mirror of
https://github.com/hashicorp/vault.git
synced 2025-11-28 22:21:30 +01:00
Fix default_max_request_duration HCL name and update docs (#5321)
* Fix default_max_request_duration HCL name and update docs * Update tcp.html.md
This commit is contained in:
parent
60d4dac8a0
commit
e8b7ec2e11
@ -46,7 +46,7 @@ type Config struct {
|
||||
DefaultLeaseTTLRaw interface{} `hcl:"default_lease_ttl"`
|
||||
|
||||
DefaultMaxRequestDuration time.Duration `hcl:"-"`
|
||||
DefaultMaxRequestDurationRaw interface{} `hcl:"default_max_request_time"`
|
||||
DefaultMaxRequestDurationRaw interface{} `hcl:"default_max_request_duration"`
|
||||
|
||||
ClusterName string `hcl:"cluster_name"`
|
||||
ClusterCipherSuites string `hcl:"cluster_cipher_suites"`
|
||||
|
||||
@ -120,6 +120,10 @@ to specify where the configuration is.
|
||||
duration for tokens and secrets. This is specified using a label
|
||||
suffix like `"30s"` or `"1h"`.
|
||||
|
||||
- `default_max_request_duration` `(string: "90s")` – Specifies the default
|
||||
maximum request duration allowed before Vault cancels the request. This can
|
||||
be overridden per listener via the `max_request_duration` value.
|
||||
|
||||
- `raw_storage_endpoint` `(bool: false)` – Enables the `sys/raw` endpoint which
|
||||
allows the decryption/encryption of raw data into and out of the security
|
||||
barrier. This is a highly privileged endpoint.
|
||||
|
||||
@ -38,6 +38,10 @@ advertise the correct address to other nodes.
|
||||
request size, in bytes. Defaults to 32 MB. Specifying a number less than or
|
||||
equal to `0` turns off limiting altogether.
|
||||
|
||||
- `max_request_duration` `(string: "90s")` – Specifies the maximum
|
||||
request duration allowed before Vault cancels the request. This overrides
|
||||
`default_max_request_duration` for this listener.
|
||||
|
||||
- `proxy_protocol_behavior` `(string: "") – When specified, turns on the PROXY
|
||||
protocol for the listener.
|
||||
Accepted Values:
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user