Mitchell
d3cbde6ae2
Fix nil pointer
2018-06-09 16:57:57 -04:00
Jeff Mitchell
8916f6b625
Some atomic cleanup ( #4732 )
...
Taking inspiration from
https://github.com/golang/go/issues/17604#issuecomment-256384471
suggests that taking the address of a stack variable for use in atomics
works (at least, the race detector doesn't complain) but is doing it
wrong.
The only other change is a change in Leader() detecting if HA is enabled
to fast-path out. This value never changes after NewCore, so we don't
need to grab the read lock to check it.
2018-06-09 15:35:22 -04:00
Jeff Mitchell
e461b945a5
Add a test for nil-ing out request tokenentry
2018-06-08 19:55:39 -04:00
Jeff Mitchell
743e31202d
Don't pass te to backends
2018-06-08 17:53:28 -04:00
Jeff Mitchell
be64c859e1
Make sure updating pending and storage are done as a group ( #4727 )
2018-06-08 17:24:44 -04:00
Jeff Mitchell
575a606db7
Move TokenEntry into logical. ( #4729 )
...
This allows the HTTP logicalAuth handler to cache the value in the
logical.Request, avoiding a lookup later when performing acl
checks/counting a use.
2018-06-08 17:24:27 -04:00
Chris Hoffman
ab6547383c
reorder sidebar
2018-06-08 17:22:27 -04:00
Chris Hoffman
611244d337
Update gcpckms.html.md
2018-06-08 17:07:59 -04:00
Chris Hoffman
3a690656ee
fix typo
2018-06-08 17:05:17 -04:00
Chris Hoffman
5d07ff7c7a
Adding Azure Key Vault seal docs ( #4728 )
2018-06-08 17:04:14 -04:00
Brian Kassouf
0fe89cdd49
changelog++
2018-06-08 10:51:28 -07:00
Jeff Mitchell
2ac5c2cdac
Pull in kv fix for 4726
2018-06-08 13:48:25 -04:00
Jeff Mitchell
c09c9db775
changelog++
2018-06-08 13:47:15 -04:00
Jeff Mitchell
c1267ab16c
Fix writing to KVv2 root via kv put
( #4726 )
...
* Fix writing to KVv2 root via `kv put`
The check that adds the API path wasn't taking into account the root,
e.g. if it's mounted at `kv`, `kv` and `kv/` would end up creating an
extra copy of the mount path in front, leading to paths like
`kv/data/kv`.
* Output warnings if they come back and fix a panic in metadata_get
* Also add to metadata put/delete
2018-06-08 13:45:47 -04:00
Matthew Irish
9c6a5a807f
fix inlined SVG fill for Firefox ( #4722 )
...
* fix inlined SVG fill for Firefox
* rename bulma in-repo-addon to css
* add sass-svg-uri
* get rid of bespoke variable and use sass-svg-uri module
2018-06-07 15:08:53 -05:00
Jeff Mitchell
e5a43d3431
Remove final usage of gogo in our code
2018-06-07 10:48:36 -04:00
Jeff Mitchell
165a622d15
Add missing sidebar links for AD
2018-06-07 10:21:22 -04:00
Brian Shumate
d2519da5ad
Tiny formalized edit ( #4715 )
2018-06-07 06:44:57 -07:00
Kevin Hicks
ed7992e8ae
update docs and help text to include 'operator' ( #4712 )
2018-06-06 21:11:21 -07:00
Jeff Mitchell
896a905833
changelog++
2018-06-06 10:47:39 -04:00
Jeff Mitchell
cfd3672cf3
Update 0.10.2 upgrade guide
2018-06-06 10:45:15 -04:00
Jeff Mitchell
f1684cef2d
changelog++
2018-06-06 10:42:58 -04:00
Jeff Mitchell
1f3cd66950
Add AD to changelog
2018-06-06 10:33:23 -04:00
Jeff Mitchell
527c8f8689
Cut version 0.10.2
2018-06-06 00:23:55 -04:00
Jeff Mitchell
ad27dc1c89
Prep for release
2018-06-05 23:54:54 -04:00
Jeff Mitchell
9577bb58a8
Merge branch 'master-oss' into copy-of-master
2018-06-05 23:04:05 -04:00
Jeff Mitchell
9fce6c0c0c
Update plugins
2018-06-05 22:57:35 -04:00
Jeff Mitchell
4b7d2bed01
Transit convergent v3
2018-06-05 18:53:39 -04:00
Vishal Nayak
11e2fd2fce
approle: Fix role name case sensitivity issue
2018-06-05 18:53:27 -04:00
Jeff Mitchell
5207099042
Offline token revocation fix
2018-06-05 18:53:27 -04:00
Chris Hoffman
217d2d0739
changelog++
2018-06-05 16:57:46 -04:00
Jeff Mitchell
39b77c4bf3
changelog++
2018-06-05 15:27:34 -04:00
Jeff Mitchell
04ad8c7eb3
Fix swallowed err from gcs close calls ( #4706 )
2018-06-05 15:27:02 -04:00
Jeff Mitchell
e294e8666b
Fix panic if passing "rules" via sys/policies/acl ( #4705 )
2018-06-05 13:01:55 -04:00
LeSuisse
809079cac2
Update usage of deprecated commands rekey and rotate in the documentation ( #4703 )
2018-06-05 12:37:26 -04:00
Martin
515b4cc4cc
Make travis file usable by forks ( #4702 )
2018-06-05 12:36:46 -04:00
madalynrose
08c7cddef9
trim extensions from filename when uploading a policy file ( #4693 )
2018-06-05 10:30:32 -05:00
Jeff Mitchell
d499eeac51
changelog++
2018-06-05 11:23:52 -04:00
Jeff Mitchell
0138351ea4
Return generic messages if pre-login ldap operations fail ( #4700 )
...
This avoids leaking any information about valid usernames.
2018-06-05 11:23:10 -04:00
Eli Oxman
68ce3bed34
Add async python client to docs ( #4698 )
2018-06-05 10:23:56 -04:00
Nándor István Krácser
a36f91101a
Fix VAULT_LOG_LEVEL in docs ( #4696 )
2018-06-05 10:23:32 -04:00
Jeff Mitchell
8e39515754
changelog++
2018-06-04 23:19:22 -04:00
Marcin Wielgoszewski
9316c96364
Add support for x.509 Name Serial Number attribute in subject of certificates ( #4694 )
2018-06-04 23:18:39 -04:00
Becca Petrin
6cafb12ff4
be more explicit about names ( #4695 )
2018-06-04 21:34:17 -04:00
Jeff Mitchell
9ded5f57fe
changelog++
2018-06-04 19:42:19 -04:00
Jeff Mitchell
3993f126e5
Do some best-effort cleanup in file backend ( #4684 )
...
* Do some best-effort cleanup in file backend
If put results in an encoding error and after the file is closed we
detect it's zero bytes, it could be caused by an out of space error on
the disk since file info is often stored in filesystem metadata with
reserved space. This tries to detect that scenario and perform
best-effort cleanup. We only do this on zero length files to ensure that
if an encode fails to write but the system hasn't already performed
truncation, we leave the existing data alone.
Vault should never write a zero-byte file (as opposed to a zero-byte
value in the encoded JSON) so if this case is hit it's always an error.
* Also run a check on Get
2018-06-04 19:41:36 -04:00
Becca Petrin
2e8a3e6d59
update ad dependency ( #4692 )
2018-06-04 15:09:41 -04:00