Eric Buth
e4e4253d65
added etcd as a non-HA storage backend, updated documentation
2015-05-26 13:38:25 -04:00
Ken Breeman
f6292eb441
Cleaned up zookeeper_ha locking, added tests and cleanup.
2015-05-26 00:12:16 -04:00
Ken Breeman
efb455e5e8
Improvements based on PR feedback: removed empty detectAddress function, moved anonymous functions to named ones, added localLock mutex around i.held
2015-05-25 22:14:00 -04:00
Ken Breeman
13d47c11ab
Merge branch 'master' into physical_zookeeper_ha
2015-05-25 21:01:59 -04:00
Armon Dadgar
0665b7e62b
Merge pull request #258 from ianunruh/docs/http-libraries
...
Add libraries section to HTTP docs
2015-05-25 11:33:46 -07:00
David Wittman
5df1d725aa
Add test for stdin input
...
Shamelessly borrowed this pattern from write_test.go
2015-05-23 13:23:38 -05:00
David Wittman
1411749222
Read from stdin with auth command
2015-05-23 13:23:37 -05:00
Ian Unruh
2a6dd3225c
Add libraries section to HTTP docs
2015-05-22 14:32:14 -07:00
Armon Dadgar
50d70954e0
Merge pull request #257 from ianunruh/feature/read-field
...
Add ability to read raw field from secret
2015-05-22 11:57:21 -07:00
Ian Unruh
bb9f7c47ff
Add read field flag to documentation
2015-05-22 11:33:28 -07:00
Ian Unruh
48778c5260
Add ability to read raw field from secret
2015-05-22 11:28:23 -07:00
Armon Dadgar
c97025f3f4
godeps: Updating aws-sdk-go
2015-05-22 11:12:35 -07:00
Armon Dadgar
8f5bd619c2
Merge pull request #256 from jefferai/f-fix-aws-err
...
AWS changed their error interface; fix compile breakage.
2015-05-22 11:09:20 -07:00
Jeff Mitchell
bb866b0140
AWS changed their error interface; fix compile breakage.
2015-05-21 16:15:21 -04:00
Armon Dadgar
3713ef9fb7
command/renew: typo fix. Fixes #240
2015-05-21 11:03:25 -07:00
Ken Breeman
fa50ca026a
Restore backwards compatibility for zookeeper physical backend. Vault already prevents locks and data from overlapping internally.
2015-05-20 23:15:31 -04:00
David Wittman
fb898ecc1b
Prompt for auth token when no args provided
...
This makes `vault auth` work as documented:
> If no -method is specified, then the token is expected. If it is not
> given on the command-line, it will be asked via user input. If the
> token is "-", it will be read from stdin.
2015-05-20 22:10:02 -05:00
Ken Breeman
a26882ebd4
Merge branch 'master' into physical_zookeeper_ha
...
Conflicts:
physical/zookeeper.go
2015-05-20 22:59:37 -04:00
Ken Breeman
ae74837e55
Implement HA lock loss detection for zookeeper physical backend
2015-05-20 22:54:35 -04:00
Armon Dadgar
a3ddd9ddb2
server: Minor copy change
2015-05-20 17:49:16 -07:00
Armon Dadgar
7e08d68e48
Merge pull request #222 from DavidWittman/config-backend-check
...
Fail gracefully if a physical backend is not supplied
2015-05-20 17:47:45 -07:00
Armon Dadgar
0cee72a7c0
Merge pull request #238 from jsok/remote-addr-port
...
Set RemoteAddr correctly on logical.Request
2015-05-20 17:44:51 -07:00
Armon Dadgar
1851434407
physical/s3: skip unit test if missing ENV vars
2015-05-20 17:42:41 -07:00
Armon Dadgar
e2ff72795e
website: doc cleanup
2015-05-20 17:42:29 -07:00
Armon Dadgar
8c75cc83e3
Merge pull request #242 from jstremick/f-physical-s3-backend
...
Physical S3 backend implementation
2015-05-20 17:00:44 -07:00
James Stremick
6726fcf7bc
Removed erroneous mutex and tests. Delete operates on a single key now
2015-05-20 19:53:35 -04:00
Armon Dadgar
268db24819
command/listener: Request TLS client cert. Fixes #214
2015-05-20 16:01:40 -07:00
Armon Dadgar
a3100356b4
Merge pull request #245 from ianunruh/fix/gh-244
...
Allow dot in LDAP login username
2015-05-20 14:43:18 -07:00
Armon Dadgar
ce16785f30
Merge pull request #246 from joemiller/patch-1
...
fix doc example to submit valid json in POST body
2015-05-20 14:40:58 -07:00
joe miller
fd57ca0e39
fix doc example to submit valid json in POST body
...
I don't know if there is some version of curl that auto-generates json but the example didn't work for me on curl 7.32.0. Submitting the data as JSON works though.
2015-05-20 13:11:54 -07:00
Armon Dadgar
a7b1ec6592
Merge pull request #241 from abedra/doc_fixes
...
Fix typo in app-id docs
2015-05-20 12:27:09 -07:00
Ian Unruh
2e1bce27a9
Allow dot in LDAP login username
2015-05-20 11:54:15 -07:00
James Stremick
64182d57c3
AWS dependency update
2015-05-20 11:46:21 -04:00
James Stremick
53979d6f30
Physical S3 backend implementation
2015-05-20 10:59:03 -04:00
Aaron Bedra
ed9b44bb44
Fix typo in app-id docs
2015-05-20 09:36:54 -05:00
Seth Vargo
05e59edb02
Merge pull request #239 from ijin/patch-1
...
Document that Vault Server needs to be running for vault help path
2015-05-20 12:28:31 +02:00
Seth Vargo
4f34a670e6
Merge pull request #232 from dmccarney/master
...
Minor documentation typo fixes.
2015-05-20 12:27:47 +02:00
Michael H. Oshita
e2a923a887
Document that Vault Server needs to be running for vault help path
...
Confused initial, I tried running `vault help secret` by itself and found out that the server needs to be running to execute this command.
Furthermore, the client needs `VAULT_ADDR` configured (`http://127.0.0.1:8200 ` in dev mode, since it uses https by default) to interact with the server.
2015-05-20 17:06:59 +09:00
Jonathan Sokolowski
be2538aca3
http: Extract IP from RemoteAddr correctly
2015-05-20 15:23:41 +10:00
Paul Hinze
513a8edc67
Merge pull request #230 from hashicorp/b-tf-mod-ports
...
terraform: allow SG rule customization
2015-05-19 15:56:33 -05:00
Paul Hinze
46a7dafcf4
terraform: allow SG rule customization
...
Switches SG rules to from nested to top-level resources and exports the
SG ids so that users of the module can define additional rules for their
Vault instances and/or the Vault ELB.
While this change should be backwards compatible, applying the new rules
might result in a very brief interruption of Vault service as:
(1) Old nested-resource SG rules are cleared
(2) New SG rules are applied one by one
2015-05-19 15:08:37 -05:00
Daniel McCarney
c7bf89cf60
Add missing word to storage backend threat model.
2015-05-19 12:11:48 -07:00
Daniel McCarney
af1aabe397
Fix "the a lease ID" typo.
2015-05-19 12:07:07 -07:00
Daniel McCarney
dc5e1a714a
Fix "all everything" typo in Secrets description.
2015-05-19 11:59:20 -07:00
Armon Dadgar
4981b8de29
Merge pull request #224 from ianunruh/feature/unseal-msg
...
Improve unseal CLI message
2015-05-19 11:33:23 -07:00
Armon Dadgar
c81207c6bd
Merge pull request #225 from ianunruh/fix/gh-213
...
HTTP should return 503 when sealed
2015-05-19 11:32:37 -07:00
Seth Vargo
7c8af14f4c
Merge pull request #221 from ianunruh/fix/api-docs
...
Remove non-existent unseal API argument
2015-05-19 15:44:32 +02:00
Ian Unruh
63199e5af4
HTTP should return 503 when sealed
2015-05-19 00:59:19 -07:00
Ian Unruh
faa07cc165
Improve unseal CLI message
2015-05-19 00:34:18 -07:00
David Wittman
b04332f8fc
Fail gracefully if a phys backend is not supplied
2015-05-18 22:55:12 -05:00