7782 Commits

Author SHA1 Message Date
Chad Whitacre
4d6f74b2a3 Remove quotes to match styling elsewhere
Cf. http://vaultproject.io/intro/getting-started/dynamic-secrets.html
2015-05-31 16:20:56 -04:00
Chad Whitacre
e6fadc0eb8 Add a missing word 2015-05-31 16:19:38 -04:00
Chad Whitacre
2d442a2b5e fix line wrapping
Sorry!
2015-05-31 16:07:50 -04:00
Chad Whitacre
2ab0ea3ff7 Direct new users over to the getting started guide
I found myself on the dev server reference, when really I was more interested in the getting started guide. This link is intended to help others get back on the right track.
2015-05-31 16:06:58 -04:00
Chad Whitacre
de535518f9 Put me in charge of dev mode :)
- "You" as subject instead of "Vault"
 - give the actual command
 - minor formatting changes
2015-05-31 15:54:32 -04:00
Chad Whitacre
a5f551e590 Capitalize the first word of a sentence 2015-05-31 14:22:57 -04:00
Steven De Coeyer
fc2400698a Add help info for -dev flag 2015-05-31 18:05:15 +02:00
Armon Dadgar
c94a0562c3 website: document key rotation internals 2015-05-29 15:34:29 -07:00
Armon Dadgar
200b30d28d website: document new system APIs 2015-05-29 15:05:05 -07:00
Armon Dadgar
33d19a4879 vault: reload master key before keyring 2015-05-29 14:30:03 -07:00
Armon Dadgar
3f7c295c88 vault: adding ability to reload master key 2015-05-29 14:29:55 -07:00
Armon Dadgar
2a92de5b3a core: adding tests for HA rekey and rotate 2015-05-29 12:16:34 -07:00
Armon Dadgar
95ee23111f vault: all rekey commands should fail as standby 2015-05-29 11:52:37 -07:00
Seth Vargo
d4ebde3504 Merge pull request #275 from christianberg/patch-1
Fix typo
2015-05-29 08:38:37 -07:00
Christian Berg
de4b6e2029 Fix typo 2015-05-29 10:24:29 +02:00
Chris Bednarski
99325f2a31 Updated phrasing to note restarts, stop, and other sealing scenarios 2015-05-28 17:07:38 -07:00
Chris Bednarski
1e94e05c60 Changed phrasing for unseal key notification 2015-05-28 17:02:09 -07:00
Armon Dadgar
3b7292b87b vault: ensure upgrades are cleaned up 2015-05-28 16:52:06 -07:00
Armon Dadgar
060de7a0d7 vault: move upgrade logic out of core 2015-05-28 16:43:44 -07:00
Armon Dadgar
fa9c85dbaf vault: create upgrade path in HA mode 2015-05-28 16:43:15 -07:00
Armon Dadgar
7d0a72d9d6 vault: moving upgrade path into barrier 2015-05-28 16:42:32 -07:00
Armon Dadgar
85a78225ae vault: handle read of key upgrades 2015-05-28 16:11:31 -07:00
Armon Dadgar
c261f66b2b vault: support keyring reload 2015-05-28 16:09:15 -07:00
Armon Dadgar
32ccf77a61 vault: adding barrier AddKey 2015-05-28 15:52:26 -07:00
Armon Dadgar
63d938def8 keyring: Add key serialization 2015-05-28 15:49:52 -07:00
Armon Dadgar
d037e941a4 vault: prevent rekey on standby 2015-05-28 15:26:35 -07:00
Armon Dadgar
33bc096f43 command/rekey: adding tests 2015-05-28 15:22:42 -07:00
Armon Dadgar
da566a41fd command/rekey: first pass at rekey 2015-05-28 15:08:09 -07:00
Armon Dadgar
a7ebd51391 api: Support the rekey endpoints 2015-05-28 14:37:20 -07:00
Armon Dadgar
24ed178f44 http: adding rekey handlers 2015-05-28 14:28:50 -07:00
boncheff
d8a3bdc2d7 Update index.html.md
Updated the docs to show an example of how to read/write a secret using the HTTP API
2015-05-28 22:28:25 +01:00
Armon Dadgar
7606f43ea1 vault: more logging 2015-05-28 14:15:06 -07:00
Armon Dadgar
87963f9db2 vault: minor rekey cleanups 2015-05-28 12:07:52 -07:00
Armon Dadgar
56f9f20aad vault: testing rekey 2015-05-28 12:02:30 -07:00
Armon Dadgar
c1bd04b416 vault: first pass at rekey 2015-05-28 11:40:01 -07:00
Armon Dadgar
3c812e1dfa vault: ensure master key is copied to avoid memzero issues 2015-05-28 11:38:59 -07:00
Armon Dadgar
4731c48948 vault: Adding VerifyMaster to Barrier 2015-05-28 11:28:33 -07:00
Armon Dadgar
7e1f7d8c1c vault: prevent raw access to protected paths 2015-05-28 10:24:41 -07:00
Armon Dadgar
4a11980dc1 command/rotate: Adding new rotate command 2015-05-28 10:16:33 -07:00
Armon Dadgar
8f5b7dfe50 Merge pull request #269 from sheldonh/getting_started_deploy_consul
Use local Consul instance in deploy walkthrough
2015-05-28 10:06:36 -07:00
Armon Dadgar
c40371bfd2 Merge pull request #268 from sheldonh/howto_mlock
Document unprivileged mlock on Linux
2015-05-28 10:03:10 -07:00
Sheldon Hearn
c2390f2a29 Don't recommend exporting VAULT_TOKEN
It's not needed by the dev server (which writes ~/.vault-token),
and breaks the Getting Started guide (e.g. #267).
2015-05-28 14:39:35 +02:00
Sheldon Hearn
0cf95d9393 Use local Consul instance in deploy walkthrough
As per hashicorp/vault#217, demo.consul.io prevents sessions from being
created, which means you can't use it as a backend for Vault.
2015-05-28 14:11:34 +02:00
Sheldon Hearn
233a862b60 Mention disable_mlock in deploy walkthrough 2015-05-28 13:24:28 +02:00
Sheldon Hearn
d1ec264eff Clarify the disable_mlock option 2015-05-28 12:40:56 +02:00
Ken Breeman
794cca7f85 Cleaned up error handling and HA lock monitoring for zookeeper physical backend based on PR feedback. 2015-05-28 00:39:12 -04:00
Armon Dadgar
db55ac7d74 command/key-status: Adding new key-status command 2015-05-27 18:17:02 -07:00
Armon Dadgar
0d22532537 api: Adding Rotate and KeyStatus 2015-05-27 18:05:23 -07:00
Armon Dadgar
2091907ab1 http: adding key-status and rotate handlers 2015-05-27 18:02:50 -07:00
Armon Dadgar
ba66058408 vault: more logging around rotate 2015-05-27 17:56:55 -07:00