Commit Graph

46 Commits

Author SHA1 Message Date
Jeff Mitchell 353cf880be Sync go-plugin from upstream 2017-08-07 15:27:03 -04:00
Jeff Mitchell 1948c7a6db Update go-plugin to include go-hclog support 2017-08-05 15:34:57 -04:00
Jeff Mitchell 7e3ff5e56c Add PROXY protocol support (#3098) 2017-08-02 18:24:12 -04:00
Jeff Mitchell e553fe0d99 Bump deps 2017-07-18 10:15:54 -04:00
Jeff Mitchell b946eefcda Bump deps 2017-06-16 11:14:18 -04:00
Jeff Mitchell 9095e202d7 Update vendoring 2017-06-05 10:51:53 -04:00
Jeff Mitchell 01e1754749 Bump deps 2017-05-24 09:40:58 -04:00
Brian Kassouf af9ff63e9a Merge remote-tracking branch 'oss/master' into database-refactor 2017-04-19 15:16:00 -07:00
Jeff Mitchell 563f80d39f Bump deps 2017-04-17 11:17:06 -04:00
Brian Kassouf 5fac259ae6 vendor go-plugin 2017-04-12 14:23:15 -07:00
Jeff Mitchell 4d7a0ab772 Bump deps 2017-03-30 20:03:13 -04:00
Jeff Mitchell 776e120740 Update deps, particularly to ensure https://aws.amazon.com/blogs/developer/aws-sdk-for-go-update-needed-for-go-1-8/ is covered 2017-02-16 23:42:07 -05:00
Jeff Mitchell 864156773a Update go-cleanhttp 2017-02-10 19:34:41 -05:00
Jeff Mitchell 339a502fa1 Update deps 2017-02-02 16:19:55 -05:00
Jeff Mitchell bb229ac94e Update deps 2017-01-26 20:16:19 -05:00
Jeff Mitchell 595ee9f24a Bump deps 2017-01-13 09:06:34 -05:00
Jeff Mitchell 6ebf1cf713 Bump deps 2017-01-04 16:47:38 -05:00
Xiang Li 02070e0fc6 physical: add etcd3 backend (#2168) 2017-01-03 14:43:46 -05:00
Conor Mongey 18d2280e4b Update go-syslog package (#2219) 2016-12-31 10:22:25 -06:00
Jeff Mitchell 8346e3bc83 Bump go-multierror to fix panic 2016-12-16 13:45:55 -05:00
Jeff Mitchell 74d35a3f67 Reset vendoring to 0.6.3 2016-12-16 13:31:07 -05:00
Jeff Mitchell fdb4e60596 bump deps 2016-12-13 19:12:26 -05:00
Jeff Mitchell 1bd8482960 Update deps 2016-12-01 14:46:57 -05:00
Jeff Mitchell ddb9a0ce52 Bump deps 2016-11-16 18:22:54 -05:00
Jeff Mitchell e2d2a23c25 Bump deps 2016-11-02 15:34:30 -04:00
Jeff Mitchell 16991d823e Bump deps 2016-09-30 09:50:46 -04:00
Jeff Mitchell 487e05d25c Update deps 2016-09-02 18:05:09 -04:00
Jeff Mitchell 1a1ccfedd0 Update Consul lib to use headers for tokens 2016-08-02 17:05:24 -04:00
Jeff Mitchell 984a48c195 Update vendored deps 2016-07-22 20:11:59 -04:00
Jeff Mitchell 4146ebed9c Add go-retryablehttp dep 2016-07-07 10:42:08 -04:00
Jeff Mitchell eb676bb807 Update deps 2016-06-30 14:19:03 -04:00
Jeff Mitchell 95f3726f1c Migrate to go-uuid 2016-06-08 10:36:16 -04:00
Jeff Mitchell 1873c32cb2 Update deps 2016-06-08 10:33:08 -04:00
Jeff Mitchell a6c4d6b47d Update/add vendor 2016-06-03 10:29:46 -04:00
Jeff Mitchell 11160ae271 Update vendoring 2016-06-01 10:24:48 -04:00
Jeff Mitchell 28279d193e Update deps 2016-05-03 13:23:05 -04:00
Jeff Mitchell 45a120f491 Switch our tri-copy ca loading code to go-rootcerts 2016-05-03 12:23:25 -04:00
Sean Chittenden 6b2c83564e Teach Vault how to register with Consul
Vault will now register itself with Consul.  The active node can be found using `active.vault.service.consul`.  All standby vaults are available via `standby.vault.service.consul`.  All unsealed vaults are considered healthy and available via `vault.service.consul`.  Change in status and registration is event driven and should happen at the speed of a write to Consul (~network RTT + ~1x fsync(2)).

Healthy/active:

```
curl -X GET 'http://127.0.0.1:8500/v1/health/service/vault?pretty' && echo;
[
    {
        "Node": {
            "Node": "vm1",
            "Address": "127.0.0.1",
            "TaggedAddresses": {
                "wan": "127.0.0.1"
            },
            "CreateIndex": 3,
            "ModifyIndex": 20
        },
        "Service": {
            "ID": "vault:127.0.0.1:8200",
            "Service": "vault",
            "Tags": [
                "active"
            ],
            "Address": "127.0.0.1",
            "Port": 8200,
            "EnableTagOverride": false,
            "CreateIndex": 17,
            "ModifyIndex": 20
        },
        "Checks": [
            {
                "Node": "vm1",
                "CheckID": "serfHealth",
                "Name": "Serf Health Status",
                "Status": "passing",
                "Notes": "",
                "Output": "Agent alive and reachable",
                "ServiceID": "",
                "ServiceName": "",
                "CreateIndex": 3,
                "ModifyIndex": 3
            },
            {
                "Node": "vm1",
                "CheckID": "vault-sealed-check",
                "Name": "Vault Sealed Status",
                "Status": "passing",
                "Notes": "Vault service is healthy when Vault is in an unsealed status and can become an active Vault server",
                "Output": "",
                "ServiceID": "vault:127.0.0.1:8200",
                "ServiceName": "vault",
                "CreateIndex": 19,
                "ModifyIndex": 19
            }
        ]
    }
]
```

Healthy/standby:

```
[snip]
        "Service": {
            "ID": "vault:127.0.0.2:8200",
            "Service": "vault",
            "Tags": [
                "standby"
            ],
            "Address": "127.0.0.2",
            "Port": 8200,
            "EnableTagOverride": false,
            "CreateIndex": 17,
            "ModifyIndex": 20
        },
        "Checks": [
            {
                "Node": "vm2",
                "CheckID": "serfHealth",
                "Name": "Serf Health Status",
                "Status": "passing",
                "Notes": "",
                "Output": "Agent alive and reachable",
                "ServiceID": "",
                "ServiceName": "",
                "CreateIndex": 3,
                "ModifyIndex": 3
            },
            {
                "Node": "vm2",
                "CheckID": "vault-sealed-check",
                "Name": "Vault Sealed Status",
                "Status": "passing",
                "Notes": "Vault service is healthy when Vault is in an unsealed status and can become an active Vault server",
                "Output": "",
                "ServiceID": "vault:127.0.0.2:8200",
                "ServiceName": "vault",
                "CreateIndex": 19,
                "ModifyIndex": 19
            }
        ]
    }
]
```

Sealed:

```
        "Checks": [
            {
                "Node": "vm2",
                "CheckID": "serfHealth",
                "Name": "Serf Health Status",
                "Status": "passing",
                "Notes": "",
                "Output": "Agent alive and reachable",
                "ServiceID": "",
                "ServiceName": "",
                "CreateIndex": 3,
                "ModifyIndex": 3
            },
            {
                "Node": "vm2",
                "CheckID": "vault-sealed-check",
                "Name": "Vault Sealed Status",
                "Status": "critical",
                "Notes": "Vault service is healthy when Vault is in an unsealed status and can become an active Vault server",
                "Output": "Vault Sealed",
                "ServiceID": "vault:127.0.0.2:8200",
                "ServiceName": "vault",
                "CreateIndex": 19,
                "ModifyIndex": 38
            }
        ]
```
2016-04-25 18:01:13 -07:00
Sean Chittenden 2060766107 Update vendor'ed version of hashicorp/consul/lib
Note: Godeps.json not updated
2016-04-25 18:00:54 -07:00
Jeff Mitchell d77f9e0583 Update vendoring 2016-04-26 00:18:04 +00:00
vishalnayak e3a1ee92b5 Utility Enhancements 2016-04-05 20:32:59 -04:00
Jeff Mitchell 5104ec5505 Update godeps 2016-03-10 22:50:50 -05:00
Jeff Mitchell 6e52139bed Update HCL in vendor 2016-03-10 17:06:08 -05:00
Seth Vargo 2064a6d56a Update to newest HCL 2016-03-10 15:25:25 -05:00
Jeff Mitchell cfd908cb73 More dep bumps 2016-02-18 16:37:30 -05:00
Jeff Mitchell 7a4eda156c Migrate to built-in Go vendoring.
This also removes `godep` calls from make scripts. Of note is that
currently `./...` checking in acceptance tests is disabled.
2016-02-18 15:06:02 -05:00