2583 Commits

Author SHA1 Message Date
Brian Kassouf
799cd3c7c7 Upate links in docs 2017-05-03 10:25:12 -07:00
Brian Kassouf
78b27fa765 Add API docs 2017-05-03 02:13:07 -07:00
Brian Kassouf
85967cb5a8 Add custom plugins docs page 2017-05-03 00:01:28 -07:00
Brian Kassouf
2be2e4c74e Update docs for the database backend and it's plugins 2017-05-02 22:24:31 -07:00
Brian Kassouf
d230446b4d Update docs and add cassandra as a builtin plugin 2017-05-02 17:04:49 -07:00
Brian Kassouf
dc5979e3ae Fix wording in docs 2017-05-02 16:20:07 -07:00
Jeff Mitchell
d300c23597 Add website skeleton 2017-05-02 16:26:32 -04:00
mhristof
4ba3755c79 fix format for secret/pki (#2668) 2017-05-02 07:52:55 -04:00
Brian Kassouf
7f92c5f47f Fix documentation 2017-05-02 02:22:06 -07:00
Brian Kassouf
31541b7fdd Add plugins interal page to the sidebar: 2017-05-02 02:00:04 -07:00
Brian Kassouf
885398e341 Add internals doc for plugins 2017-05-02 01:59:36 -07:00
Seth Vargo
bf9ef7c302 Add UI docs (#2664) 2017-05-01 17:36:37 -04:00
Marc Boudreau
2287780287 Changing the ttl value in the Generate IAM with STS sample to a valid value (#2665) 2017-05-01 14:41:49 -04:00
Justin Gerace
2e8e9ed02d Add globbing support to the PKI backend's allowed_domains list (#2517) 2017-05-01 10:40:18 -04:00
Michael Ansel
8da4405c99 Add constraints on the Common Name for certificate-based authentication (#2595)
* Refactor to consolidate constraints on the matching chain

* Add CN prefix/suffix constraint

* Maintain backwards compatibility (pick a random cert if multiple match)

* Vendor go-glob

* Replace cn_prefix/suffix with required_name/globbing

Move all the new tests to acceptance-capable tests instead of embedding in the CRL test

* Allow authenticating against a single cert

* Add new params to documentation

* Add CLI support for new param

* Refactor for style

* Support multiple (ORed) name patterns

* Rename required_names to allowed_names

* Update docs for parameter rename

* Use the new TypeCommaStringSlice
2017-04-30 11:37:10 -04:00
Cameron Stokes
91366e256c Add local flag to docs for API endpoints. (#2625) 2017-04-28 14:33:27 -04:00
Ryan Smith-Evans
c58e4f0817 Added required header (#2656) 2017-04-28 08:56:14 -04:00
greenbrian
8074e6167a Fix links on Consul storage backend page (#2652) 2017-04-28 07:48:23 -04:00
Chris Hoffman
804bca7bcd Updating revoke/renew to prefer PUT method (#2646) 2017-04-27 10:47:43 -04:00
Jeff Mitchell
5deb20b29a Fix types of listener options, currently they're all strings 2017-04-25 11:20:48 -04:00
Seth Vargo
97db657397 Make sidebar a bit wider on smaller screens (#2638) 2017-04-24 15:39:58 -04:00
Joel Thompson
5a934e6b2f Create unified aws auth backend (#2441)
* Rename builtin/credential/aws-ec2 to aws

The aws-ec2 authentication backend is being expanded and will become the
generic aws backend. This is a small rename commit to keep the commit
history clean.

* Expand aws-ec2 backend to more generic aws

This adds the ability to authenticate arbitrary AWS IAM principals using
AWS's sts:GetCallerIdentity method. The AWS-EC2 auth backend is being to
just AWS with the expansion.

* Add missing aws auth handler to CLI

This was omitted from the previous commit

* aws auth backend general variable name cleanup

Also fixed a bug where allowed auth types weren't being checked upon
login, and added tests for it.

* Update docs for the aws auth backend

* Refactor aws bind validation

* Fix env var override in aws backend test

Intent is to override the AWS environment variables with the TEST_*
versions if they are set, but the reverse was happening.

* Update docs on use of IAM authentication profile

AWS now allows you to change the instance profile of a running instance,
so the use case of "a long-lived instance that's not in an instance
profile" no longer means you have to use the the EC2 auth method. You
can now just change the instance profile on the fly.

* Fix typo in aws auth cli help

* Respond to PR feedback

* More PR feedback

* Respond to additional PR feedback

* Address more feedback on aws auth PR

* Make aws auth_type immutable per role

* Address more aws auth PR feedback

* Address more iam auth PR feedback

* Rename aws-ec2.html.md to aws.html.md

Per PR feedback, to go along with new backend name.

* Add MountType to logical.Request

* Make default aws auth_type dependent upon MountType

When MountType is aws-ec2, default to ec2 auth_type for backwards
compatibility with legacy roles. Otherwise, default to iam.

* Pass MountPoint and MountType back up to the core

Previously the request router reset the MountPoint and MountType back to
the empty string before returning to the core. This ensures they get set
back to the correct values.
2017-04-24 15:15:50 -04:00
Matthew Gallagher
b20afce73f Remove mention of Darwin mlock support from docs. (#2624) 2017-04-22 16:56:01 -04:00
Cameron Stokes
ab03ffb047 [docs] Fix typo in Transit API docs. 2017-04-20 15:18:55 -07:00
Chad Greenburg
0716a3ef2b Added documentation for listing roles in the Consul secret backend (#2619) 2017-04-20 07:44:25 -04:00
Eric Bock
d5f1556067 Fixing typo in Transit API rewrap section (#2617) 2017-04-19 09:29:33 -07:00
Brian Nuszkowski
dc8d85dec1 Add api documentation for unauthenticated SSH CA public key retrieval (#2616) 2017-04-19 11:30:24 -04:00
Jeff Mitchell
85b92811ab Update sign-verbatim to correctly set generate_lease (#2593) 2017-04-18 15:54:31 -04:00
Mitch Davis
a20815972c Use service bind for searching LDAP groups (#2534)
Fixes #2387
2017-04-18 15:52:05 -04:00
Jeff Mitchell
aefb1ce58d Merge pull request #2607 from hashicorp/b-grammar
Fix sentence - remove "and"
2017-04-18 15:50:56 -04:00
Jeff Mitchell
cb0b22031d Update index.html.md 2017-04-18 15:50:44 -04:00
Seth Vargo
0bbddb41e0
Update logos 2017-04-18 14:17:56 -04:00
Jon Benson
32854c8066 Fix sentence - remove "and" 2017-04-17 19:35:04 -07:00
Jeff Mitchell
a385d1e092 Remove allow_token_displayname from docs as we don't support that any longer 2017-04-17 17:25:44 -04:00
Jeff Mitchell
6eb81fec7e Add more info to STS TTL to website 2017-04-17 17:19:13 -04:00
Phil Watts
e79bdb2dbe Update revoke.html.md (#2604)
Changed param's description verb from renew to revoke, to match the page context.
2017-04-17 12:40:24 -04:00
Jeff Mitchell
bdc3002d56 Update SSH docs to indicate deprecation of dynamic key type 2017-04-17 11:11:05 -04:00
James Phillips
f989af475a Update 404.html.md (#2594) 2017-04-14 12:19:15 -04:00
Jeff Mitchell
8e2b8ff1df Add some extra documentation around ssh-keygen -L to see signed cert
info.

Ping #2569
2017-04-13 15:23:27 -04:00
Chris Hoffman
892d558fa2 minor docs update 2017-04-10 09:46:25 -04:00
Jeff Mitchell
3f3eddc5a2 Update AES-GCM verification text 2017-04-07 14:35:29 -04:00
Shivaram Lingamneni
7cbc5d6e05 implement a no_store option for pki roles (#2565) 2017-04-07 11:25:47 -07:00
Jeff Mitchell
b44ed072b5 Remove superfluous/misleading comments around some listener options 2017-04-07 14:23:56 -04:00
Jeff Mitchell
14c0000169 Update SSH CA documentation
Fixes #2551
Fixes #2569
2017-04-07 11:59:25 -04:00
Seth Vargo
742332bd1a
Add press-kit 2017-04-06 18:43:55 -04:00
Seth Vargo
43923bc785
Import fonts 2017-04-06 18:42:09 -04:00
Seth Vargo
61f0862920
Add press kit, hashicorp logo 2017-04-06 18:28:26 -04:00
Jeff Mitchell
c03466b0de Remove "these are denoted below" w.r.t. SIGHUP
SIGHUP support is denoted in the sections/options that support actions on SIGHUP, so with the new docs layout it's confusing to have the old statement in there. Remove in favor of the inline comments.

Fixes #2572
2017-04-06 16:08:58 -04:00
Sebastian Haba
9d013a0707 add mssql physical backend (#2546) 2017-04-06 09:33:49 -04:00
Pavel Timofeev
e2d3a06234 Ldap auth doc fix (#2568)
* Move url parameter to the next line and fix a typo

* Add userdn paramater to the Scenario 1.
Without userdn set Vault can't search with error like

Code: 400. Errors:

* LDAP search failed for detecting user: LDAP Result Code 32 "No Such Object": 0000208D: NameErr: DSID-031001E5, problem 2001 (NO_OBJECT), data 0, best match of:
        ''
2017-04-05 08:29:38 -07:00