Chad Whitacre
4d6f74b2a3
Remove quotes to match styling elsewhere
...
Cf. http://vaultproject.io/intro/getting-started/dynamic-secrets.html
2015-05-31 16:20:56 -04:00
Chad Whitacre
e6fadc0eb8
Add a missing word
2015-05-31 16:19:38 -04:00
Chad Whitacre
2d442a2b5e
fix line wrapping
...
Sorry!
2015-05-31 16:07:50 -04:00
Chad Whitacre
2ab0ea3ff7
Direct new users over to the getting started guide
...
I found myself on the dev server reference, when really I was more interested in the getting started guide. This link is intended to help others get back on the right track.
2015-05-31 16:06:58 -04:00
Chad Whitacre
de535518f9
Put me in charge of dev mode :)
...
- "You" as subject instead of "Vault"
- give the actual command
- minor formatting changes
2015-05-31 15:54:32 -04:00
Chad Whitacre
a5f551e590
Capitalize the first word of a sentence
2015-05-31 14:22:57 -04:00
Steven De Coeyer
fc2400698a
Add help info for -dev flag
2015-05-31 18:05:15 +02:00
Armon Dadgar
c94a0562c3
website: document key rotation internals
2015-05-29 15:34:29 -07:00
Armon Dadgar
200b30d28d
website: document new system APIs
2015-05-29 15:05:05 -07:00
Armon Dadgar
33d19a4879
vault: reload master key before keyring
2015-05-29 14:30:03 -07:00
Armon Dadgar
3f7c295c88
vault: adding ability to reload master key
2015-05-29 14:29:55 -07:00
Armon Dadgar
2a92de5b3a
core: adding tests for HA rekey and rotate
2015-05-29 12:16:34 -07:00
Armon Dadgar
95ee23111f
vault: all rekey commands should fail as standby
2015-05-29 11:52:37 -07:00
Seth Vargo
d4ebde3504
Merge pull request #275 from christianberg/patch-1
...
Fix typo
2015-05-29 08:38:37 -07:00
Christian Berg
de4b6e2029
Fix typo
2015-05-29 10:24:29 +02:00
Chris Bednarski
99325f2a31
Updated phrasing to note restarts, stop, and other sealing scenarios
2015-05-28 17:07:38 -07:00
Chris Bednarski
1e94e05c60
Changed phrasing for unseal key notification
2015-05-28 17:02:09 -07:00
Armon Dadgar
3b7292b87b
vault: ensure upgrades are cleaned up
2015-05-28 16:52:06 -07:00
Armon Dadgar
060de7a0d7
vault: move upgrade logic out of core
2015-05-28 16:43:44 -07:00
Armon Dadgar
fa9c85dbaf
vault: create upgrade path in HA mode
2015-05-28 16:43:15 -07:00
Armon Dadgar
7d0a72d9d6
vault: moving upgrade path into barrier
2015-05-28 16:42:32 -07:00
Armon Dadgar
85a78225ae
vault: handle read of key upgrades
2015-05-28 16:11:31 -07:00
Armon Dadgar
c261f66b2b
vault: support keyring reload
2015-05-28 16:09:15 -07:00
Armon Dadgar
32ccf77a61
vault: adding barrier AddKey
2015-05-28 15:52:26 -07:00
Armon Dadgar
63d938def8
keyring: Add key serialization
2015-05-28 15:49:52 -07:00
Armon Dadgar
d037e941a4
vault: prevent rekey on standby
2015-05-28 15:26:35 -07:00
Armon Dadgar
33bc096f43
command/rekey: adding tests
2015-05-28 15:22:42 -07:00
Armon Dadgar
da566a41fd
command/rekey: first pass at rekey
2015-05-28 15:08:09 -07:00
Armon Dadgar
a7ebd51391
api: Support the rekey endpoints
2015-05-28 14:37:20 -07:00
Armon Dadgar
24ed178f44
http: adding rekey handlers
2015-05-28 14:28:50 -07:00
boncheff
d8a3bdc2d7
Update index.html.md
...
Updated the docs to show an example of how to read/write a secret using the HTTP API
2015-05-28 22:28:25 +01:00
Armon Dadgar
7606f43ea1
vault: more logging
2015-05-28 14:15:06 -07:00
Armon Dadgar
87963f9db2
vault: minor rekey cleanups
2015-05-28 12:07:52 -07:00
Armon Dadgar
56f9f20aad
vault: testing rekey
2015-05-28 12:02:30 -07:00
Armon Dadgar
c1bd04b416
vault: first pass at rekey
2015-05-28 11:40:01 -07:00
Armon Dadgar
3c812e1dfa
vault: ensure master key is copied to avoid memzero issues
2015-05-28 11:38:59 -07:00
Armon Dadgar
4731c48948
vault: Adding VerifyMaster to Barrier
2015-05-28 11:28:33 -07:00
Armon Dadgar
7e1f7d8c1c
vault: prevent raw access to protected paths
2015-05-28 10:24:41 -07:00
Armon Dadgar
4a11980dc1
command/rotate: Adding new rotate command
2015-05-28 10:16:33 -07:00
Armon Dadgar
8f5b7dfe50
Merge pull request #269 from sheldonh/getting_started_deploy_consul
...
Use local Consul instance in deploy walkthrough
2015-05-28 10:06:36 -07:00
Armon Dadgar
c40371bfd2
Merge pull request #268 from sheldonh/howto_mlock
...
Document unprivileged mlock on Linux
2015-05-28 10:03:10 -07:00
Sheldon Hearn
c2390f2a29
Don't recommend exporting VAULT_TOKEN
...
It's not needed by the dev server (which writes ~/.vault-token),
and breaks the Getting Started guide (e.g. #267 ).
2015-05-28 14:39:35 +02:00
Sheldon Hearn
0cf95d9393
Use local Consul instance in deploy walkthrough
...
As per hashicorp/vault#217 , demo.consul.io prevents sessions from being
created, which means you can't use it as a backend for Vault.
2015-05-28 14:11:34 +02:00
Sheldon Hearn
233a862b60
Mention disable_mlock
in deploy walkthrough
2015-05-28 13:24:28 +02:00
Sheldon Hearn
d1ec264eff
Clarify the disable_mlock option
2015-05-28 12:40:56 +02:00
Ken Breeman
794cca7f85
Cleaned up error handling and HA lock monitoring for zookeeper physical backend based on PR feedback.
2015-05-28 00:39:12 -04:00
Armon Dadgar
db55ac7d74
command/key-status: Adding new key-status command
2015-05-27 18:17:02 -07:00
Armon Dadgar
0d22532537
api: Adding Rotate and KeyStatus
2015-05-27 18:05:23 -07:00
Armon Dadgar
2091907ab1
http: adding key-status and rotate handlers
2015-05-27 18:02:50 -07:00
Armon Dadgar
ba66058408
vault: more logging around rotate
2015-05-27 17:56:55 -07:00