Commit graph

6559 commits

Author SHA1 Message Date
Jeff Mitchell b6ea287ecb Change package in azure test 2017-06-16 12:18:16 -04:00
Jeff Mitchell f8f95524d0 Update Azure dep (#2881) 2017-06-16 12:06:09 -04:00
Jeff Mitchell b946eefcda Bump deps 2017-06-16 11:14:18 -04:00
Jeff Mitchell 74a733749a changelog++ 2017-06-16 11:09:59 -04:00
Dan Everton 32add0809e More efficient s3 paging (#2780) 2017-06-16 11:09:15 -04:00
Katie Bayes 798ea39cc0 Fix middleman update (#2832)
* update middleman version from 24 to 26

* update middleman in Makefile and packer.json
2017-06-16 11:04:47 -04:00
vishalnayak a50ce54603 doc: add radius to MFA backend docs 2017-06-15 18:31:53 -04:00
Brian Kassouf ef979cc02b Use WeakDecode to decode the initialize values (#2871) 2017-06-14 18:59:27 -07:00
Chris Hoffman a91763b81f reverting client changes in #2856 (#2866) 2017-06-14 16:39:20 -04:00
Jeff Mitchell 338ebffb9d Add string slice with single value test function 2017-06-14 14:20:37 -04:00
Jeff Mitchell df229f5255 Fix typo in transit docs 2017-06-14 11:49:12 -04:00
Seth Vargo 789247d922 Add callouts for deprecations and beta (#2854)
This makes the sidebar emphasize the deprecated database backends more.
2017-06-14 16:11:16 +01:00
Chris Hoffman ec1d943dce moving client calls to new endpoint (#2856) 2017-06-14 10:38:15 -04:00
vishalnayak 6a072441da changelog++ 2017-06-12 18:39:09 -04:00
Vishal Nayak 2d61087b99 api: Don't treat 429 as error (#2850)
* api: Don't treat 429 as error

* Added parenthesis
2017-06-12 18:31:36 -04:00
Nathan Valentine 3309496916 Clean up extra word in docs (#2847) 2017-06-12 13:08:54 -04:00
Jonathan Duncan 7038348b6d Adding some visual separation for parameters (#2841)
Currently on the Documentation pages when parameters are listed, there is no visual separation between the parameter names, flags, and descriptions. This should make it a bit easier for humans to read.
2017-06-12 06:59:38 -04:00
Matthew Irish d26a8ebf5e add min_encryption_version to the transit key response (#2838) 2017-06-08 13:07:18 -05:00
Jeff Mitchell 8b3657d840 Add note about lowercasing usernames to userpass docs 2017-06-08 09:41:01 -04:00
jeremie0 ecfadc1599 Fix link to mongodb database plugin docs (#2834) 2017-06-08 07:02:29 -04:00
Cameron Stokes 8e0ac2dbb0 [docs] Add notes about deprecated database backends. (#2835) 2017-06-07 23:45:01 -07:00
Cameron Stokes d26bb4f2fb [docs] Fix Mongodb link in sidebar. 2017-06-07 20:36:36 -07:00
Seth Vargo 00ab0d713f
Update packer and makefile 2017-06-07 16:00:30 -04:00
Jeff Mitchell 1d61e38a59
Cut version 0.7.3 2017-06-07 15:39:25 -04:00
Jeff Mitchell 3aeb14fc05 changelog++ 2017-06-07 15:38:04 -04:00
Jeff Mitchell b8bc3d101b Bump versions 2017-06-07 15:23:51 -04:00
Jeff Mitchell 39286c0500 Automatically upgrade values to salted on access if salt exists in PathMap (#2831) 2017-06-07 15:22:08 -04:00
Brian Kassouf 8d58b43906 update database interface in the docs 2017-06-07 11:20:13 -07:00
Jeff Mitchell 2cbdf740ba changelog++ 2017-06-07 13:56:02 -04:00
Jeff Mitchell ab5014534e Clone policy permissions and then use existing values rather than policy values for modifications (#2826)
Should fix #2804
2017-06-07 13:49:51 -04:00
Jeff Mitchell f6d48312d8 Add new transit features to documentation 2017-06-07 13:00:14 -04:00
Matthew Irish 29b7a13aa0 changelog ++ 2017-06-07 10:23:13 -05:00
Jeff Mitchell dd02c8ca32 changelog++ 2017-06-07 10:28:21 -04:00
Joel Thompson 4a934915d7 Resolve AWS IAM unique IDs (#2814) 2017-06-07 10:27:11 -04:00
Jeff Mitchell 3bc53d447a changelog++ 2017-06-07 10:18:35 -04:00
Jeff Mitchell 2cc4a761f7 Honor role period for IAM auth type in AWS backend (#2828)
Fixes #2825
2017-06-07 10:18:02 -04:00
Jeff Mitchell 3c765ffef1 changelog++ 2017-06-07 10:03:56 -04:00
Jeff Mitchell fdf92aeba5 Add listing to database connections. (#2827)
Fixes #2823
2017-06-07 10:03:17 -04:00
Dan Brown 4f3fb87b9d Docs typo fixes (#2830)
* Fix passing payload.json file to curl

* Correct API endpoint
2017-06-07 10:02:58 -04:00
Jeff Mitchell 3c727acd61 changelog++ 2017-06-06 22:36:12 -04:00
Joel Thompson 7437ada31c Check if there's a bound iam arn when renewing (#2819)
Previously, the renew method would ALWAYS check to ensure the
authenticated IAM principal ARN matched the bound ARN.  However, there
is a valid use case in which no bound_iam_principal_arn is specified and
all bindings are done through inferencing. When a role is configured
like this, clients won't be able to renew their token because of the
check.

This now checks to ensure that the bound_iam_principal_arn is not empty
before requriing that it match the originally authenticated client.

Fixes #2781
2017-06-06 22:35:12 -04:00
Katie Bayes cff022a65c update middleman version from 24 to 26 (#2824) 2017-06-06 22:33:26 -04:00
Jeff Mitchell 62526dcec3 changelog++ 2017-06-06 16:04:49 -04:00
Jeff Mitchell a7fca34076 Add ability to specify encryption key version in transit (#2821) 2017-06-06 16:02:54 -04:00
Jeff Mitchell 545cf1de8f changelog++ 2017-06-06 09:50:38 -04:00
Brian Kassouf 606fe393be Use the role name in the db username (#2812) 2017-06-06 09:49:49 -04:00
Jeff Mitchell 778e716677 changelog++ 2017-06-05 18:05:22 -04:00
Brian Rodgers e9b52ed928 Log auth info on permission denied due to ACL (#2754) 2017-06-05 18:04:31 -04:00
Jeff Mitchell 1f3ceba11b changelog++ 2017-06-05 16:44:35 -04:00
Jeff Mitchell abdd39ecb9 changelog++ 2017-06-05 16:37:34 -04:00