Matthew Irish
e7801faf2a
fix broken link ( #4329 )
2018-04-10 11:11:38 -05:00
Brian Kassouf
915e452c0d
KV: Update 'versioned' naming to 'v2' ( #4293 )
...
* Update 'versioned' naming to 'v2'
* Make sure options are set
* Fix description of auth flag
* Review feedback
2018-04-09 09:39:32 -07:00
Chris Hoffman
295db4718f
Root Credential Rotation Docs ( #4312 )
...
* updating root credential docs
* more docs updates
* more docs updates
2018-04-09 12:20:29 -04:00
Chris Hoffman
6492311767
remove token from curl request for login paths ( #4303 )
2018-04-06 18:10:59 -04:00
Andy Manoske
0b4adfd92f
Update index.html.md
2018-04-05 15:16:28 -07:00
Seth Vargo
aec4a603b4
Rename Google things to say "Google", update telemetry ( #4267 )
2018-04-04 10:37:44 -04:00
Brian Kassouf
56274d854d
Versioned K/V docs ( #4259 )
...
* Work on kv docs
* Add more kv docs
* Update kv docs
* More docs updates
* address some review coments
2018-04-03 23:22:41 -07:00
Roy Sindre Norangshol
3ddd3bd20c
project is now project_id ( #4251 )
...
Verified both via vault CLI and direct curl'ing towards API endpoints.
2018-04-03 17:11:47 -04:00
Vishal Nayak
c052bb5ae2
move identity docs from ent docs to oss ( #4235 )
2018-04-01 13:59:43 -04:00
LeSuisse
885a6e754d
Update usage of the deprecated generated-root command in the documentation ( #4232 )
2018-03-31 11:17:08 -04:00
Seth Vargo
e0fccbd55a
Add HA support to the Google Cloud Storage backend ( #4226 )
2018-03-30 12:36:37 -04:00
Brian Shumate
721bcc6546
Update Consuls Secrets quick start ( #4224 )
...
- Fix typo in role name
- Drop ordered list formatting on get credential example
2018-03-30 10:46:05 -04:00
Jon Benson
12cd8bdeb6
Update mfa-totp.html.md ( #4220 )
2018-03-29 16:51:13 -04:00
Jeff Mitchell
4b45cb7f91
Merge branch 'master-oss' into 0.10-beta
2018-03-27 12:40:30 -04:00
vishalnayak
29ed7a383f
docs: update aws ec2 auth step
2018-03-26 17:26:48 -04:00
Jeff Mitchell
1c2b610f3a
Remove a few more vault.rocks usages
2018-03-26 15:02:22 -04:00
Wilhelmina Drengwitz
9b91032297
Add general recommendation for the api_addr
config value ( #4198 )
...
We ran into some confusion about what we should be setting the api_addr config value to. I feel this general recommendation should nudge any others into a better understanding of what this value should point to.
2018-03-26 13:46:54 -04:00
Jeff Mitchell
43e9bcd948
Add more docs around list paths in policies.
...
CC #4199
2018-03-26 11:30:58 -04:00
Seth Vargo
04708d554c
Drop vault.rocks ( #4186 )
2018-03-23 11:41:51 -04:00
Chris Hoffman
505f0ea495
adding Azure docs ( #4185 )
...
Adding Azure Auth Method docs
2018-03-22 18:28:42 -04:00
Jim Kalafut
c646f96786
Fix minor docs and help text issues ( #4184 )
2018-03-22 09:29:59 -04:00
Brian Kassouf
d51dc47070
Add kv backend ( #4181 )
2018-03-21 22:56:52 -04:00
emily
468cad19f3
Docs for Vault GCP secrets plugin ( #4159 )
2018-03-21 15:02:38 -04:00
Josh Soref
e43b76ef97
Spelling ( #4119 )
2018-03-20 14:54:10 -04:00
Jeff Mitchell
59c451d246
Explicitly call out that we use aes-256 gcm-96 for the barrier.
...
Fixes #2913
2018-03-19 19:53:12 -04:00
Roger Berlind
aabccd5fd2
Fixed broken k8s TokenReview API link ( #4144 )
2018-03-17 21:23:41 -04:00
immutability
b2f44f9867
Plugins need setcap too for syscall mlock ( #4138 )
2018-03-16 06:05:01 -07:00
Jim Kalafut
17ed6663f7
Fix description of parameter value globbing ( #4131 )
2018-03-14 17:03:00 -04:00
Edward Z. Yang
1adda15299
Vault user needed to use STS Federation Tokens ( #4108 )
...
If you try to use role authorization to get an STS token, you'll get this error:
* Error generating STS keys: AccessDenied: Cannot call GetFederationToken with session credentials
2018-03-14 10:24:29 -04:00
Malte
26d8b7f095
Fix typo in recommended vault auth iam policy ( #4128 )
...
The resource arn for the `sts:AssumeRole` action is missing a `:` for the region and therefore invalid.
2018-03-14 03:45:21 -04:00
Brian Shumate
f8324e9c2a
Docs: grammatical clarification around community supported note ( #4122 )
2018-03-13 10:32:28 -04:00
Jeff Mitchell
0fec3965e1
Update text around default policy to make it clear that it is user-modifiable
2018-03-08 15:48:11 -05:00
Jim Kalafut
3024869fdc
Fix instruction in installation docs ( #4097 )
2018-03-08 11:02:04 -05:00
Aleksandar
ceef3b60d8
Add the chunk_size optional parameter to gcs storage ( #4060 )
2018-03-05 08:32:48 -05:00
Mike
79a884fbe8
Correct endpoint's path in Doc ( #4074 )
...
Fix typo in endpoint's path
2018-03-05 07:41:53 -05:00
Jim Kalafut
9a16efe7db
Change "mount" to "secrets enable" in docs
2018-03-02 12:54:28 -08:00
Joel Thompson
8a115c73d9
auth/aws: Allow lists in binds ( #3907 )
...
* auth/aws: Allow lists in binds
In the aws auth method, allow a number of binds to take in lists
instead of a single string value. The intended semantic is that, for
each bind type set, clients must match at least one of each of the bind
types set in order to authenticate.
2018-03-02 11:09:14 -05:00
Andy Manoske
d21cbe3687
Update index.html.md
...
Updated for Unbound
2018-02-28 16:20:54 -08:00
Jeff Mitchell
8f328c490a
Fix broken link on Consul docs
2018-02-26 13:28:15 -05:00
chris trott
4987468fba
Configurable Consul Service Address ( #3971 )
...
* Consul service address is blank
Setting an explicit service address eliminates the ability for Consul
to dynamically decide what it should be based on its translate_wan_addrs
setting.
translate_wan_addrs configures Consul to return its lan address to nodes
in its same datacenter but return its wan address to nodes in foreign
datacenters.
* service_address parameter for Consul storage backend
This parameter allows users to override the use of what Vault knows to
be its HA redirect address.
This option is particularly commpelling because if set to a blank
string, Consul will leverage the node configuration where the service is
registered which includes the `translate_wan_addrs` option. This option
conditionally associates nodes' lan or wan address based on where
requests originate.
* Add TestConsul_ServiceAddress
Ensures that the service_address configuration parameter is setting the
serviceAddress field of ConsulBackend instances properly.
If the "service_address" parameter is not set, the ConsulBackend
serviceAddress field must instantiate as nil to indicate that it can be
ignored.
2018-02-23 11:15:29 -05:00
Yoko
e57eb8d1a1
Changed the layout category menu ( #4007 )
...
* Changed the layout category menu
* Fixed typos
* Fixed a typo, and removed the duplicated generate-root guide
* Fixed the redirect.txt
2018-02-22 16:24:01 -08:00
Jeff Mitchell
207081740e
Make docs around regenerate_key more specific
2018-02-22 09:09:20 -05:00
Jeff Mitchell
f83f41436d
Update PKCS11 seal information
2018-02-21 09:05:36 -05:00
Jeff Mitchell
e36a49fdf1
Add some info about cert reloading behavior on SIGHUP
...
CC #3990
2018-02-15 17:11:48 -05:00
Seth Vargo
7af2bdc5a4
Add support for Google Cloud Spanner ( #3977 )
2018-02-14 20:31:20 -05:00
Jeff Mitchell
ef00a69f11
Add ChaCha20-Poly1305 support to transit ( #3975 )
2018-02-14 11:59:46 -05:00
Nick
1489c08ea0
Update lease.html.md ( #3759 )
2018-02-14 09:44:34 -05:00
Brian Shumate
2b617f305a
DOCS: update Telemetry with more coverage ( #3968 )
...
- Add initial secrets engines metrics
- Update metrics types/values
- Update language for auth methods, secrets engines, audit devices
- Add more linking to relevant documentation
2018-02-14 09:39:51 -05:00
Brian Shumate
c400463298
Clarify with example of file-backend specific metrics ( #3913 )
2018-02-13 11:04:11 -05:00
Brian Shumate
bea6121359
DOCS: update Telemetry ( #3964 )
...
- Correct time to millis
- Correct storage backend summaries from # ops to duration of ops
2018-02-13 10:15:19 -05:00