Commit Graph

2583 Commits

Author SHA1 Message Date
Andrey Kuzmin
4bd2a6a305 Etcd timeouts (#6285)
* Configurable lock and request etcd timeouts.

If etcd cluster placed on slow servers - request timeouts may be much greater, then hardcoded default values.
Also, in etcd setup, like above - may be need to greater lock timeout.

* Configurable lock and request etcd timeouts.

Docs.

* Use user friendly timeout syntax.

To allow specify more readable time values.
2019-02-27 18:34:29 -08:00
Anton R. Yuste
eb9574e367 Specify the userpass name creating the alias entity (#6289) 2019-02-27 18:28:33 -08:00
Jon Currey
30d0235360 Fix typo on Seal page of concepts docs (#6290) 2019-02-27 18:27:36 -08:00
John O'Sullivan
f3eaa90c46 Documenting -dev-plugin-dir vault server option (#6307)
Based on an answer from Brian Kassouf on the Google Group: https://groups.google.com/d/msg/vault-tool/7Qf9Hn1w3jA/yGUIKZxHGAAJ
2019-02-27 18:24:49 -08:00
Brad Jones
399056c73f
RabbitMQ 'vhost' parameter on roles endpoint should be 'vhosts'
In deploying this, I noted that passing `vhost` was unsuccessful, yet `vhosts` is.
2019-02-27 15:19:54 -07:00
vishalnayak
04d118ecf1 Agent caching docs superscript beta 2019-02-26 10:36:24 -05:00
vishalnayak
d551ebd31b Add Beta superscript to caching docs 2019-02-26 10:28:55 -05:00
vishalnayak
f021fffabe Agent doc update for beta testers 2019-02-26 10:20:55 -05:00
vishalnayak
603199c2cc Change agent's default port number to 8100 2019-02-26 10:02:12 -05:00
Calvin Leung Huang
d4e305f53e Agent caching docs (#6272)
* WIP agent caching docs

* More docs updates

* Add caching/index.html to docs_detailed_categories.yml

* Some more docs updates

* Some more docs updates

* updates

* address review feedback

* fix sample config

* Update website/source/docs/agent/caching/index.html.md

Co-Authored-By: calvn <cleung2010@gmail.com>

* fix config for sidebar display

* Add environment variable to the docs
2019-02-26 09:57:17 -05:00
Jim Kalafut
90898851f5
Update JWT docs for OIDC feature (#6270) 2019-02-21 17:06:23 -08:00
Becca Petrin
10551cb1d2 add note about sts region to doc 2019-02-21 16:57:52 -08:00
Chris Hoffman
362c56657c
adding 1.1 upgrade docs (#6279) 2019-02-21 17:41:06 -05:00
Becca Petrin
99bd2afbb3 allow aws region in cli login 2019-02-20 16:43:21 -08:00
Paul Korzhyk
b63e54c4b3
Update secrets-engines.html.md
That sentence sounds weird to me. I think this way is better.
2019-02-17 12:35:20 +02:00
chrissphinx
8bf8312215
fix example that was out-of-date
showing how to allow users auth'd with userpass method to modify their own passwords
2019-02-16 14:04:05 -05:00
dp-h
9900b6709b Revert "Add trailing slash for example in Vault Consul Storage Backend documentation. Fixes [issue 6171]"
This reverts commit 7726fdd1aa.

Revert to go through proper PR. Apologies.
2019-02-14 13:40:17 -07:00
Dan Brown
2f60669541 Docs EA update 1.0 (#6219)
* Confirm RA against Vault 1.0

Change product_version frontmatter to ea_version and increase to 1.0

* Update frontmatter key

Change product_version frontmatter to ea_version
2019-02-13 10:06:54 -05:00
Brian Shumate
a4b63b5187 Update configuration/listener documentation (#6228)
- Clarify that PROXY protocol version 1 is currently supported
- Add missing backtick to fix formatting issue
2019-02-13 09:27:05 -05:00
dp-h
7726fdd1aa Add trailing slash for example in Vault Consul Storage Backend documentation. Fixes [issue 6171] 2019-02-12 17:05:31 -07:00
dominic
7a380c71e3 Revert "Add trailing slash for example in Vault Consul Storage Backend documentation. Fixes [issue 6171]"
This reverts commit b275f2a1e6.

Pushed to master, my apologies. Will do proper PR for this.
2019-02-12 16:49:34 -07:00
dominic
b275f2a1e6 Add trailing slash for example in Vault Consul Storage Backend documentation. Fixes [issue 6171] 2019-02-12 16:47:17 -07:00
Emily Ye
56c8b1afce remove unsupported config delete docs 2019-02-12 13:48:30 -08:00
vishalnayak
2cc38dd25e Update transit docs 2019-02-12 14:27:17 -05:00
Sean Carolan
73e5fb15c0 Make this easier for new users (#6211) 2019-02-11 17:34:22 -05:00
Clint
7c78575660 Add signed key constraints to SSH CA [continued] (#6030)
* Adds the ability to enforce particular ssh key types and minimum key
lengths when using Signed SSH Certificates via the SSH Secret Engine.
2019-02-11 13:03:26 -05:00
Andrej van der Zee
d41c72664f Added socket keep alive option to Cassandra plugin. (#6201) 2019-02-10 18:34:50 -05:00
Michel Vocks
f95ac48db8 Added missing backslash in iam identity guide (#6193) 2019-02-08 09:56:36 -08:00
Brian Nuszkowski
9495b09de8 Add SHA1 signing/verification support to transit engine (#6037)
* Add SHA1 signing/verification support to transit engine

* Update signing/verification endpoint documentation to include sha1 hash algorithm
2019-02-07 15:31:31 -08:00
Graham Land
1c2c8fad34 Add Vault supported log levels (#6185)
Documentation : Add the supported log level configurations

`Supported log levels: Trace, Debug, Error, Warn, Info.`
2019-02-07 11:27:08 -08:00
Martins Sipenko
f51e49e581 Fix section heading size (#6137) 2019-02-07 11:18:58 -08:00
Eero Niemi
8f1f0d7aab Fixed typo (newtwork -> network) (#6177) 2019-02-07 13:06:38 -05:00
Jeff Mitchell
f472965f24 Remove refresh_interval from kvv1 API docs and CLI docs since kv get doesn't use it 2019-02-06 21:51:08 -05:00
Aidan Daniels-Soles
7693674cbd Fix wrong file name in service definition (#6174) 2019-02-06 15:43:03 -05:00
d
33b18b24b0 Revert "fixed trailing slash in consul.html.md example"
This reverts commit 4310bb58c8.

Accidental push to master, my apologies. See PR https://github.com/hashicorp/vault/pull/6175
2019-02-05 17:42:15 -07:00
Dominic Porreco
4310bb58c8 fixed trailing slash in consul.html.md example 2019-02-05 17:01:39 -07:00
Jeff Mitchell
20423f7082
Add allowed_response_headers (#6115) 2019-02-05 16:02:15 -05:00
Aidan Daniels-Soles
69d3fdd2b8 Replace special hyphen (#6165) 2019-02-05 10:48:26 -08:00
Brian Shumate
bad69b7d75 Update AppRole API docs (#6047)
- Use consistent "Create/Update" heading text style
2019-02-04 11:17:16 -05:00
nickwales
281b7cad1d Removed typo (#6162) 2019-02-04 11:13:37 -05:00
Matthew Potter
3e3e3f134c Add libvault to the list of elixir libraries (#6158) 2019-02-04 11:12:29 -05:00
Yoko
0da50446f5
Adding a mention for 'kv-v2' as type (#6151) 2019-02-01 11:26:08 -08:00
Jeff Mitchell
e60b72250e Update example output for PKI serial -> serial_number
Fixes #6146
2019-02-01 10:29:34 -05:00
Jeff Mitchell
0569b7fe5b Remove regenerate-key docs as it no longer exists 2019-02-01 09:29:40 -05:00
Jeff Mitchell
b6f40b5fec Add role_id as an alias name source for AWS and change the defaults 2019-01-30 15:51:45 -05:00
Donald Guy
977ce260ad Docs: Azure auth example using metadata service (#6124)
There are probably better ways to massage this but I think it would be helpful to have something like this included
2019-01-30 12:13:39 -08:00
Brian Shumate
8a1ef9051b Update documentation for command operator unseal (#6117)
- Add migrate command option
2019-01-28 10:27:51 -05:00
Gordon Shankman
91a37b23cc Adding support for SSE in the S3 storage backend. (#5996) 2019-01-26 16:48:08 -05:00
Calvin Leung Huang
a15ed85273 docs: update agent sample config (#6096) 2019-01-24 07:25:03 -05:00
Jeff Mitchell
a8b3bc9301
Update to latest etcd and use the new repository packages (#6087)
This will be necessary for go mod work

Additionally, the srv api has changed. This adapts to it.
2019-01-23 14:35:03 -05:00
Jeff Mitchell
5d6f25d569
Implement JWS-compatible signature marshaling (#6077)
This currently only applies to ECDSA signatures, and is a toggleable
option.
2019-01-23 12:31:34 -05:00
gitirabassi
3af9be4691 small fixes to docs and indexes 2019-01-18 02:14:57 +01:00
Jim Kalafut
f933956778
Update JWT docs with new jwt_supported_algs parameter (#6069) 2019-01-17 15:27:20 -08:00
Yoko
6e99c837e5 Fixed the broken link (#6052)
* Fixed the broken link

* Fixing the broken link

* Fixes redirect to Tokens guide

The separate redirect within learn.hashicorp.com will be fixed on its own repo.
2019-01-16 17:06:28 -08:00
Yoko
d5668f47ca
Adding the CLI flag placement info (#6027)
* Adding the CLI flag placement info

* Adding the definition of 'options' and 'args'

* tweaked the wording a little bit

* Added more description in the example

* Added a link to 'Flags' in the doc for options def
2019-01-15 11:24:50 -08:00
Jim Kalafut
e0269c9e2e
Remove unnecessary permission 2019-01-10 16:18:10 -08:00
Seth Vargo
41d2e31266 Simplify permission requirements for GCP things (#6012) 2019-01-10 10:05:21 -08:00
Dilan Bellinghoven
fe5d47eda1 Add docker-credential-vault-login to Third-Party Tools (#6003)
* Added Docker credential helper to list of Third-Party tools

* website/source/api/relatedtools.html.md: Fixed a typo
2019-01-10 10:46:18 -05:00
Yoko
e71065d851 Allowed characters in paths (#6015) 2019-01-10 10:39:20 -05:00
Vishal Nayak
77978055fe
Add option to configure ec2_alias values (#5846)
* Add option to configure ec2_alias values

* Doc updates

* Fix overwriting of previous config value

* s/configEntry/config

* Fix formatting

* Address review feedback

* Address review feedback
2019-01-09 18:28:29 -05:00
Yoko
0374114d94
Document upper limit on Transit encryption size (#6014) 2019-01-08 17:57:43 -08:00
Giacomo Tirabassi
726aa02038 Influxdb secret engine built-in plugin (#5924)
* intial work for influxdb secret plugin

* fixed typo

* added comment

* added documentation

* added tests

* fixed tests

* added vendoring

* minor testing issue with hardcoded values

* minor fixes
2019-01-08 17:26:16 -08:00
Julien Blache
29471c88e9 FoundationDB backend TLS support and housekeeping (#5800)
* Fix typo in documentation

* Update fdb-go-install.sh for new release tags

* Exclude FoundationDB bindings from vendoring, delete vendored copy

FoundationDB bindings are tightly coupled to the server version and
client library version used in a specific deployment. Bindings need
to be installed using the fdb-go-install.sh script, as documented in
the foundationdb backend documentation.

* Add TLS support to FoundationDB backend

TLS support appeared in FoundationDB 5.2.4, raising the minimum API version
for TLS-aware FoundationDB code to 520.

* Update documentation for FoundationDB TLS support
2019-01-08 09:01:44 -08:00
Seth Vargo
0e0f356a47 Fix formatting (#6009)
The new markdown parser is less forgiving
2019-01-08 08:51:37 -08:00
Thomas Kula
4fa24dd0d4 Fix small typo in azure.html.md (#6004) 2019-01-07 10:03:22 -05:00
Aric Walker
e65100c315 Remove duplicate "Users can" from policy md (#6002) 2019-01-07 07:02:28 -08:00
Seth Vargo
9293594176 Reduce required permissions for the GCPCKMS auto-unsealer (#5999)
This changes the behavior of the GCPCKMS auto-unsealer setup to attempt
encryption instead of a key lookup. Key lookups are a different API
method not covered by roles/cloudkms.cryptoKeyEncrypterDecrypter. This
means users must grant an extended scope to their service account
(granting the ability to read key data) which only seems to be used to
validate the existence of the key.

Worse, the only roles that include this permission are overly verbose
(e.g. roles/viewer which gives readonly access to everything in the
project and roles/cloudkms.admin which gives full control over all key
operations). This leaves the user stuck between choosing to create a
custom IAM role (which isn't fun) or grant overly broad permissions.

By changing to an encrypt call, we get better verification of the unseal
permissions and users can reduce scope to a single role.
2019-01-04 16:29:31 -05:00
Seth Vargo
02f1739155 Fix audit docs (#6000)
These appear to have been converted to (bad) HTML. This returns them to
their original markdown format.
2019-01-04 13:45:50 -06:00
Iain Gray
fe9f34dd2c Update DG to Vault 1.0 (#5855)
* Update DG to Vault 1.0

* as per comments  - chrishoffman

* Removed stray bracket and added quotes

* updated as per conversations with Dan
2019-01-03 10:10:37 -05:00
Graham Land
431cc5f9a6 Docs: Add Auto Unseal Rekey example (#5952)
* Add KMS Rekey example

I've had customers looking for AWS KMS rekeying examples today - when using pgp keys.
This example would have clarified what they needed to do.

* Replaced KMS reference with Auto Unseal

``` bash
Rekey an Auto Unseal vault and encrypt the resulting recovery keys with PGP:
```
2019-01-03 09:23:43 -05:00
Becca Petrin
d2789f4000
Merge pull request #5892 from jen20/jen20/dynamodb-capacity-doc
docs: Clarify the utility of DynamoDB capacities
2018-12-20 11:54:26 -08:00
Becca Petrin
3f00589181
Merge pull request #5947 from hmalphettes/master
Docs: JWT API - List Roles: fix the path
2018-12-20 09:15:57 -08:00
R.B. Boyer
b10ae71509 website: fix simple typo (#5979) 2018-12-19 14:46:54 -08:00
Clint
24de42ff7b
add MSSQL storage docs to sidebar (#5978) 2018-12-19 14:06:42 -06:00
Graham Land
0a703fda30 Docs: Add example for Vault init Auto Unseal with PGP Keys (#5951)
* Add example for AWS KMS AutoUnseal with PGP Keys

A customer could not figure how to get this working today. 
This example would have helped them. We don't mention KMS anywhere in this section.

* Changed reference from AWS KMS to Auto Unseal

``` bash
Initialize Auto Unseal, but encrypt the recovery keys with pgp keys:
```
2018-12-18 11:42:10 -05:00
Janosch Maier
34bdc25343 Docs: Fix project resource name in gcp roleset documentation (#5966)
The resource name when referring to a GCP project needs to have a "s". This PR adds the missing letter in the documentation.
2018-12-17 16:22:02 -08:00
vishalnayak
40bd37eda7 Upgrade guide for 0.11.6 2018-12-14 12:22:50 -05:00
Matthew Irish
36b96f7ddb update help output examples and mention openapi fragment support (#5954) 2018-12-14 09:12:03 -05:00
Jeff Mitchell
dd459e0d16 Update Consul ACL example
Fixes #5831
2018-12-13 17:18:28 -05:00
Hugues Malphettes
66e66a1b6c
Merge branch 'master' into master 2018-12-14 05:21:41 +08:00
Jeff Mitchell
4c735a35d2 Add sidebar link for approle autoauth docs 2018-12-13 09:51:47 -05:00
Hugues Malphettes
b8dbdea6a6
JWT API - List Roles: fix the path
With vault-1.0.0 and vault-0.11.4 a different path is needed to list the jwt registered roles:

```
$ vault list auth/jwt/roles
No value found at auth/jwt/roles/

$ vault list auth/jwt/role
Keys
----
myrole
```
I hope this helps!
2018-12-13 06:27:30 +08:00
Sergey Trasko
aeeed85f33 Fixed markdown for cert documentation (#5735) 2018-12-12 15:27:28 -05:00
Joel Thompson
e366aeb2e3 auth/aws: Clarify docs for cross-account access with IAM auth (#5900)
The docs hadn't been updated to reflect the ability to do cross-account
AWS IAM auth, and so it was a bit confusing as to whether that was
supported. This removes the ambiguity by explicitly mentioning AWS IAM
principals.
2018-12-12 15:21:27 -05:00
Bert Roos
426016d99f Added comma for readability (#5941)
Signed-off-by: Bert Roos <Bert-R@users.noreply.github.com>
2018-12-12 09:23:20 -05:00
Graham Land
2afefe6f1c Fixing a couple of small typos (#5942) 2018-12-12 05:56:58 -08:00
emily
12e3cf5c48 Update GCP auth BE docs (#5753)
Documented changes from https://github.com/hashicorp/vault-plugin-auth-gcp/pull/55
* Deprecating `project_id` for `bound_projects` and making it optional
* Deprecating `google_certs_endpoint` (unused)
* Adding group aliases 

Also, some general reformatting
2018-12-10 12:54:18 -08:00
Jeff Mitchell
516827962c
Update PKI docs (#5929) 2018-12-10 10:24:47 -05:00
Tommy Murphy
1a7cd116a7 Correct GCE Token Parameter (#5667)
As written the GCE token curl results in an error: "non-empty audience parameter required".

Google's docs (https://cloud.google.com/compute/docs/instances/verifying-instance-identity) confirm that the parameter is 'audience' not 'aud'.
2018-12-07 15:10:30 -08:00
Matthew Irish
af78f40cf8
change ui url so that it includes the trailing slash (#5890) 2018-12-05 12:25:16 -06:00
Chris Hoffman
c49d7ace7f
fixing redirect (#5908) 2018-12-05 12:06:15 -05:00
Chris Hoffman
ef4e5103e9
adding a redirect for old style upgrade guide location (#5905) 2018-12-05 10:54:10 -05:00
Chris Hoffman
a05d2a7aba
removing beta tag (#5904) 2018-12-05 10:45:22 -05:00
Jim Kalafut
d05a8df8f7 Update downloads.html.erb (#5899) 2018-12-05 10:40:33 -05:00
Chris Hoffman
579808ffd2
adding upgrade guide for 1.0 (#5903)
* adding upgrade guide for 1.0

* fixing sidebar
2018-12-05 10:33:53 -05:00
ncabatoff
5fc67c909d
Fix documentation re substitutions. It appears this was broken from day one. (#5896) 2018-12-04 13:14:00 -05:00
Jim Kalafut
d686d3f77f
Update operator migrate docs (#5895) 2018-12-04 08:49:42 -08:00
James Nugent
ac784f400d docs: Clarify the utility of DynamoDB capacities
When configuring DynamoDB, the read and write capacities configured only
have any effect if the table does not exist. As per the comment in the
code [1], the configuration of an existing table is never modified. This
was not previously reflected in the documentation - this commit
rectifies that.

[1]: https://github.com/hashicorp/vault/blob/master/physical/dynamodb/dynamodb.go#L743-L745
2018-12-03 17:55:18 -06:00
Martin
fdd89482ea Typo in policy template doc (#5887) 2018-12-03 14:36:17 -05:00
Jim Kalafut
c893488eed
Fix docs typos (#5881) 2018-11-30 14:32:04 -08:00
Martins Sipenko
050b1fade8 Fix config/sts docs (#5839) 2018-11-30 11:08:47 -08:00
Mike Christof
d4b2b5d1cb fixed api/secret/ssh docs (#5833) 2018-11-30 10:55:33 -08:00
Lucy Davinhart
abc3643057 Document /sys/health?perfstandbyok (#5870)
* Document /sys/health?perfstandbyok

Discovered that in Vault Enterprise 0.11.5, `/sys/health?standbyok` returns a 473 status for performance standby nodes, compared to a 200 for standard standby nodes.

Turns out there was an additional `perfstandbyok` option added, here:
e5aaf80764

* Update health.html.md

Slight tweak to wording for perfstandbyok
2018-11-29 09:57:30 -08:00
Martins Sipenko
7d26a77b3e Remove false statement from docs. (#5854) 2018-11-27 07:47:34 -05:00
Clint
4ad10f138d Agent kube projected token (#5725)
* Add support for custom JWT path in Agent: kubernetes auth

- add support for "token_path" configuration
- add a reader for mocking in tests

* add documentation for token_path
2018-11-19 14:28:17 -08:00
Jennifer Yip
67b931d49e Add consent manager to vaultproject.io (#5808)
* Add consent manager

* Add Hull and Hotjar
2018-11-19 17:23:03 -05:00
Atthavit Wannasakwong
e9bcc20fae fix wrong IAM action name in docs (#5812)
Reference:
https://docs.aws.amazon.com/amazondynamodb/latest/developerguide/api-permissions-reference.html
2018-11-17 09:10:50 -08:00
Janosch Maier
7d7ae3d8b8 Fix incorrect parameter name in docs (#5798) 2018-11-15 13:56:12 -08:00
Clint
3f2e2f4c5d
Add read config endpoint docs (#5790)
* Add read config endpoint docs

* fix response code, remove empty fields from sample response
2018-11-15 11:51:06 -06:00
Yoko
cc8d35ac3f
Fixing broken link (#5794) 2018-11-15 09:23:05 -08:00
Jim Kalafut
3744fcc69a
Fix incorrect parameter name in docs (#5793)
Fixes https://github.com/hashicorp/vault-plugin-auth-gcp/issues/56
2018-11-14 17:16:04 -08:00
Becca Petrin
c17ec383be
Update docs to match running builtins as plugins (#5727) 2018-11-14 09:17:12 -08:00
Brian Kassouf
e81948d614
Update downloads.html.erb 2018-11-13 20:01:17 -08:00
Vishal Nayak
0a9a0ba9ae
Recommend IAM auth over EC2 (#5772)
* Recommend IAM auth over EC2

* Update website/source/docs/auth/aws.html.md

Co-Authored-By: vishalnayak <vishalnayak@users.noreply.github.com>

* Update website/source/docs/auth/aws.html.md

Co-Authored-By: vishalnayak <vishalnayak@users.noreply.github.com>

* Update website/source/docs/auth/aws.html.md

Co-Authored-By: vishalnayak <vishalnayak@users.noreply.github.com>
2018-11-13 18:49:25 -05:00
Vishal Nayak
5f86c5c083
Fix CLI flag name for rekeying (#5774) 2018-11-13 14:27:14 -05:00
Jim Kalafut
0038a04ee6
Add docs for openapi endpoint (#5766) 2018-11-13 09:39:19 -08:00
Jeff Mitchell
1ec2aba180
Add note about seal migration not being supported for secondaries currently (#5762) 2018-11-12 09:41:05 -05:00
Jeff Escalante
72ac6fa606 Add redirect for /intro/index.html, remove old unused redirects file (#5728)
* add redirect for /intro/index.html, remove old unused redirects file

* adjust redirect link
2018-11-09 13:12:11 -05:00
Jim Kalafut
95841a1c6a
Fix sidebar order (#5744) 2018-11-09 09:46:28 -08:00
Jeff Mitchell
7ddbb5065e Update forwarded-for docs to indicate it supports cidrs, not just single hosts 2018-11-09 10:28:00 -05:00
Seth Vargo
35cfea8363 Add missing link to API docs (#5719) 2018-11-07 07:04:16 -08:00
Jeff Mitchell
e620786b1a
Add default-service/default-batch to token store roles (#5711) 2018-11-07 09:45:09 -05:00
Jeff Mitchell
1a31603dcf Better documentation around increment
Fixes #5701
2018-11-06 17:42:20 -05:00
Jeff Mitchell
8536856b77 Add a reminder about local auth methods and policies 2018-11-06 14:51:57 -05:00
Chris Griggs
70213c6647 moving VIP guide (#5693) 2018-11-05 19:50:55 -05:00
Mike Wickett
b3e78a8b33 website: Add analytics and swap CTA & docs section order (#5684)
* website: Add analytics tracking for components and outbound links

* website: Update component dependencies

* website: Swap cta and documentation sections
2018-11-05 17:29:09 -05:00
Yoko
5525ecdd6f Added a missing redirect link (#5634) 2018-11-05 14:07:48 -05:00
Nicolas Corrarello
53ad302a31 Adding support for Consul 1.4 ACL system (#5586)
* Adding support for Consul 1.4 ACL system

* Working tests

* Fixed logic gate

* Fixed logical gate that evaluate empty policy or empty list of policy names

* Ensure tests are run against appropiate Consul versions

* Running tests against official container with a 1.4.0-rc1 tag

* policies can never be nil (as even if it is empty will be an empty array)

* addressing feedback, refactoring tests

* removing cast

* converting old lease field to ttl, adding max ttl

* cleanup

* adding missing test

* testing wrong version

* adding support for local tokens

* addressing feedback
2018-11-02 10:44:12 -04:00
Jeff Mitchell
6c83e14501 Add batch token info to token store, approle, mount tuning 2018-11-01 14:51:06 -04:00
Raymond Kao
937e1be6f3 Fixed wording from "SQL" to "MongoDB" for clarity (#5643)
The original wording made it appear as if SQL statements were being executed against a MongoDB backend, which is incorrect and confusing.  Fixed to better reflect what is actually occurring.
2018-11-01 09:26:05 -04:00
Jeff Mitchell
cb58182900 Update jwt to pull in groups claim delimiter pattern 2018-10-31 16:04:39 -04:00
Brian Shumate
ea69d160d3 docs: update JWT auth method (#5655)
- Add convenience/contextual link to API documnetation
2018-10-31 11:03:04 -04:00
Jeff Mitchell
332be7a72e Fix website/path-help docs around pki/tidy 2018-10-30 21:33:30 -04:00
Jeff Mitchell
0b5d3bf8a0
Add the ability for secret IDs in agent approle to be wrapped (#5654) 2018-10-30 20:53:49 -04:00
Jeff Escalante
b11d015e62 fix sidebar links (#5653) 2018-10-30 20:51:38 -04:00
Jeff Mitchell
48385d53aa Make MFA links work again 2018-10-30 14:27:00 -04:00
Jeff Mitchell
e5ccac6a39
Add approle agent method removing secret ID file by default. (#5648)
Also, massively update tests.
2018-10-30 14:09:04 -04:00
RJ Spiker
e7eadd09ba website: community page content update (#5641) 2018-10-30 12:33:51 -04:00
Aleksey Zhukov
e9d855217b WIP Agent AppRole auto-auth (#5621) 2018-10-30 12:17:19 -04:00
Benjamin Dos Santos
c0b97de908 docs(systemd): Capabilities had been removed (#5579)
* docs(systemd): `Capabilities` had been removed

The `Capabilities=` unit file setting has been removed and is ignored for
backwards compatibility. `AmbientCapabilities=` and `CapabilityBoundingSet=`
should be used instead.

8f968c7321/NEWS (L1357)

* style: remove trailing white space
2018-10-30 10:18:08 -04:00
Balazs Nagy
bc9ace4296 Use tidy_revoked_certs instead of tidy_revocation_list (#5608) 2018-10-29 19:29:35 -04:00
RJ Spiker
1157625d70 website: update sidebar_title in front matter to use <code> (#5636)
* website: replace deprecated <tt> with <code> in front matter sidebar_title

* website: wrap front matter sidebar_title in <code> for commands pages
2018-10-29 15:58:37 -04:00
Christophe Tafani-Dereeper
74bf554666 Fix typo ('Gase' -> 'Case') (#5638) 2018-10-29 15:19:35 -04:00
Ben Boeckel
e89a55ec27 website: add missing @ to example (#5560)
* website: remove mention of `@` in command

The command does not contain the mentioned `@` symbol and can be
confusing.

* docs: use `policy-name` instead of `my-policy`

Just making things consistent.
2018-10-29 13:12:48 -04:00
Seth Vargo
68feb9d244 More formatting fixes (#5582) 2018-10-29 13:12:19 -04:00
Jeff Mitchell
9975ace215
Add token type to sentinel docs, fix up some names, and better codify what Sentinel reports for various token types (#5630) 2018-10-27 11:07:27 -07:00
Jeffrey Hogan
8d4caa0846 Use H3 for parameters to match existing pattern (#5566) 2018-10-26 19:13:14 -04:00
Chris Hoffman
9b942dcdd8
Fix seal migration docs (#5623)
* fixing seal migration docs

* do not use deprecated command

* adding redirect for old docs
2018-10-26 10:04:51 -07:00
Joel Thompson
92c7072bfe Update awskms seal docs (#5618)
The seal already supported an endpoint configuration, but it wasn't
documented, so adding the docs for it. Also adding a note on required
KMS permissions.
2018-10-26 06:18:04 -07:00
Chris Hoffman
219285850b
Updating seal docs (#5616)
* updating seal docs

* fixing api docs
2018-10-25 16:44:53 -07:00
Seth Vargo
c96d5fa4d1 Update docs and permissions (#5612) 2018-10-25 14:10:11 -07:00
Justin Shoffstall
98357621ae Clarify that Perf Standbys require Consul backend (#5539)
* Clarify that Perf Standbys require Consul backend

* Fixed for line length
2018-10-25 13:13:44 -07:00
Alan Tang
9b6c6a29ea fix duplicated word (#5599)
I think that is a duplicated word.
2018-10-24 18:15:24 -07:00
Mike Wickett
4db58ce10b website: fix redirects to learn 2018-10-24 13:46:56 -06:00
Mike Wickett
e9c2471aa3 website: add temporary callout to download v1.0 beta 2018-10-24 13:46:56 -06:00
Mike Wickett
15d1ffdb89 website: add redirects for intro/getting-started content to Learn 2018-10-24 13:46:43 -06:00
Mike Wickett
5618fdfc6b website: remove GA snippet - Segment handles this 2018-10-24 13:46:43 -06:00
Jeff Escalante
5fa9b1a8ef Website: small fix for the sidebar (#5595)
* sidebar attempted fix

* fix html errors

* a couple css updates
2018-10-24 12:21:37 -07:00
Andy Manoske
d6ceb70fef
Update partnerships.html.md 2018-10-23 14:56:55 -07:00
Andy Manoske
22044c9b7a
Update partnerships.html.md 2018-10-23 14:56:17 -07:00
Andy Manoske
ba4b6f4481
Update partnerships.html.md 2018-10-23 14:55:51 -07:00
Andy Manoske
f22776a94b
Fix broken links
fix links to old guides infrastructure
2018-10-23 14:22:18 -07:00
Andy Manoske
73778ca097
Update partnerships.html.md 2018-10-23 13:58:33 -07:00
Andy Manoske
9ed2813c0e
Update partnerships.html.md 2018-10-23 13:48:16 -07:00
Andy Manoske
95f66805ee
Partnerships docs updates
Updates to include partnerships within new site
2018-10-23 13:45:53 -07:00
Chris Hoffman
149fc9f0e1
Adding gcpkms docs (#5590)
* adding gcpkms docs

* adding detail links

* adding 1.0 Beta badge
2018-10-23 12:14:32 -07:00
Jeff Mitchell
ee49d7aa18 Merge branch 'master-oss' into 1.0-beta-oss 2018-10-23 04:02:28 -04:00
Thomas Kula
8a5e45e2e1 Document that periodic tokens do expire unless explicitly renewed (#5581) 2018-10-22 15:48:16 -04:00
Jeff Mitchell
17c438350f Merge branch 'master-oss' into 1.0-beta-oss 2018-10-22 12:32:44 -04:00
Seth Vargo
a1285b1a88 Fix website formatting (#5576) 2018-10-20 20:35:33 -04:00
andrejvanderzee
d22949a7e6 Added role-option max_sts_ttl to cap TTL for AWS STS credentials. (#5500)
* Added role-option max_sts_ttl to cap TTL for AWS STS credentials.

* Allow for setting max_sts_ttl to 0 after it has been set already.

* Fixed message in error response for default_sts_ttl > max_sts_ttl.
2018-10-20 10:36:47 -04:00
Matthew Irish
8c78bb54b2 Merge branch 'oss-master' into 1.0-beta-oss 2018-10-19 20:40:36 -05:00
Geoffrey Grosenbach
b3c1a0a9bc Redirect old install link to learn.hashicorp (#5567) 2018-10-19 16:24:04 -07:00
Jim Kalafut
7f35c053dd
Fix docs typo 2018-10-19 15:43:45 -07:00
Mitchell Hashimoto
2d18effc09
website: fix netlify redirects for 404s 2018-10-19 15:38:53 -07:00
Jeff Mitchell
48b057b6de Merge branch 'master-oss' into 1.0-beta-oss 2018-10-19 17:47:58 -04:00
Jeff Escalante
7e0b47df28 fix docs sidebar issue, update product subnav (#5564) 2018-10-19 14:34:23 -07:00
Mitchell Hashimoto
4498b88fc5
website: fix broken link in docs header 2018-10-19 14:10:18 -07:00
RJ Spiker
2651d0b568 fix product-subnav broken links (#5561) 2018-10-19 14:05:23 -07:00
Jeff Escalante
af17ad873c analytics correction to run through segment, clean up extra methods in config.rb (#5562) 2018-10-19 14:04:09 -07:00
Jim Kalafut
068da60712
Update Azure Secrets docs (#5554)
Add coverage of application_object_id parameter.
2018-10-19 13:48:15 -07:00
Jeff Escalante
a43e292424 New Docs Website (#5535)
* conversion stage 1

* correct image paths

* add sidebar title to frontmatter

* docs/concepts and docs/internals

* configuration docs and multi-level nav corrections

* commands docs, index file corrections, small item nav correction

* secrets converted

* auth

* add enterprise and agent docs

* add extra dividers

* secret section, wip

* correct sidebar nav title in front matter for apu section, start working on api items

* auth and backend, a couple directory structure fixes

* remove old docs

* intro side nav converted

* reset sidebar styles, add hashi-global-styles

* basic styling for nav sidebar

* folder collapse functionality

* patch up border length on last list item

* wip restructure for content component

* taking middleman hacking to the extreme, but its working

* small css fix

* add new mega nav

* fix a small mistake from the rebase

* fix a content resolution issue with middleman

* title a couple missing docs pages

* update deps, remove temporary markup

* community page

* footer to layout, community page css adjustments

* wip downloads page

* deps updated, downloads page ready

* fix community page

* homepage progress

* add components, adjust spacing

* docs and api landing pages

* a bunch of fixes, add docs and api landing pages

* update deps, add deploy scripts

* add readme note

* update deploy command

* overview page, index title

* Update doc fields

Note this still requires the link fields to be populated -- this is solely related to copy on the description fields

* Update api_basic_categories.yml

Updated API category descriptions. Like the document descriptions you'll still need to update the link headers to the proper target pages.

* Add bottom hero, adjust CSS, responsive friendly

* Add mega nav title

* homepage adjustments, asset boosts

* small fixes

* docs page styling fixes

* meganav title

* some category link corrections

* Update API categories page

updated to reflect the second level headings for api categories

* Update docs_detailed_categories.yml

Updated to represent the existing docs structure

* Update docs_detailed_categories.yml

* docs page data fix, extra operator page remove

* api data fix

* fix makefile

* update deps, add product subnav to docs and api landing pages

* Rearrange non-hands-on guides to _docs_

Since there is no place for these on learn.hashicorp, we'll put them
under _docs_.

* WIP Redirects for guides to docs

* content and component updates

* font weight hotfix, redirects

* fix guides and intro sidenavs

* fix some redirects

* small style tweaks

* Redirects to learn and internally to docs

* Remove redirect to `/vault`

* Remove `.html` from destination on redirects

* fix incorrect index redirect

* final touchups

* address feedback from michell for makefile and product downloads
2018-10-19 08:40:11 -07:00
Jeff Mitchell
db2bdbbebd Merge branch 'master-oss' into 1.0-beta-oss 2018-10-19 09:25:17 -04:00
Jeff Mitchell
51bb46302a Update some grammar 2018-10-18 13:32:42 -04:00
Pouyan Azari
46f1a3e2f0 Added link to list of all extensions for the ssh. (#5542)
Added a link to the OpenSSH extension list, this is not documented anywhere in vault documentation website.
2018-10-18 08:51:07 -07:00
Jeff Mitchell
869270b466 Merge branch 'master-oss' into 1.0-beta-oss 2018-10-18 10:28:14 -04:00
Vishal Nayak
10dc74384e
Transit: Key Trim (#5388)
* Support key trimming

* Add doc

* Move trimming to its own endpoint

* Remove trimmed_min_version field from config endpoint

* Fix description

* Doc updates

* Fix response json in docs

* Address review feedback

* s/min_version/min_available_version

* Commenting and error statement updates
2018-10-17 09:05:05 -07:00
Brian Shumate
482b303b40 Docs: Basics: Tokens: Note (#5479)
- Add note about token values
2018-10-17 10:40:55 -04:00
Martin
725b295389 add mentions of authorization header support in doc (#5478) 2018-10-17 10:38:15 -04:00
Kevin Buchs
3cf5b6350b Update dynamodb.html.md (#5519) 2018-10-17 10:36:52 -04:00
Gabriel Martinez
14bcd13cef Update dynamic-secrets.html.md (#5530)
1. Using the current tutorial will return a warning after creating the role "my-role:
```bash
WARNING! The following warnings were returned from Vault:

  * Detected use of legacy role or policy parameter. Please upgrade to use the
  new parameters.
```

To fix this we need to update the command and the query. Correct entries can be found in documentation for the [AWS Engine](https://www.vaultproject.io/docs/secrets/aws/index.html).

2. `vault revoke` to `vault lease revoke`. The command bellow is updated, but the text above it was not.
2018-10-17 10:35:15 -04:00
Jeff Mitchell
231c325770 Merge branch 'master-oss' into 1.0-beta-oss 2018-10-16 10:08:03 -04:00
Laura Gjerman-Uva
6647b3557d Update Replication Guide to clarify how to get a token on a newly activated Secondary replica, including need to use unseal/recovery keys from Primary if doing generate-root. (#5492) 2018-10-15 21:54:23 -07:00
Jeff Mitchell
a58d313d2b
Batch tokens (#755) 2018-10-15 12:56:24 -04:00
Munif Tanjim
574a08c064 Update database API doc's parameter description (#5512) 2018-10-15 06:47:43 -07:00
Yoko
25eb8a8ce1
[Guide] Fixed issue 5497 (#5508)
* Fixied issue 5497

* Cleaned up the policy
2018-10-12 16:26:03 -07:00
Jeff Mitchell
f1f9ed485b Update website docs to reflect fix in #5495 2018-10-10 11:56:50 -04:00
Jeff Mitchell
320d1b7c07 Update website docs around root token generation 2018-10-10 11:51:05 -04:00
Yoko
2b713c751e
Updating the diagrams (#5488) 2018-10-09 14:51:27 -07:00
Jeff Mitchell
1289583d72 Add note about accepting 200 or 204 2018-10-09 16:54:18 -04:00