Commit graph

2942 commits

Author SHA1 Message Date
Vishal Nayak 580d9b9b58 Merge pull request #1176 from hashicorp/github-error-response
Change expiration.RenewToken's response from logical.Auth to logical.Response
2016-03-04 18:08:55 -05:00
vishalnayak 402444c002 review rework 2 2016-03-04 18:08:13 -05:00
vishalnayak 2f5e65ae24 review rework 2016-03-04 15:35:58 -05:00
vishalnayak 35e71f3ebc Place the response nil check before resp.IsError() 2016-03-04 15:13:04 -05:00
vishalnayak 86dca39141 Fix testcase 2016-03-04 15:03:01 -05:00
vishalnayak da9152169b changed response of expiration manager's renewtoken to logical.response 2016-03-04 14:56:51 -05:00
Jeff Mitchell 0998e1cdf9 Update help text exporting dev mode listen address.
Ping #1160
2016-03-03 18:10:14 -05:00
Jeff Mitchell a976f4f628 changelog++ 2016-03-03 13:47:00 -05:00
Jeff Mitchell a03ecb64ce Merge pull request #1172 from hashicorp/sanitize-mount-paths
Create a unified function to sanitize mount paths.
2016-03-03 13:46:38 -05:00
Jeff Mitchell 7394f97439 Fix out-of-date comment 2016-03-03 13:37:51 -05:00
Jeff Mitchell 0d46fb4696 Create a unified function to sanitize mount paths.
This allows mount paths to start with '/' in addition to ensuring they
end in '/' before leaving the system backend.
2016-03-03 13:13:47 -05:00
Jeff Mitchell eb37750951 changelog++ 2016-03-03 12:33:38 -05:00
Jeff Mitchell 3e7bca82a1 Merge pull request #1146 from hashicorp/step-down
Provide 'sys/step-down' and 'vault step-down'
2016-03-03 12:30:08 -05:00
Jeff Mitchell 9bf6c40974 Add default case for if the step down channel is blocked 2016-03-03 12:29:30 -05:00
Jeff Mitchell f4d8d04faf changelog++ 2016-03-03 12:06:42 -05:00
Jeff Mitchell bd7b285ab0 changelog++ 2016-03-03 12:04:48 -05:00
Jeff Mitchell c58a9b2c10 Merge pull request #1170 from hashicorp/strip-leading-slash-policies
Strip leading paths in policies.
2016-03-03 12:03:56 -05:00
Jeff Mitchell 9717ca5931 Strip leading paths in policies.
It appears to be a common mistake, but they won't ever match.

Fixes #1167
2016-03-03 11:32:48 -05:00
Jeff Mitchell f1edaed395 changelog++ 2016-03-03 11:12:15 -05:00
Jeff Mitchell bd2a314a4e Merge pull request #1169 from hashicorp/dev-mode-address
Add the ability to specify dev mode address via CLI flag and envvar.
2016-03-03 11:10:51 -05:00
Jeff Mitchell 62f1b3f91c Remove unneeded sleeps in test code 2016-03-03 11:09:27 -05:00
Jeff Mitchell 5c55c34d6b Update cubbyhole text to be more explicit.
Fixes #1165
2016-03-03 10:58:58 -05:00
Jeff Mitchell 69c853fd2f Add the ability to specify dev mode address via CLI flag and envvar.
Fixes #1160
2016-03-03 10:48:52 -05:00
Jeff Mitchell 750b33c51b Add ability to control dev root token id with
VAULT_DEV_ROOT_TOKEN_ID env var, and change the CLI flag to match.

Ping #1160
2016-03-03 10:24:44 -05:00
Jeff Mitchell 6ed5d10580 Remove proxy function as it's unneeded now 2016-03-02 14:55:51 -05:00
Jeff Mitchell 8ecba87807 Merge pull request #1163 from hashicorp/mux-cleanup
Remove sys_policy from special handling as it's implemented in
2016-03-02 14:48:30 -05:00
Jeff Mitchell 9c47b8c0a7 Remove sys_policy from special handling as it's implemented in
logical_system too. Clean up the mux handlers.
2016-03-02 14:16:54 -05:00
Jeff Mitchell 7b4478faba Add a sleep in the RedirectStandby test to try to fix raciness 2016-03-02 12:06:16 -05:00
Jeff Mitchell 32b91bd531 changelog++ 2016-03-02 12:05:16 -05:00
Jeff Mitchell 8670f5ac9c Merge pull request #1162 from hashicorp/dev-root-id
Allow specifying an initial root token ID in dev mode.
2016-03-02 12:04:25 -05:00
Jeff Mitchell 8011148fb5 Allow specifying an initial root token ID in dev mode.
Ping #1160
2016-03-02 12:03:26 -05:00
Jeff Mitchell 5b9c478a2c changelog++ 2016-03-01 20:27:08 -05:00
Jeff Mitchell ac57c22fe0 Merge pull request #1156 from hashicorp/renew-self-CLI
Allow `token-renew` to not be given a token; it will then use the
2016-03-01 20:26:02 -05:00
Jeff Mitchell 521a956e4d Address review feedback 2016-03-01 20:25:40 -05:00
vishalnayak 934123d9a3 changelog++ 2016-03-01 17:18:20 -05:00
Jeff Mitchell c438dd186a changelog++ 2016-03-01 17:12:14 -05:00
Jeff Mitchell addf92e185 Allow token-renew to not be given a token; it will then use the
renew-self endpoint. Otherwise it will use the renew endpoint, even if
the token matches the client token.

Adds an -increment flag to allow increments even with no token passed
in.

Fixes #1150
2016-03-01 17:02:48 -05:00
Vishal Nayak f965d1d510 Merge pull request #1153 from hashicorp/cert-non-ca-fix
Non-CA cert registration to the cert backend
2016-03-01 16:56:59 -05:00
vishalnayak 44208455f6 continue if non-CA policy is not found 2016-03-01 16:43:51 -05:00
vishalnayak 9a3ddc9696 Added ExtKeyUsageAny, changed big.Int comparison and fixed code flow 2016-03-01 16:37:01 -05:00
vishalnayak cc1592e27a corrections, policy matching changes and test cert changes 2016-03-01 16:37:01 -05:00
vishalnayak 09eef70853 Added testcase for cert writes 2016-03-01 16:37:01 -05:00
vishalnayak f056e8a5a5 supporting non-ca certs for verification 2016-03-01 16:37:01 -05:00
vishalnayak 6314057b9a fix typo 2016-03-01 11:48:17 -05:00
Vishal Nayak 89e778b2d0 Merge pull request #1154 from hashicorp/ssh-docs-fix
zeroaddress documentation fix
2016-03-01 11:22:45 -05:00
vishalnayak fd585ecf8a removed datatype and corrected a sentense 2016-03-01 11:21:29 -05:00
vishalnayak 724823b8f7 zeroaddress documentation fix 2016-03-01 10:57:00 -05:00
Jeff Mitchell b5a8e5d724 Fix commenting 2016-02-29 20:29:04 -05:00
vishalnayak aee006ba2d moved the test cert keys to appropriate test-fixtures folder 2016-02-29 15:49:08 -05:00
Jeff Mitchell 64ab16d137 Don't spawn consul servers when testing unless it's an acceptance test 2016-02-29 14:58:06 -05:00