Armon Dadgar
|
5aaad32af8
|
vault: ensure upgrades are cleaned up
|
2015-05-28 16:52:06 -07:00 |
|
Armon Dadgar
|
db0afc9ebe
|
vault: move upgrade logic out of core
|
2015-05-28 16:43:44 -07:00 |
|
Armon Dadgar
|
4eb5c63a5d
|
vault: create upgrade path in HA mode
|
2015-05-28 16:43:15 -07:00 |
|
Armon Dadgar
|
67ed0a3c16
|
vault: moving upgrade path into barrier
|
2015-05-28 16:42:32 -07:00 |
|
Armon Dadgar
|
82ef0b1ac7
|
vault: handle read of key upgrades
|
2015-05-28 16:11:31 -07:00 |
|
Armon Dadgar
|
796ae59a89
|
vault: support keyring reload
|
2015-05-28 16:09:15 -07:00 |
|
Armon Dadgar
|
2e86fa62d5
|
vault: adding barrier AddKey
|
2015-05-28 15:52:26 -07:00 |
|
Armon Dadgar
|
c095861a02
|
keyring: Add key serialization
|
2015-05-28 15:49:52 -07:00 |
|
Armon Dadgar
|
c60970e743
|
vault: prevent rekey on standby
|
2015-05-28 15:26:35 -07:00 |
|
Armon Dadgar
|
7f26f5a4cb
|
command/rekey: adding tests
|
2015-05-28 15:22:42 -07:00 |
|
Armon Dadgar
|
9a162191cd
|
command/rekey: first pass at rekey
|
2015-05-28 15:08:09 -07:00 |
|
Armon Dadgar
|
84618a2fde
|
api: Support the rekey endpoints
|
2015-05-28 14:37:20 -07:00 |
|
Armon Dadgar
|
7964fa4d86
|
http: adding rekey handlers
|
2015-05-28 14:28:50 -07:00 |
|
boncheff
|
a1e5330f78
|
Update index.html.md
Updated the docs to show an example of how to read/write a secret using the HTTP API
|
2015-05-28 22:28:25 +01:00 |
|
Armon Dadgar
|
01e890653c
|
vault: more logging
|
2015-05-28 14:15:06 -07:00 |
|
Armon Dadgar
|
0877160754
|
vault: minor rekey cleanups
|
2015-05-28 12:07:52 -07:00 |
|
Armon Dadgar
|
c5352d14a4
|
vault: testing rekey
|
2015-05-28 12:02:30 -07:00 |
|
Armon Dadgar
|
361c722c5c
|
vault: first pass at rekey
|
2015-05-28 11:40:01 -07:00 |
|
Armon Dadgar
|
5aed043ea5
|
vault: ensure master key is copied to avoid memzero issues
|
2015-05-28 11:38:59 -07:00 |
|
Armon Dadgar
|
4e3f0cddcf
|
vault: Adding VerifyMaster to Barrier
|
2015-05-28 11:28:33 -07:00 |
|
Armon Dadgar
|
9f399eb9ff
|
vault: prevent raw access to protected paths
|
2015-05-28 10:24:41 -07:00 |
|
Armon Dadgar
|
42b91fe411
|
command/rotate: Adding new rotate command
|
2015-05-28 10:16:33 -07:00 |
|
Armon Dadgar
|
e72ed2fa87
|
Merge pull request #269 from sheldonh/getting_started_deploy_consul
Use local Consul instance in deploy walkthrough
|
2015-05-28 10:06:36 -07:00 |
|
Armon Dadgar
|
6ca11ecd35
|
Merge pull request #268 from sheldonh/howto_mlock
Document unprivileged mlock on Linux
|
2015-05-28 10:03:10 -07:00 |
|
Sheldon Hearn
|
6cda28f9e7
|
Don't recommend exporting VAULT_TOKEN
It's not needed by the dev server (which writes ~/.vault-token),
and breaks the Getting Started guide (e.g. #267).
|
2015-05-28 14:39:35 +02:00 |
|
Sheldon Hearn
|
9126cf576f
|
Use local Consul instance in deploy walkthrough
As per hashicorp/vault#217, demo.consul.io prevents sessions from being
created, which means you can't use it as a backend for Vault.
|
2015-05-28 14:11:34 +02:00 |
|
Sheldon Hearn
|
85fbdae5f5
|
Mention disable_mlock in deploy walkthrough
|
2015-05-28 13:24:28 +02:00 |
|
Sheldon Hearn
|
71c462b3b2
|
Clarify the disable_mlock option
|
2015-05-28 12:40:56 +02:00 |
|
Ken Breeman
|
c72dd5a38c
|
Cleaned up error handling and HA lock monitoring for zookeeper physical backend based on PR feedback.
|
2015-05-28 00:39:12 -04:00 |
|
Armon Dadgar
|
388022bac1
|
command/key-status: Adding new key-status command
|
2015-05-27 18:17:02 -07:00 |
|
Armon Dadgar
|
efcdfd0066
|
api: Adding Rotate and KeyStatus
|
2015-05-27 18:05:23 -07:00 |
|
Armon Dadgar
|
af47c72639
|
http: adding key-status and rotate handlers
|
2015-05-27 18:02:50 -07:00 |
|
Armon Dadgar
|
1a4256c20c
|
vault: more logging around rotate
|
2015-05-27 17:56:55 -07:00 |
|
Armon Dadgar
|
d0b93a6164
|
vault: adding sys/key-status and sys/rotate
|
2015-05-27 17:53:42 -07:00 |
|
Armon Dadgar
|
26cff2f42f
|
vault: expose information about keys
|
2015-05-27 17:25:36 -07:00 |
|
Armon Dadgar
|
3e717907cd
|
vault: testing barrier rekey
|
2015-05-27 17:17:03 -07:00 |
|
Armon Dadgar
|
b93feb8a6b
|
vault: first pass at rekey
|
2015-05-27 17:13:40 -07:00 |
|
Armon Dadgar
|
9e39fec4a5
|
vault: testing key rotation
|
2015-05-27 17:10:08 -07:00 |
|
Armon Dadgar
|
ead96e8c99
|
vault: first pass at key rotation
|
2015-05-27 17:05:02 -07:00 |
|
Armon Dadgar
|
3d800fe7be
|
vault: keyring api changes
|
2015-05-27 17:04:46 -07:00 |
|
Armon Dadgar
|
490bece0a0
|
vault: make keyring immutable
|
2015-05-27 16:58:55 -07:00 |
|
Armon Dadgar
|
28560a612f
|
vault: test for backwards compatability
|
2015-05-27 16:42:42 -07:00 |
|
Jonathan Sokolowski
|
348924eaab
|
logical/consul: Combine policy and lease into single storage struct
|
2015-05-28 09:36:23 +10:00 |
|
Armon Dadgar
|
e8e9103300
|
vault: share keyring persistence code
|
2015-05-27 16:29:59 -07:00 |
|
Armon Dadgar
|
0e9136d14c
|
vault: first pass at keyring integration
|
2015-05-27 16:01:25 -07:00 |
|
Armon Dadgar
|
50dc6a471e
|
vault: adding path for keyring
|
2015-05-27 15:23:43 -07:00 |
|
Armon Dadgar
|
8c2a767f4f
|
vault: Adding version to key entry
|
2015-05-27 15:23:31 -07:00 |
|
Armon Dadgar
|
1903518202
|
vault: Ensure we always set a key InstallTime
|
2015-05-27 14:37:40 -07:00 |
|
Armon Dadgar
|
ef2f71e17f
|
vault: Adding InstallTime to key in keyring
|
2015-05-27 14:37:40 -07:00 |
|
Armon Dadgar
|
57c763a3fa
|
vault: Adding keyring
|
2015-05-27 14:37:40 -07:00 |
|