Jeff Mitchell
a8aa5f0dd3
go-ldap update; bump dep, api, secrets-ad plugin, and vendor
2019-11-08 11:24:46 -05:00
Chris Hoffman
cbf4b291c8
changelog++
2019-11-08 11:23:46 -05:00
Jeff Mitchell
bde1fd9391
Bump API's SDK
2019-11-08 11:20:21 -05:00
Jeff Mitchell
a47758865c
Bump go-ldap
...
Closes https://github.com/hashicorp/vault/pull/7780
Changes to other parts of Vault have to come piece by piece, that's
next.
2019-11-08 11:18:36 -05:00
Chris Hoffman
864d4b382d
changelog++
2019-11-08 08:54:37 -05:00
Connor Poole
4588c56232
adding a write bytes method ( #7611 )
2019-11-07 17:54:05 -08:00
Calvin Leung Huang
93c01df791
docs: add 1.2.4 upgrade guide ( #7839 )
2019-11-07 15:28:58 -08:00
Calvin Leung Huang
dac03d44e6
port namespace lease revocation fix ( #7836 )
2019-11-07 14:10:47 -08:00
Brian Kassouf
f275171434
changelog++
2019-11-07 13:36:35 -08:00
Brian Kassouf
491f492278
changelog++
2019-11-07 12:50:18 -08:00
Jim Kalafut
59e526614d
Run go fmt ( #7823 )
2019-11-07 08:54:34 -08:00
Chris Hoffman
c92e9036e3
updating community page ( #7831 )
2019-11-06 22:09:43 -05:00
Chris Hoffman
58789e0436
Revert "updating community page ( #7829 )" ( #7830 )
...
This reverts commit 553bc729c9229fd0736e5fb9a01da7c89a1fa8b8.
2019-11-06 22:07:54 -05:00
Chris Hoffman
ecd881c556
updating community page ( #7829 )
2019-11-06 22:04:41 -05:00
RJ Spiker
fd319bba1e
website - font and brand update ( #7783 )
2019-11-06 20:38:25 -05:00
Brian Kassouf
be883161be
Port OSS changes from perf standby fix ( #7818 )
...
* Port OSS changes from perf standby fix
* Fix build
2019-11-06 14:36:47 -08:00
Brian Shumate
8363d9fc1d
Clarify language around 472 ( #7814 )
...
- use "disaster recovery mode"
- remove trailing spaces
2019-11-06 14:16:39 -08:00
Jeff Mitchell
2b2e61db82
Revert change suggested by vet. See the comment for details. ( #7815 )
2019-11-06 17:03:37 -05:00
Jeff Mitchell
7c4c53e523
Document secondary activation public key endpoints/params ( #7810 )
2019-11-06 16:37:46 -05:00
Calvin Leung Huang
294005e6e1
debug: check for nil secret on replication status response before accessing secret.Data ( #7811 )
2019-11-06 16:36:38 -05:00
Jim Kalafut
2bd068f0e5
Update Azure storage docs ( #7808 )
...
Fixes #7750
2019-11-06 13:24:37 -08:00
Calvin Leung Huang
c84457a966
changelog++
2019-11-06 09:59:17 -08:00
Sam Salisbury
b589fbfbd9
ci: switch to go1.12.12 on machine executors ( #7703 )
...
* ci: switch to go1.12.12 on machine executors
- This brings in recent ci changes from the release/1.2.x branch.
* go mod vendor
* ci: remove ent build tags
* ci: fix gopath
* go mod vendor
* ci: ensure yarn install
* ci: add debug commands
* ci: debugging
* ci: increment yarn cache; remove debugging
* ci: remove redundant yarn install
2019-11-06 13:15:06 +00:00
Kevin Pruett
ef903d4f81
website: Homepage updates, use case pages, navigation changes ( #7782 )
...
* website: various updates
* Expose /docs and /intro views using documentation-style
layout for index pages
* Add [Use Case] Secrets Management page
* Add [Use Case] Data Encryption page
* Add [Use Case] Identity Based Access page
* Update redirects file removing `/intro` routes redirecting to
`learn.hashicorp`
* Hide MegaNav on mobile
* website: route /api straight to documentation
* Bybass index page and jump straight to content
2019-11-05 19:54:24 -05:00
Brian Shumate
a55c0908ff
Help text: update token create help about id value ( #7792 )
...
- Token id is no longer a 36 character UUID
2019-11-05 15:50:20 -08:00
Jim Kalafut
873e80445c
changelog++
2019-11-05 15:47:58 -08:00
Jeff Mitchell
678b6eefc3
changelog++
2019-11-05 16:15:09 -05:00
Jeff Mitchell
950dff9ad5
Update API to use lease_id in body of sys/leases/revoke call ( #7777 )
...
We didn't make this change earlier because not everyone would have had
an updated version of Vault with this API change but it's definitely
time.
Fixes https://github.com/hashicorp/vault-ssh-helper/issues/40
2019-11-05 16:14:28 -05:00
Jeff Mitchell
a5e554ca65
changelog++
2019-11-05 16:13:12 -05:00
Jeff Mitchell
44e899afd1
Don't allow registering a non-root zero TTL token lease ( #7524 )
...
* Don't allow registering a non-root zero TTL token lease
This is defense-in-depth in that such a token was not allowed to be
used; however it's also a bug fix in that this would then cause no lease
to be generated but the token entry to be written, meaning the token
entry would stick around until it was attempted to be used or tidied (in
both cases the internal lookup would see that this was invalid and do a
revoke on the spot).
* Fix tests
* tidy
2019-11-05 16:11:13 -05:00
Jeff Mitchell
6a95e8465b
Update go-metrics ( #7794 )
2019-11-05 15:28:51 -05:00
Jeff Mitchell
b998849b73
Update go-metrics in sdk ( #7795 )
2019-11-05 15:27:07 -05:00
Christian Frichot
b8ada6b8d9
doc: remove comma from list.html.md ( #7766 )
2019-11-05 12:10:58 -08:00
Jim Kalafut
a8a50df7fc
Update azure secrets plugin ( #7788 )
2019-11-05 10:43:28 -08:00
JoeStack
704f522d34
Update helm.html.md ( #7310 )
...
fixed HA cluster setting
2019-11-05 13:33:06 -05:00
Jeff Mitchell
519d1b3cb8
Fix some vet issues in api package ( #7789 )
...
* Dropped cancel func
* Bad struct tag
2019-11-05 12:07:06 -05:00
Lars Lehtonen
bda6a6da78
core/policy & core/token: Remove Dead Test Code ( #7774 )
...
* vault: remove dead test helper function testMakeBatchTokenViaCore()
* vault: remove dead test helper function testMakeBatchTokenViaBackend()
* vault: remove dead test helper function mockPolicyStoreNoCache()
* vault: remove dead test helper function mockPolicyStore()
* vault: remove unused test imports
2019-11-04 10:36:07 +01:00
Jim Kalafut
1dfdc35a14
Update README.md
2019-11-01 10:28:17 -07:00
Calvin Leung Huang
8c31e45860
hostutil: query stats with context, update gopsutil, refactor tests ( #7769 )
...
* hostutil: query stats with context, update gopsutil, refactor tests
* go mod vendor
* minor comment wording
2019-11-01 10:12:22 -07:00
Noelle Daley
0a251d4f06
test ie11 on windows 8.1 instead of windows 10 ( #7775 )
2019-11-01 10:10:05 -07:00
Lukasz Jagiello
05fdb2287e
Correct version of vault-plugin-auth-jwt ( #7773 )
...
Based on Vault changelog JWT-71 and JWT-77 should be included in Vault
1.3.0. Unfortunetly there was a wrong version of vault-plugin-auth-jwt
included.
This fix #7771
2019-10-31 12:17:37 -07:00
Pascal Enz
33c1b7150f
Rabbitmq topic permissions ( #7751 )
...
* Upgraded rabbit hole library to 2.0
* Added RabbitMQ topic permission support.
* Updated docs to cover RabbitMQ topic permissions.
* Improved comments and docs as suggested.
2019-10-30 14:19:49 -07:00
Noelle Daley
983286c4be
changelog++
2019-10-30 13:13:05 -07:00
Michel Vocks
f672281066
changelog++
2019-10-30 19:58:38 +01:00
Noelle Daley
3bf3130268
Only link to nav items that user has access to ( #7590 )
...
* only show entities sidenav item if user has list capability on entities
* wip - link to correct paths in top navigation
* remove comment
* only link to groups page if user has list capability
* add test for checking multiple capabilities
* test when capabilities are not specified
* format jsdoc comments
* move capabilities check out of helper and into permissions service
2019-10-30 11:39:51 -07:00
Michel Vocks
6eace6ea38
changelog++
2019-10-30 19:37:47 +01:00
Brian Kassouf
140857e579
changelog++
2019-10-30 10:40:41 -07:00
Brian Kassouf
cbefe0366a
changelog++
2019-10-30 10:11:34 -07:00
Luke Barton
f1595835c9
Fix incorrect env vars example ( #7755 )
2019-10-30 11:43:38 -04:00
ncabatoff
d9205cd3c0
Use port 0 as the listener port so the OS assigns one not in use ( #7763 )
2019-10-30 10:36:23 -04:00