Commit Graph

1298 Commits

Author SHA1 Message Date
Eric Buth e4e4253d65 added etcd as a non-HA storage backend, updated documentation 2015-05-26 13:38:25 -04:00
Ken Breeman f6292eb441 Cleaned up zookeeper_ha locking, added tests and cleanup. 2015-05-26 00:12:16 -04:00
Ken Breeman efb455e5e8 Improvements based on PR feedback: removed empty detectAddress function, moved anonymous functions to named ones, added localLock mutex around i.held 2015-05-25 22:14:00 -04:00
Ken Breeman 13d47c11ab Merge branch 'master' into physical_zookeeper_ha 2015-05-25 21:01:59 -04:00
Armon Dadgar 0665b7e62b Merge pull request #258 from ianunruh/docs/http-libraries
Add libraries section to HTTP docs
2015-05-25 11:33:46 -07:00
David Wittman 5df1d725aa Add test for stdin input
Shamelessly borrowed this pattern from write_test.go
2015-05-23 13:23:38 -05:00
David Wittman 1411749222 Read from stdin with auth command 2015-05-23 13:23:37 -05:00
Ian Unruh 2a6dd3225c Add libraries section to HTTP docs 2015-05-22 14:32:14 -07:00
Armon Dadgar 50d70954e0 Merge pull request #257 from ianunruh/feature/read-field
Add ability to read raw field from secret
2015-05-22 11:57:21 -07:00
Ian Unruh bb9f7c47ff Add read field flag to documentation 2015-05-22 11:33:28 -07:00
Ian Unruh 48778c5260 Add ability to read raw field from secret 2015-05-22 11:28:23 -07:00
Armon Dadgar c97025f3f4 godeps: Updating aws-sdk-go 2015-05-22 11:12:35 -07:00
Armon Dadgar 8f5bd619c2 Merge pull request #256 from jefferai/f-fix-aws-err
AWS changed their error interface; fix compile breakage.
2015-05-22 11:09:20 -07:00
Jeff Mitchell bb866b0140 AWS changed their error interface; fix compile breakage. 2015-05-21 16:15:21 -04:00
Armon Dadgar 3713ef9fb7 command/renew: typo fix. Fixes #240 2015-05-21 11:03:25 -07:00
Ken Breeman fa50ca026a Restore backwards compatibility for zookeeper physical backend. Vault already prevents locks and data from overlapping internally. 2015-05-20 23:15:31 -04:00
David Wittman fb898ecc1b Prompt for auth token when no args provided
This makes `vault auth` work as documented:

> If no -method is specified, then the token is expected. If it is not
> given on the command-line, it will be asked via user input. If the
> token is "-", it will be read from stdin.
2015-05-20 22:10:02 -05:00
Ken Breeman a26882ebd4 Merge branch 'master' into physical_zookeeper_ha
Conflicts:
	physical/zookeeper.go
2015-05-20 22:59:37 -04:00
Ken Breeman ae74837e55 Implement HA lock loss detection for zookeeper physical backend 2015-05-20 22:54:35 -04:00
Armon Dadgar a3ddd9ddb2 server: Minor copy change 2015-05-20 17:49:16 -07:00
Armon Dadgar 7e08d68e48 Merge pull request #222 from DavidWittman/config-backend-check
Fail gracefully if a physical backend is not supplied
2015-05-20 17:47:45 -07:00
Armon Dadgar 0cee72a7c0 Merge pull request #238 from jsok/remote-addr-port
Set RemoteAddr correctly on logical.Request
2015-05-20 17:44:51 -07:00
Armon Dadgar 1851434407 physical/s3: skip unit test if missing ENV vars 2015-05-20 17:42:41 -07:00
Armon Dadgar e2ff72795e website: doc cleanup 2015-05-20 17:42:29 -07:00
Armon Dadgar 8c75cc83e3 Merge pull request #242 from jstremick/f-physical-s3-backend
Physical S3 backend implementation
2015-05-20 17:00:44 -07:00
James Stremick 6726fcf7bc Removed erroneous mutex and tests. Delete operates on a single key now 2015-05-20 19:53:35 -04:00
Armon Dadgar 268db24819 command/listener: Request TLS client cert. Fixes #214 2015-05-20 16:01:40 -07:00
Armon Dadgar a3100356b4 Merge pull request #245 from ianunruh/fix/gh-244
Allow dot in LDAP login username
2015-05-20 14:43:18 -07:00
Armon Dadgar ce16785f30 Merge pull request #246 from joemiller/patch-1
fix doc example to submit valid json in POST body
2015-05-20 14:40:58 -07:00
joe miller fd57ca0e39 fix doc example to submit valid json in POST body
I don't know if there is some version of curl that auto-generates json but the example didn't work for me on curl 7.32.0. Submitting the data as JSON works though.
2015-05-20 13:11:54 -07:00
Armon Dadgar a7b1ec6592 Merge pull request #241 from abedra/doc_fixes
Fix typo in app-id docs
2015-05-20 12:27:09 -07:00
Ian Unruh 2e1bce27a9 Allow dot in LDAP login username 2015-05-20 11:54:15 -07:00
James Stremick 64182d57c3 AWS dependency update 2015-05-20 11:46:21 -04:00
James Stremick 53979d6f30 Physical S3 backend implementation 2015-05-20 10:59:03 -04:00
Aaron Bedra ed9b44bb44 Fix typo in app-id docs 2015-05-20 09:36:54 -05:00
Seth Vargo 05e59edb02 Merge pull request #239 from ijin/patch-1
Document that Vault Server needs to be running for vault help path
2015-05-20 12:28:31 +02:00
Seth Vargo 4f34a670e6 Merge pull request #232 from dmccarney/master
Minor documentation typo fixes.
2015-05-20 12:27:47 +02:00
Michael H. Oshita e2a923a887 Document that Vault Server needs to be running for vault help path
Confused initial, I tried running `vault help secret` by itself and found out that the server needs to be running to execute this command.

Furthermore, the client needs `VAULT_ADDR` configured (`http://127.0.0.1:8200` in dev mode, since it uses https by default) to interact with the server.
2015-05-20 17:06:59 +09:00
Jonathan Sokolowski be2538aca3 http: Extract IP from RemoteAddr correctly 2015-05-20 15:23:41 +10:00
Paul Hinze 513a8edc67 Merge pull request #230 from hashicorp/b-tf-mod-ports
terraform: allow SG rule customization
2015-05-19 15:56:33 -05:00
Paul Hinze 46a7dafcf4 terraform: allow SG rule customization
Switches SG rules to from nested to top-level resources and exports the
SG ids so that users of the module can define additional rules for their
Vault instances and/or the Vault ELB.

While this change should be backwards compatible, applying the new rules
might result in a very brief interruption of Vault service as:

 (1) Old nested-resource SG rules are cleared
 (2) New SG rules are applied one by one
2015-05-19 15:08:37 -05:00
Daniel McCarney c7bf89cf60 Add missing word to storage backend threat model. 2015-05-19 12:11:48 -07:00
Daniel McCarney af1aabe397 Fix "the a lease ID" typo. 2015-05-19 12:07:07 -07:00
Daniel McCarney dc5e1a714a Fix "all everything" typo in Secrets description. 2015-05-19 11:59:20 -07:00
Armon Dadgar 4981b8de29 Merge pull request #224 from ianunruh/feature/unseal-msg
Improve unseal CLI message
2015-05-19 11:33:23 -07:00
Armon Dadgar c81207c6bd Merge pull request #225 from ianunruh/fix/gh-213
HTTP should return 503 when sealed
2015-05-19 11:32:37 -07:00
Seth Vargo 7c8af14f4c Merge pull request #221 from ianunruh/fix/api-docs
Remove non-existent unseal API argument
2015-05-19 15:44:32 +02:00
Ian Unruh 63199e5af4 HTTP should return 503 when sealed 2015-05-19 00:59:19 -07:00
Ian Unruh faa07cc165 Improve unseal CLI message 2015-05-19 00:34:18 -07:00
David Wittman b04332f8fc Fail gracefully if a phys backend is not supplied 2015-05-18 22:55:12 -05:00