Mitchell Hashimoto
|
e9a3a34c27
|
vault: tests passing
|
2015-03-29 16:18:08 -07:00 |
|
Mitchell Hashimoto
|
4cacaf62f0
|
http: support auth
|
2015-03-29 16:14:54 -07:00 |
|
Armon Dadgar
|
5517910829
|
vault: Make audit/ a protected path
|
2015-03-27 14:00:57 -07:00 |
|
Armon Dadgar
|
042db7798e
|
vault: Adding basic audit table load/unload
|
2015-03-27 14:00:38 -07:00 |
|
Armon Dadgar
|
609ac4c562
|
vault: Allow passing in audit factory methods
|
2015-03-27 13:45:13 -07:00 |
|
Armon Dadgar
|
615e209296
|
audit: Basic interface
|
2015-03-27 13:43:23 -07:00 |
|
Armon Dadgar
|
2024c7a155
|
Fixing compilation errors due to API change
|
2015-03-24 16:20:05 -07:00 |
|
Armon Dadgar
|
9a4946f115
|
vault: Testing core ACL enforcement
|
2015-03-24 15:55:27 -07:00 |
|
Armon Dadgar
|
23864839bb
|
vault: testing root privilege restrictions
|
2015-03-24 15:52:07 -07:00 |
|
Armon Dadgar
|
fe402cdd87
|
vault: ignore a nil policy object, as it has no permissions
|
2015-03-24 15:49:17 -07:00 |
|
Armon Dadgar
|
b354f03cb2
|
vault: adding auth/token/lookup/ support
|
2015-03-24 15:39:33 -07:00 |
|
Armon Dadgar
|
4a4d1d3e45
|
vault: adding auth/token/revoke/ and auth/token/revoke-orphan/
|
2015-03-24 15:30:09 -07:00 |
|
Armon Dadgar
|
26f05f7a20
|
vault: Passthrough of client token to token store
|
2015-03-24 15:12:52 -07:00 |
|
Armon Dadgar
|
6fd3cae2c2
|
vault: Adding auth/token/create endpoint
|
2015-03-24 15:10:46 -07:00 |
|
Armon Dadgar
|
b5332404d1
|
vault: Allow providing token ID during creation
|
2015-03-24 14:22:50 -07:00 |
|
Armon Dadgar
|
b41d2e6368
|
vault: utility string set methods
|
2015-03-24 13:56:07 -07:00 |
|
Armon Dadgar
|
493fbc12fc
|
vault: utility string search methods
|
2015-03-24 13:44:47 -07:00 |
|
Armon Dadgar
|
49df1570d6
|
vault: test missing and invalid tokens
|
2015-03-24 11:57:08 -07:00 |
|
Armon Dadgar
|
20c2375352
|
vault: Adding ACL enforcement
|
2015-03-24 11:37:07 -07:00 |
|
Armon Dadgar
|
43a99aec93
|
vault: Special case root policy
|
2015-03-24 11:27:21 -07:00 |
|
Armon Dadgar
|
cb563b881c
|
logical: Special error for permission denied
|
2015-03-24 11:23:59 -07:00 |
|
Armon Dadgar
|
4598e43140
|
vault: Adding ClientToken
|
2015-03-24 11:09:25 -07:00 |
|
Armon Dadgar
|
65ef4f1032
|
vault: wire tokens into expiration manager
|
2015-03-23 18:11:15 -07:00 |
|
Armon Dadgar
|
86c9bd9083
|
vault: Give expiration manager a token store reference
|
2015-03-23 18:00:14 -07:00 |
|
Armon Dadgar
|
6481ff9e34
|
vault: Generate a root token when initializing
|
2015-03-23 17:31:30 -07:00 |
|
Armon Dadgar
|
cd3ee5cc03
|
vault: Remove core reference
|
2015-03-23 17:29:36 -07:00 |
|
Armon Dadgar
|
539554fc0b
|
vault: only log expiration notice if useful
|
2015-03-23 17:27:46 -07:00 |
|
Armon Dadgar
|
3607eae208
|
vault: Adding method to generate root token
|
2015-03-23 17:16:37 -07:00 |
|
Armon Dadgar
|
f40ed182c4
|
vault: Support policy CRUD
|
2015-03-23 14:43:31 -07:00 |
|
Armon Dadgar
|
192dcf7d39
|
vault: first pass at HandleLogin
|
2015-03-23 13:56:43 -07:00 |
|
Armon Dadgar
|
879a0501f8
|
vault: Track the token store in core
|
2015-03-23 13:41:05 -07:00 |
|
Armon Dadgar
|
56d99fe580
|
vault: token tracks generation path and meta data
|
2015-03-23 13:39:43 -07:00 |
|
Armon Dadgar
|
2c42b8b364
|
credential: simplify interface
|
2015-03-23 13:39:16 -07:00 |
|
Armon Dadgar
|
10e64d1e90
|
vault: extend router to handle login routing
|
2015-03-23 11:47:55 -07:00 |
|
Mitchell Hashimoto
|
af2fe5681a
|
main: hook up consul backend
|
2015-03-21 17:25:12 +01:00 |
|
Mitchell Hashimoto
|
3270349456
|
logical/consul: actual test that the token works
|
2015-03-21 17:23:44 +01:00 |
|
Mitchell Hashimoto
|
55a3423c60
|
logical/consul
|
2015-03-21 17:19:37 +01:00 |
|
Mitchell Hashimoto
|
27d33ad9f7
|
logical/framework: auto-extend leases if requested
|
2015-03-21 16:20:30 +01:00 |
|
Mitchell Hashimoto
|
05246433bb
|
logical/aws: refactor access key create to the secret file
|
2015-03-21 11:49:56 +01:00 |
|
Mitchell Hashimoto
|
665cbaa3e4
|
logical/aws: remove debug I was using to test rollback :)
|
2015-03-21 11:20:22 +01:00 |
|
Mitchell Hashimoto
|
9e4b9d593b
|
logical/aws: WAL entry for users, rollback
|
2015-03-21 11:18:46 +01:00 |
|
Mitchell Hashimoto
|
f6d5e3f0f4
|
logical/testing: immediate rollback, ignore RollbackMinAge
|
2015-03-21 11:18:33 +01:00 |
|
Mitchell Hashimoto
|
17c58633d6
|
logical/framework: rollback should return error, easier API
|
2015-03-21 11:08:13 +01:00 |
|
Mitchell Hashimoto
|
a54d90ac1f
|
logical/framework: rollback needs to have access to request for storage
|
2015-03-21 11:03:59 +01:00 |
|
Armon Dadgar
|
a78b7207b9
|
vault: playing with credential store interface
|
2015-03-20 13:54:57 -07:00 |
|
Armon Dadgar
|
82e13e3c41
|
vault: implement the sys/auth* endpoints
|
2015-03-20 12:48:19 -07:00 |
|
Mitchell Hashimoto
|
86a6062ba2
|
main: enable AWS backend
|
2015-03-20 19:32:18 +01:00 |
|
Mitchell Hashimoto
|
62d9bec8be
|
logical/aws
|
2015-03-20 19:03:20 +01:00 |
|
Mitchell Hashimoto
|
a0f59f682b
|
logical/framework: can specify InternalData for secret
|
2015-03-20 17:59:48 +01:00 |
|
Mitchell Hashimoto
|
d43f395050
|
logical/testing: rollback/revoke secrets, error dangling secrets
|
2015-03-20 17:20:55 +01:00 |
|