Commit graph

9048 commits

Author SHA1 Message Date
Jeff Mitchell c8dbab9c3d
Only return 200 if there are actually warnings in AWS roles create/update (#5487) 2018-10-09 16:52:47 -04:00
Calvin Leung Huang b47e648ddf
Logger cleanup (#5480) 2018-10-09 09:43:17 -07:00
Calvin Leung Huang 1b8b9a49d4
Remove unnecessary test (#5483) 2018-10-09 09:40:47 -07:00
Becca Petrin 937cfff21a
Make builtin auth and secret plugins buildable (#5456) 2018-10-09 09:29:20 -07:00
Jeff Mitchell ccfa6d0f38 Bump Travis Go version 2018-10-08 12:54:14 -04:00
Jeff Mitchell 0f7ad4b040 Merge branch '0.11.3' into master-oss 2018-10-08 12:52:13 -04:00
Jeff Mitchell ab582c80e8 Remove outdated references to UUIDs for token values 2018-10-08 12:45:17 -04:00
Jeff Mitchell 586559868b
Cut version 0.11.3 2018-10-08 11:28:51 -04:00
Jeff Mitchell e7a0d8a158 Prep for release 2018-10-08 11:24:02 -04:00
Jeff Mitchell 8e5c7b6265 Prep for release 2018-10-08 11:23:50 -04:00
Jeff Mitchell ec7904fd89 changelog++ 2018-10-08 10:03:32 -04:00
Jeff Mitchell 9edf3b154a changelog++ 2018-10-08 10:01:45 -04:00
Jeff Mitchell 00f6ad0146 changelog++ 2018-10-08 10:00:24 -04:00
Jeff Mitchell 8fc5c52f6c changelog++ 2018-10-08 10:00:22 -04:00
Jeff Mitchell e10cfd6ab9 Set allowed OIDs to any value when generaing a CA. (#5462)
* Set allowed OIDs to any value when generaing a CA.

Also, allow utf-8 in addition to utf8 as the OID type specifier, and
allow `*` to specify any OID of a supported type.

* Update PKI docs
2018-10-08 10:00:20 -04:00
Jim Kalafut 0f3dd22e59 Fix docs typos 2018-10-08 10:00:18 -04:00
Jim Kalafut 4ada68ba34 Fix 'vault auth' panic (#5473)
Running 'vault auth' with no parameters was panicking:

panic: assignment to entry in nil map
	github.com/hashicorp/vault/command/login.go:255 +0xdee

Now it will show help.
2018-10-08 10:00:15 -04:00
Becca Petrin 3e3c195773 add a check to prevent panics (#5471) 2018-10-08 10:00:10 -04:00
vishalnayak 380796f4fe Fix TestIdentityStore_GroupHierarchyCases 2018-10-08 10:00:07 -04:00
Vishal Nayak 989be25309 Added test for verifying member group id deletion (#5469) 2018-10-08 10:00:02 -04:00
Brian Kassouf 761635b27c Fix issue with revoking leases that have periods in them (#5461) 2018-10-08 10:00:00 -04:00
Jim Kalafut 5976b32855 Update examples to use sha256 (#5468)
sha_256 is supported but not referenced in our API docs.
2018-10-08 09:59:57 -04:00
Sebastian Plattner f9ffdbb1b2 Fix remove Group Member in Identity Group not working (#5466) 2018-10-08 09:59:43 -04:00
Jeff Mitchell 6b9b189475 changelog++ 2018-10-08 09:59:41 -04:00
Konstantinos Tsanaktsidis 247d09a1fc Fix a panic in MongoDB backend with concurrent create/revoke (#5463)
When Vault is concurrently creating and revoking leases for MongoDB
users as part of the database secrets engine, and then loses connection
to MongoDB, it can panic. This occurrs because the RevokeUser path does
_not_ lock the mutex, but the CreateUser path does. Both threads of
execution can concurently decide to call c.session.Close() in
mongodb/connection_producer.go:119, and then mgo panics when the second
close attempt occurs.
2018-10-08 09:59:39 -04:00
Jeff Mitchell 4c9301a91f Remove incorrect api docs text around metadata being supported for identity aliases 2018-10-08 09:59:36 -04:00
Jeff 695f9ed682 fix doc typo (#5455) 2018-10-08 09:58:29 -04:00
Martins Sipenko 59dc6d786f Fix missing > (#5452) 2018-10-08 09:58:19 -04:00
Brian Kassouf 316a9ed48f Fix identity link (#5449) 2018-10-08 09:58:15 -04:00
Brian Kassouf 39a2ba7424 mailto link (#5448) 2018-10-08 09:57:30 -04:00
Becca Petrin 7409777888 alicloud auto-unseal docs (#5446) 2018-10-08 09:57:04 -04:00
Chris Hoffman 0cd93c48c0 adding upgrade guide (#5447) 2018-10-08 09:57:01 -04:00
Brian Kassouf b3f5b5948f changelog++ 2018-10-08 09:56:56 -04:00
Jeff Mitchell 8a604ee2df changelog++ 2018-10-08 09:54:21 -04:00
Jeff Mitchell 7b3274769e changelog++ 2018-10-08 09:53:28 -04:00
Jeff Mitchell ff57c14bc2
Set allowed OIDs to any value when generaing a CA. (#5462)
* Set allowed OIDs to any value when generaing a CA.

Also, allow utf-8 in addition to utf8 as the OID type specifier, and
allow `*` to specify any OID of a supported type.

* Update PKI docs
2018-10-08 09:51:43 -04:00
Jim Kalafut b7c8082960
Fix docs typos 2018-10-05 22:53:09 -07:00
Jim Kalafut bd4a7c57c6 Fix 'vault auth' panic (#5473)
Running 'vault auth' with no parameters was panicking:

panic: assignment to entry in nil map
	github.com/hashicorp/vault/command/login.go:255 +0xdee

Now it will show help.
2018-10-05 16:05:26 -07:00
Becca Petrin f276ca2d11 add a check to prevent panics (#5471) 2018-10-05 09:23:06 -07:00
vishalnayak baad5a66fd Fix TestIdentityStore_GroupHierarchyCases 2018-10-05 05:46:09 -04:00
Vishal Nayak fbec18fef0
Added test for verifying member group id deletion (#5469) 2018-10-04 10:38:41 -07:00
Brian Kassouf 0ae790f9de
Fix issue with revoking leases that have periods in them (#5461) 2018-10-04 09:55:48 -07:00
Jim Kalafut 24dc42c908
Update examples to use sha256 (#5468)
sha_256 is supported but not referenced in our API docs.
2018-10-04 09:51:54 -07:00
Sebastian Plattner 782f8dedd2 Fix remove Group Member in Identity Group not working (#5466) 2018-10-04 09:27:29 -07:00
Jeff Mitchell 4895ff2f9a changelog++ 2018-10-04 09:51:41 -04:00
Konstantinos Tsanaktsidis fb90854233 Fix a panic in MongoDB backend with concurrent create/revoke (#5463)
When Vault is concurrently creating and revoking leases for MongoDB
users as part of the database secrets engine, and then loses connection
to MongoDB, it can panic. This occurrs because the RevokeUser path does
_not_ lock the mutex, but the CreateUser path does. Both threads of
execution can concurently decide to call c.session.Close() in
mongodb/connection_producer.go:119, and then mgo panics when the second
close attempt occurs.
2018-10-04 09:51:08 -04:00
Jeff Mitchell 10d9009eba Remove incorrect api docs text around metadata being supported for identity aliases 2018-10-04 09:09:41 -04:00
Becca Petrin 072d56be95 vendor the desired version of go.uuid (#5458) 2018-10-03 15:30:05 -07:00
Brian Kassouf 2995c06a53
Fix build (#5457) 2018-10-03 14:53:08 -07:00
Jeff 45f3297739 fix doc typo (#5455) 2018-10-03 11:25:57 -07:00