193 Commits

Author SHA1 Message Date
Jenny Deng
1b037c99cc
[VAULT-35162] Development Cluster setting docs (#30659)
* add docs

* change wording

* add changelog

* Update changelog/30659.txt

Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>

* Apply suggestions from code review

Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>

---------

Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
2025-05-19 12:26:27 -07:00
JMGoldsmith
c4457366b3
Revert "PostgreSQL backend passwordless authentication in cloud (#30564)" (#30668)
This reverts commit 2dd0a1626e1d98c5b9dd48a697cc94188204d81e.
2025-05-19 16:57:51 +00:00
Tauhid Anjum
2dd0a1626e
PostgreSQL backend passwordless authentication in cloud (#30564)
* PostgreSQL backend passwordless authentication in cloud

* adding changelog

* Updating deprecated docker test types

* adding unit tests for getAuthConfig

* removing cloud auth based tests due to failure in CI. Unit test should focus on the default flow.

* Adding function name for lint
2025-05-13 15:52:02 +02:00
Luis (LT) Carbonell
ed52371b10
Upgrade FIPS 1402 -> 1403 (#30576)
* Upgrade FIPS 1402 -> 1403

* Clean up

* changelog
2025-05-12 15:01:30 -05:00
Sarah Chavis
485ccbc5da
[DOCS] IA refresh (phase 2) (#30287) 2025-04-29 17:08:14 -07:00
Guy J Grigsby
08c5a52b02
disable_mlock must now be explicitly included in config (#29974)
* require explicit value for disable_mlock

* set disable_mlock back to true for all docker tests

* fix build error

* update test config files

* change explicit mlock check to apply to integrated storage only.

* formatting and typo fixes

* added test for raft

* remove erroneous test

* remove unecessary doc line

* remove unecessary var

* pr suggestions

* test compile fix

* add mlock config value to enos tests

* enos lint

* update enos tests to pass disable_mlock value

* move mlock error to runtime to check for env var

* fixed mlock config detection logic

* call out mlock on/off tradeoffs to docs

* rewording production hardening section on mlock for clarity

* update error message when missing disable_mlock value to help customers with the previous default

* fix config doc error and update production-hardening doc to align with existing recommendations.

* remove extra check for mlock config value

* fix docker recovery test

* Update changelog/29974.txt

Explicitly call out that Vault will not start without disable_mlock included in the config.

Co-authored-by: Kuba Wieczorek <kuba.wieczorek@hashicorp.com>

* more docker test experimentation.

* passing disable_mlock into test cluster

* add VAULT_DISABLE_MLOCK envvar to docker tests and pass through the value

* add missing envvar for docker env test

* upate additional docker test disable_mlock values

* Apply suggestions from code review

Use active voice.

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

---------

Co-authored-by: Kuba Wieczorek <kuba.wieczorek@hashicorp.com>
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2025-04-17 15:35:40 +02:00
Miles
9231f5dac2
Support reading mysql backend credentials from environment variables (#30136)
Signed-off-by: Miles <miles.wilson@wolterskluwer.com>
Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
2025-04-02 12:46:46 -04:00
Theron Voran
84f2021ae6
Docs update for vault-helm v0.30.0 (#30101)
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2025-03-31 13:33:49 -07:00
Scott Miller
73a98ddd48
Update go-kms-wrapping wrapper dependencies, adding ParsePaths support for sensitive values. (#29402)
* Update go-kms-wrapping wrapper dependencies, adding ParsePaths support for sensitive values

* changelog

* document indirect value references, e.g ParsePath
2025-02-03 18:23:52 +00:00
Michael Diggin
5b4b606c0d
[Storage/DynamoDB] Let vault modify dynamodb tables (#29371)
* [Storage/DynamoDB] Let vault modify dynamodb tables

* add changelog

---------

Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
2025-01-21 14:27:54 -05:00
Sarah Chavis
8f6e95f1a3
[DOCS] SEO updates for config docs (#29242)
* seo updates for config docs

* fix content errors

* Make KMS title consistent with other stanza titles
2024-12-19 19:21:33 -05:00
Bruno Oliveira de Souza
a2c467cc22
VAULT-31409: trace postUnseal function (#28895)
* initial implementation of unseal trace

* close file if we fail to start the trace

didn't bother to check the error from traceFile.Close()

* use reloadable config instead of env var

* license

* remove leftover

* allow setting custom dir and remove new package

* bring back StartDebugTrace

after talking to Kuba it sounds like it's a good idea to try to move stuff out of core, so even if there's no immediate need for a generic debug trace function it's still fair to add it

* track postUnseal instead of unsealInternal

also some usability improvements from manual testing

* address PR comments

* address security review

there were concerns about using the /tmp directory because of permissions, or having a default dir at all, so now it's required to set a dir in order to generate the traces.

* add unit tests to StartDebugTrace

* move back to default dir

* document new parameters

* add tiny integration test

* avoid column in trace filename

sounds like it might be forbidden in Windows and possibly cause problems in some MacOS applications.

* address PR feedback

* add go doc to test

CI was complaining about missing comments on the new test function. It feels a bit silly to require this of tests but whatever XD

* fix tests
2024-11-26 15:04:34 -03:00
Theron Voran
515badb8bd
docs/vault-helm: updates for v0.29.1 release (#28975) 2024-11-26 09:48:11 -08:00
Steven Clark
1196b8eda8
Add notes within the documentation about the generate_key flag (#28898) 2024-11-13 11:35:29 -05:00
Violet Hynes
aa09d0cec5
Product usage reporting docs (#28858)
* First draft of product usage reporting docs

* Table data, fix issues

* Changelog
2024-11-12 09:15:52 -05:00
Theron Voran
3f6cf98055
Docs update for vault-helm v0.29.0 and vault-k8s v1.5.0 releases (#28851) 2024-11-08 23:50:45 +00:00
ram-parameswaran
6f653692ea
Update seal-ha.mdx (#28863)
Fix typo and text formatting
2024-11-08 09:24:00 -05:00
Yoko Hyakuna
69b1a615fb
[Docs] Add recommended patterns (#28843)
* Content conversion from tutorial to doc - seal

* Add AppRole best practices

* Clean up the reference list

* Updated the title

* match the titles

* Add namespaces best practices

* Update the table style
2024-11-07 13:17:43 -08:00
Altabay-HashiCorp
76f22fac24
fix url typo in removing seal ha (#28818) 2024-10-31 09:49:26 -04:00
Sarah Chavis
d3ef02b778
VAULT-29153: Update docs with IPv6 compliance info (#28707)
* update matrix doc and add IPv6 info

---------

Co-authored-by: Ryan Cragun <me@ryan.ec>
2024-10-15 16:34:16 -07:00
davidadeleon
ef967a0d8c
update AOP docs (#28686)
Co-authored-by: davidadeleon <ddeleon@hashicorp.com>
2024-10-11 09:29:07 -04:00
Yoko Hyakuna
af8c9571b1
[Docs] Add a missing parameter (#28630)
* Add a missing parameter

* Update website/content/docs/configuration/replication.mdx

Co-authored-by: Nick Cabatoff <ncabatoff@hashicorp.com>

* Fix the cross referencing link

---------

Co-authored-by: Nick Cabatoff <ncabatoff@hashicorp.com>
2024-10-08 13:49:09 -07:00
Mike Palmiotto
6a145af82a
CE: Remove RequestLimiter config plumbing (#28592)
This PR provides some plumbing for the enterprise counterpart PR:
hashicorp/vault-enterprise#6791
2024-10-04 13:48:16 -04:00
Scott Miller
641e12d3bf
Document seal_name parameter to entropy (#28123)
* Document seal_name parameter to entropy

* dashes

* active voice

* Update website/content/docs/configuration/entropy-augmentation.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

---------

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2024-08-22 20:15:15 +00:00
Jonathan Frappier
c99e4f1a3f
Add valid IP callout (#28112)
Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
2024-08-16 19:54:28 -04:00
Yoko Hyakuna
34a1796d03
[Docs] Create 'Troubleshoot' section (#28028)
* Create 'Troubleshoot' section

* Remove extra spaces

* Update redirects.js

* Remove extra comma

* Change the title

* Update website/content/docs/troubleshoot/generate-root-token.mdx

Co-authored-by: Brian Shumate <brianshumate@users.noreply.github.com>

* Update website/content/docs/troubleshoot/generate-root-token.mdx

Co-authored-by: Brian Shumate <brianshumate@users.noreply.github.com>

* Update website/content/docs/troubleshoot/generate-root-token.mdx

Co-authored-by: Brian Shumate <brianshumate@users.noreply.github.com>

* Update website/content/docs/troubleshoot/generate-root-token.mdx

Co-authored-by: Brian Shumate <brianshumate@users.noreply.github.com>

* Update website/content/docs/troubleshoot/generate-root-token.mdx

Co-authored-by: Brian Shumate <brianshumate@users.noreply.github.com>

* Update website/content/docs/troubleshoot/generate-root-token.mdx

Co-authored-by: Brian Shumate <brianshumate@users.noreply.github.com>

* Update website/content/docs/troubleshoot/generate-root-token.mdx

Co-authored-by: Brian Shumate <brianshumate@users.noreply.github.com>

* Update website/content/docs/troubleshoot/generate-root-token.mdx

Co-authored-by: Brian Shumate <brianshumate@users.noreply.github.com>

* Update website/content/docs/troubleshoot/generate-root-token.mdx

Co-authored-by: Brian Shumate <brianshumate@users.noreply.github.com>

* Update website/content/docs/troubleshoot/generate-root-token.mdx

Co-authored-by: Brian Shumate <brianshumate@users.noreply.github.com>

* edit suggestions (#28047)

* Fix the relative path - add missing '/'

* Fix a typo

---------

Co-authored-by: Brian Shumate <brianshumate@users.noreply.github.com>
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2024-08-09 14:21:41 -07:00
Adrian Todorov
cac0af4dbb
Update programmatic-management.mdx to clarify Terraform prereqs (#27548) 2024-08-06 16:39:27 -07:00
Theron Voran
6d4cb5e49a
Docs update for vault helm v0.28.1 release (#27766) 2024-07-19 17:12:07 -07:00
Altabay-HashiCorp
5856ae4ef7
Add administrative_namespace_path as an available parameter in Vault config (#27744) 2024-07-10 08:58:16 -07:00
ram-parameswaran
bcc8e9ca1f
Update tcp-tls.mdx (#27560)
Fix typo. Replace SIGHIP with SIGHUP
2024-07-05 09:21:16 -04:00
miagilepner
69e919fe11
Docs: clarify cluster name usage (#27587)
* clarify cluster name usage

* add update line
2024-06-26 13:41:14 +02:00
Peter Wilson
ad1b5dfcd6
Docs: fix listener 'proxy_protocol_behavior' support version 1 and 2 (#27594)
* fix listener 'proxy_protocol_behavior' docs to mention support for v1 and v2

* Update website/content/docs/configuration/listener/tcp/index.mdx

Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>

---------

Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
2024-06-25 16:36:29 +00:00
Scott Miller
e315ef31ec
Remove the Beta flag from Seal HA (#27437) 2024-06-11 16:36:58 +01:00
Scott Miller
de84d373c1
Document environment variable usage in Seal HA (#27421)
* Document how environment variables work with seal names

* wording
2024-06-10 11:37:59 -05:00
Jonathan Frappier
ef10c1a2a4
Add TCP TLS guide (#27318)
* Add TCP TLS guide

* Fix example listener stanza missing }

* Update website/content/docs/configuration/listener/tcp-tls.mdx

Co-authored-by: Jamie Finnigan <jfinnigan@hashicorp.com>

* Update website/content/docs/configuration/listener/tcp-tls.mdx

Co-authored-by: Jamie Finnigan <jfinnigan@hashicorp.com>

* Update website/content/docs/configuration/listener/tcp-tls.mdx

Co-authored-by: Jamie Finnigan <jfinnigan@hashicorp.com>

* Update website/content/docs/configuration/listener/tcp-tls.mdx

Co-authored-by: Jamie Finnigan <jfinnigan@hashicorp.com>

* Update website/content/docs/configuration/listener/tcp-tls.mdx

Co-authored-by: Jamie Finnigan <jfinnigan@hashicorp.com>

* Update website/content/docs/configuration/listener/tcp-tls.mdx

Co-authored-by: Jamie Finnigan <jfinnigan@hashicorp.com>

* Suggestions for TCP-TLS docs (#27335)

* recreating edits

* Fix nav entry

---------

Co-authored-by: Jamie Finnigan <jfinnigan@hashicorp.com>
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2024-06-05 09:48:10 -04:00
Violet Hynes
1d87ed8aaf
Add docs and changelog for PR 9733 (#27313) 2024-06-03 14:09:57 -04:00
Lucy Davinhart || Strawb System
b5e58a73b0
Update raft.mdx (#27275) 2024-05-30 10:33:56 -04:00
Roberto Hidalgo
6e72397a86
Allow setting of Consul ServiceMeta tags from config file (#11084)
* Allow setting of Consul ServiceMeta tags from config file

probably a bad idea, let's see how it works
scaffold tests

* kick circleci

* Add links to consul docs

Co-authored-by: Violet Hynes <a.xenasis@gmail.com>

* add changelog note

* use relative developer docs links

* address feedback

* please linter

---------

Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
2024-05-27 16:28:10 -04:00
Sarah Chavis
53ec4d5f7b
[DOCS] Manage resources with TF (#27171)
---------

Co-authored-by: CJ <105300705+cjobermaier@users.noreply.github.com>
Co-authored-by: Brian Shumate <brianshumate@users.noreply.github.com>
2024-05-24 09:55:27 -07:00
CJ
5787c17b97
Docs/waf vault tf (#26515)
---------

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
Co-authored-by: Chris Stella <chris.stella.84@gmail.com>
2024-05-13 08:21:06 -07:00
Meggie
a5c9364c68
Added some notes about TLS and browser Secure Contexts (#26946)
* Added some notes about TLS and browser Secure Contexts

* Fixed an unrelated indent and color for note

* Bolding word to add visual distinction
2024-05-10 16:01:54 -04:00
Paul Banks
0a06215d1a
Documentation for Adaptive Overload Protection (#26690)
* Document enabling config

* Fix nav data JSON after disabling over-zealous prettifier

* Address review feedback

* Add warning about reloading config during overload

* Bad metrics links

* Another bad link

* Add upgrade note about deprecation

---------

Co-authored-by: Mike Palmiotto <mike.palmiotto@hashicorp.com>
2024-05-10 17:55:57 +01:00
benz0
758c967369
Update tcp.mdx (#26816)
per customer request in support ticket #141025 I've updated the description of tls_disable_client_certs to provide clarification.

previous pr for this change was approved but needed to be resubmitted because of problems with my GH account.  See #26601
2024-05-06 11:03:13 -04:00
prabhat-hashi
c88967abb5
Docs- Update info on key rotation (#23274)
* Docs- Update info on key rotation

Added a sentence about needing to seal-rewrap if you want to disable or delete old key.

* rectified the url for seal-rewrap

rectified the url for seal-rewrap

* fixed some grammar

* Update website/content/docs/configuration/seal/pkcs11.mdx

---------

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2024-05-01 15:42:54 -07:00
Yoko Hyakuna
2becdceab0
Replace 'HCP Vault' with 'HCP Vault Dedicated' (#26457)
* Replace 'HCP Vault' with 'HCP Vault Dedicated'

* Replace 'HCP Vault' with 'HCP Vault Dedicated' where applicable

* Replace 'Terraform Cloud' with 'HCP Terraform'

* Minor format fixes

* Update the side-nav title to 'HCP Terraform'

* Undo changes to Terraform Cloud secrets engine
2024-04-22 08:44:13 -04:00
Theron Voran
e4f9d024c8
docs/vault-helm: updates for v0.28.0 release (#26282) 2024-04-12 13:37:56 -07:00
Paul Banks
9c12a6acc7
Docs/mount namespace entry size (#26119)
* Update documentation for namespace/mount entry size limit

* Clarify defaults

* Better wording for storage size partial that appears on different pages

* Active voice!

* No this

* Fix confusing terminology
2024-04-08 12:43:07 +01:00
Jason N
e9cb557ef1
Add support for forwarded Tls-Client-Cert (#17272)
* Add support for x_forwarded_for_client_cert_header

* add changelog entry

* add tests for a badly and properly formatted certs

* both conditions should be true

* handle case where r.TLS is nil

* prepend client_certs to PeerCertificates list

* Add support for x_forwarded_for_client_cert_header

* add changelog entry

* add tests for a badly and properly formatted certs

* both conditions should be true

* handle case where r.TLS is nil

* prepend client_certs to PeerCertificates list

* add option for decoders to handle different proxies

* Add support for x_forwarded_for_client_cert_header

* add changelog entry

* add tests for a badly and properly formatted certs

* both conditions should be true

* handle case where r.TLS is nil

* prepend client_certs to PeerCertificates list

* add option for decoders to handle different proxies

* fix tests

* fix typo

---------

Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
Co-authored-by: Scott Miller <smiller@hashicorp.com>
Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
2024-04-05 11:22:46 -05:00
Sarah Chavis
038aaa3ff7
1.16 release notes and beta cleanup (#26247)
Co-authored-by: Tom Proctor <tomhjp@users.noreply.github.com>
2024-04-03 22:18:40 +01:00
Scott Miller
f319d98665
Re-add beta designation (#26190)
* Re-add beta designation

* nl

* mark the migration section beta too

* beta
2024-03-27 15:16:27 -04:00