Commit Graph

40 Commits

Author SHA1 Message Date
Scott Miller
e315ef31ec
Remove the Beta flag from Seal HA (#27437) 2024-06-11 16:36:58 +01:00
Scott Miller
de84d373c1
Document environment variable usage in Seal HA (#27421)
* Document how environment variables work with seal names

* wording
2024-06-10 11:37:59 -05:00
prabhat-hashi
c88967abb5
Docs- Update info on key rotation (#23274)
* Docs- Update info on key rotation

Added a sentence about needing to seal-rewrap if you want to disable or delete old key.

* rectified the url for seal-rewrap

rectified the url for seal-rewrap

* fixed some grammar

* Update website/content/docs/configuration/seal/pkcs11.mdx

---------

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2024-05-01 15:42:54 -07:00
Sarah Chavis
038aaa3ff7
1.16 release notes and beta cleanup (#26247)
Co-authored-by: Tom Proctor <tomhjp@users.noreply.github.com>
2024-04-03 22:18:40 +01:00
Scott Miller
f319d98665
Re-add beta designation (#26190)
* Re-add beta designation

* nl

* mark the migration section beta too

* beta
2024-03-27 15:16:27 -04:00
Scott Miller
c6da02962d
Add a configuration flag for enabling multiseal (Seal HA), CE side (#25908)
* Add a configuration flag for enabling multiseal (Seal HA), CE side

* imports

* no quotes

* get rid of dep on ent config

* Abstract enableMultiSeal for a build time switch

* license headers

* wip

* gate physical seal gen fetch by a param

* docs tweak, remove core flag

* updates from the ent pr

* update stub

* update test fixtures for enable_multiseal

* use accessor

* add a test fixture for non-multiseal diagnose

* remove debugging crtuch

* Do handle phys seal gen info even if multiseal is off, in order to facilitate enable/disable safeties

* more enabled flag handling

* Accept seal gen info if we were previously disabled, and persist it

* update unit test

* Validation happens postUnseal, so this test is invalid

* Dont continue setting conf if seal loading fails during SIGHUP

* Update website/content/docs/configuration/seal/seal-ha.mdx

Thanks, that does sound much clearer

Co-authored-by: Jason O'Donnell <2160810+jasonodonnell@users.noreply.github.com>

* use validation if previous gen was enabled

* unit test update

* stub SetMultisealEnabled

* bring over more changes from ent

* this was an unfix

---------

Co-authored-by: Jason O'Donnell <2160810+jasonodonnell@users.noreply.github.com>
2024-03-22 14:23:05 +00:00
Scott Miller
14816dcf86
Be explicit about Shamir seals in Seal HA (#26092) 2024-03-22 09:25:20 -04:00
Victor Rodriguez
e4aba1516d
Do not refresh seal-wrapped values when there are unhealthy seals. (#25801)
* Do not refresh seal-wrapped values when there are unhealthy seals.

Modify Access.IsUpToDate() to consider entries as being up-to-date when one or
more encryption wrappers fail to encrypt the test value, since re-wrapping the
value would result in the loss of the ciphertext for the unhealthy wrappers.

In addition, make Access.IsUpToDate() return true is the key set ID has not been
populated and the caller has not forced key ID refresh.

Make Access.Encrypt() return an error for any encryption wrapper that is skipped
due to being unhealthy.

* Update Seal HA documentation.

Mention that the barrier key and the recovery keys cannot be rotated while there
are unhealthy seals.

Document environment variable VAULT_SEAL_REWRAP_SAFETY.
2024-03-07 15:50:36 +00:00
Scott Miller
7943a9e094
Add a fuller example of a Seal HA compatible seal stanza (#25704)
* Add a fuller example of a Seal HA compatible seal stanza

* abs link
2024-02-29 12:45:53 -06:00
Scott Miller
96498316f1
Seal HA documentation updates (#25316)
* Seal HA documentation updates

* anchor

* rel link

* remove beta

* try again on internal link

* still trying to get this internal redirect to work

* try without path
2024-02-08 16:00:50 -06:00
Scott Miller
453e352844
Document max_parallel for PKCS#11 seals (#25291) 2024-02-08 15:51:28 +00:00
Scott Miller
ebef296c30
Be a bit more explicit about the need for two seals. (#23553)
* Be a bit more explicit about th need for two seals

* Add a mixture note
2023-10-06 11:29:17 -05:00
Sarah Chavis
8952b69eba
Make additional changes (#23416) 2023-09-28 17:24:12 -07:00
Scott Miller
036cbcebd9
First draft of Seal HA documentation (#23252)
* wip

* Initial draft of Seal HA docs

* nav data

* Fix env var name

* title

* Note partially wrapped values and disabled seal participation

* Update website/data/docs-nav-data.json

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>

* correct initial upgrade limitation

* Add note about shamir seals and migration

* fix nav json

* snapshot note

* availability note

* seal-backend-status

* Add a couple more clarifying statements

* header typo

* correct initial upgrade wording

* Update website/content/docs/configuration/seal/seal-ha.mdx

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>

* Update website/content/docs/concepts/seal.mdx

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>

---------

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2023-09-22 13:18:48 -05:00
Scott Miller
8c4b4650ae
Typo in seal config doc for pkcs#11 (#22905)
* Typo in seal config doc for pkcs#11

* Update ENV var list

---------

Co-authored-by: Steve Clark <steven.clark@hashicorp.com>
2023-09-08 10:56:34 -05:00
Sarah Chavis
bd3596610f
Add the appropriate enterprise alerts for seal wrapping (#22628) 2023-08-30 11:09:49 -07:00
Ethan Lowman
5e5ead45c7
docs: Fix default gcpkms region (#17098) 2023-08-15 14:33:11 -04:00
Anton Averchenkov
f4f0412b6a
[docs] Convert titles to sentense case (#21426)
* Convert documentation titles to sentense case

* Docker, Google, Foundry, Cloud proper case
2023-06-30 19:22:07 -04:00
Bryce Kalow
79f6ff191c
update learn links to point to developer locations (#19026) 2023-02-06 20:34:51 -08:00
Ashlee M Boyer
06df5b9d95
docs: Migrate link formats (#18696)
* Adding check-legacy-links-format workflow

* Adding test-link-rewrites workflow

* Updating docs-content-check-legacy-links-format hash

* Migrating links to new format

Co-authored-by: Kendall Strautman <kendallstrautman@gmail.com>
2023-01-25 16:12:15 -08:00
Florin Cătălin Țiucra-Popa
3d5ed417c6
Update pkcs11.mdx (#16994) 2022-09-02 09:01:29 -07:00
Zalary Young
99fc3abae2
adds note about aws kms_key_id alias (#10693)
Co-authored-by: zalary <zalary@hashicorp.com>
2022-08-31 09:35:06 -07:00
Nick Cabatoff
4dc81554ce
Point people in the right direction for tokens used in transit autounseal. (#16951) 2022-08-31 10:37:25 -04:00
Loann Le
3c13d52cb0
Vault documentation: updated all references from Learn to Tutorial (#15514)
* updated learn to tutorial

* correct spelling
2022-05-19 18:04:46 -07:00
Loann Le
bac9c38bba
Vault documentation: added disable parameter to seal stanza-related doc pages (#15329)
* add disable parameter

* modified note
2022-05-09 10:12:30 -07:00
Loann Le
bf2667bd2c
Vault documentation: updated docs to include a note about seal requirement (#15172)
* add note about seal requirement

* fixed spelling error

* updated notes

* Update website/content/docs/configuration/seal/pkcs11.mdx

Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>

* Update website/content/docs/concepts/seal.mdx

Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>

Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
2022-04-26 12:13:03 -07:00
kitography
2d03150157
Typo fixes; numbering fixes. (#15010)
* Typo fixes; numbering fixes.

* Removes changes to numbering - these aren't visible (see https://riptutorial.com/markdown/example/1805/numbered-lists)
2022-04-13 15:01:04 -04:00
Loann Le
e2490059d0
changed reference from learn to tutorial (#14868) 2022-04-04 10:05:34 -07:00
Loann Le
10833d4d63
updated references from learn to tutorial (#14867) 2022-04-04 10:05:16 -07:00
Loann Le
93472f303e
updated references from learn to tutorial (#14866) 2022-04-04 10:04:50 -07:00
Yoko Hyakuna
990cd8b929
Fix broken links referencing to API docs (#14565)
* Fix all '/api/' to '/api-docs/'

* Minor fixes

* Undo some of the unintentional changes
2022-03-17 18:14:48 -07:00
Jim Kalafut
17747a706f
Rename master key -> root key in docs (#14542) 2022-03-16 22:01:38 -07:00
Alexander Scheel
4f86ae1eb5
Add clarification around vague "this" references (#13968)
* Clarify subject of this w.r.t. TLS configuration

Thanks to @aphorise for pointing this out internally.

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Clarify vague this in secrets/gcp docs

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Clarify vague this in secrets/aws docs

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Clarify vague this in secrets/database/oracle.mdx

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Clarify vague this in seal/pkcs11 docs

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Clarify vague this in agent/autoauth docs

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2022-02-09 13:02:44 -05:00
Steven Clark
acf91ac29b
Documentation updates for new keys for PKCS#11 unsealing (#13814)
* Document new force_rw_session parameter within pkcs11 seals

* documentation for key_id and hmac_key_id fields

* Apply suggestions from code review

Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>

* Update website/content/docs/configuration/seal/pkcs11.mdx

Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>

Co-authored-by: rculpepper <rculpepper@hashicorp.com>
Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
2022-01-28 11:25:02 -05:00
Scott Miller
f8cb3dcc63
Don't claim that Vault obfuscates the environment variable for sensitive values, this doesn't work at least in recent version of Go, as Go makes a copy of the environment, so we're only modifying that one, and not the one visible to the rest of the system (#13252) 2021-11-24 11:50:34 -06:00
Alexander Scheel
f373f23da4
go-kms-wrapping update for Azure Key Vault's Managed HSM offering (#12934)
* Update to hashicorp/go-kms-wrapping@v0.6.8

Co-authored-by: Rachel Culpepper <84159930+rculpepper@users.noreply.github.com>
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add documentation around Managed HSM KeyVault

This introduces the "resource" config parameter and the
AZURE_AD_RESOURCE environment variable from the updated go-kms-wrapping
dependency.

Co-authored-by: Rachel Culpepper <84159930+rculpepper@users.noreply.github.com>
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add changelog entry for g-k-w changes

Includes changes from @stevendpclark.

Co-authored-by: Rachel Culpepper <84159930+rculpepper@users.noreply.github.com>
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

Co-authored-by: Rachel Culpepper <84159930+rculpepper@users.noreply.github.com>
2021-10-27 12:07:18 -04:00
aphorise
4aeab7e8c4
Docs: Seal pkcs11 updated example with actual hex slot reference and … (#12530)
* Docs: Seal pkcs11 updated example with actual hex slot reference and notes related to decimal conversion. Minor correction to **Note** area in 'lib' parameter above 'slot'.

* Docs: Seal pkcs11 slot note correction.
2021-09-22 16:55:20 -04:00
Loann Le
3ede1ed317
adding ARN in description (#12477) 2021-09-01 13:12:20 -07:00
Bryce Kalow
e27b43c482
feat(website): migrates nav data format and updates docs pages (#11242)
* migrates nav data format and updates docs pages

* removes sidebar_title from content files
2021-04-06 13:49:04 -04:00
Jeff Escalante
179df992c0
Implement MDX Remote (#10581)
* implement mdx remote

* fix an unfenced code block

* fix partials path

Co-authored-by: Jim Kalafut <jkalafut@hashicorp.com>
2020-12-17 16:53:33 -05:00