769 Commits

Author SHA1 Message Date
kpcraig
d8482b008a
VAULT-32804: Add STS Fallback parameters to secrets-aws engine (#29051)
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

---------

Co-authored-by: Robert <17119716+robmonte@users.noreply.github.com>
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2024-12-05 16:22:21 -05:00
kpcraig
d515cd33b0
VAULT-32598: add docs for azure autosnapshot auth modes (#29073) 2024-12-05 16:21:30 -05:00
Steven Clark
9bf3d115fc
Add an option to allow cert-auth to return metadata about client cert that fails login (#29044)
* Add an option to allow cert-auth to return metadata about client certs that fail login

* Add cl

* Update SPDX header for sdk/logical/response_test.go
2024-11-29 10:22:09 -05:00
Steven Clark
93ca099e3c
Update docs adding use_pss to PKI root generation api (#29023)
- We missed adding this flag to the root CA generation call, but
   we do support it.
2024-11-28 14:30:17 -05:00
miagilepner
4b98fd9b1a
VAULT-31751, VAULT-31752: removed_from_cluster in vault status (#28938)
* add removed from cluster to status output

* test for command

* update docs

* changelog
2024-11-19 11:13:10 +01:00
Steven Clark
95a16dbafe
PKI: Add a new leaf_not_after_behavior value to force erroring in all circumstances (#28907)
* PKI: Add a new leaf_not_after_behavior value to force erroring in all circumstances

 - We introduce a new value called `always_enforce_err` for the existing
   leaf_not_after_behavior on a PKI issuer. The new value will force we
   error out all requests that have a TTL beyond the issuer's NotAfter value.

 - This will apply to leaf certificates issued through the API as did err,
   but now to CA issuance and ACME requests for which we previously changed
   the err configuration to truncate.

* Add cl

* Update UI test

* Fix changelog type
2024-11-15 11:59:54 -05:00
Steven Clark
1196b8eda8
Add notes within the documentation about the generate_key flag (#28898) 2024-11-13 11:35:29 -05:00
Steven Clark
2e4a30f914
Fail sign/verify apis when Ed25519ph/ctx arguments are provided on CE (#28838) 2024-11-06 12:23:14 -05:00
miagilepner
10bd15f956
VAULT-30877: Repopulate AWS static creds queue in initialize (#28775)
* populate rotation queue in initialize

* docs, changelog

* add t.Helper()
2024-11-04 09:32:14 -06:00
Steven Clark
e489631e87
Transit: Allow ENT only arguments for sign/verify. Add docs for new Ed25519 signature types (#28821) 2024-11-01 12:57:52 -04:00
Lucy Davinhart || Strawb System
dec3bcc1aa
docs: sys/internal/counters/activity, explain deprecation for current_billing_period (#28773)
per discussion
https://hashicorp.slack.com/archives/CPEPB6WRL/p1729786785076429
the reason this parameter is deprecated is because it's no longer required. make that clear in the docs.
2024-10-25 14:31:06 +02:00
Yoko Hyakuna
a3eef86f47
Format fixes & tweaks (#28731) 2024-10-21 08:35:37 -07:00
Kit Haines
c0b2a6d370
Add enrollment protocol sublinks. (#28737) 2024-10-21 09:18:17 -04:00
Scott Miller
004dfc49f8
Add a max_crl_size parameter to CRL config (#28654)
* wip

* Unit test the CRL limit, wire up config

* Bigger error

* API docs

* wording

* max_crl_entries, + ignore 0 or < -1 values to the config endpoint

* changelog

* rename field in docs

* Update website/content/api-docs/secret/pki/index.mdx

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>

* Update website/content/api-docs/secret/pki/index.mdx

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>

---------

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2024-10-09 21:38:55 +00:00
Scott Miller
38df9cf488
Tweak the ocsp_ca_certificate param docs to be more clear about what kind of cert it wants (#28659) 2024-10-09 16:16:26 -04:00
Robert
60d7051700
Add docs and api-docs info for gcp replication locations sync, github environments, github organizations beta, and add sys/activation-flags page (#28463)
* Add field to API docs, add small section to overview

* Update examples, wording

* Update github API docs

* Apply suggestions from code review

Co-authored-by: John-Michael Faircloth <fairclothjm@users.noreply.github.com>

* Update wording

* Be a little more specific on repository owner

* Put BETA tag on each org field, put visibility explanation in paragraph

* Add org secrets limitation

* Add sys/activation-flags page

* Update Vercel granularity note

* Apply suggestions from code review

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/docs/sync/vercelproject.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Apply suggestions from code review

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Small rewording, remove optional tags with defaults

---------

Co-authored-by: John-Michael Faircloth <fairclothjm@users.noreply.github.com>
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2024-10-09 10:27:33 -05:00
Scott Miller
3c0656e4c4
Update marcellanz/transit_pkcs1v15 RSA encryption support (#25486)
* [transit-pkcs1v15] transit support for the pkcs1v15 padding scheme – without UI tests (yet).

* [transit-pkcs1v15] renamed padding_scheme parameter in transit documentation.

* [transit-pkcs1v15] add changelog file.

* [transit-pkcs1v15] remove the algorithm path as padding_scheme is chosen by parameter.

* Update ui/app/templates/components/transit-key-action/datakey.hbs

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>

* Update ui/app/templates/components/transit-key-action/datakey.hbs

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>

* Update ui/app/templates/components/transit-key-action/datakey.hbs

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>

* Update website/content/api-docs/secret/transit.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/api-docs/secret/transit.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/api-docs/secret/transit.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Add warnings to PKCS1v1.5 usage

* Update transit

* Update transit, including separating encrypt/decrypt paddings for rewrap

* Clean up factory use in the presence of padding

* address review feedback

* remove defaults

* lint

* more lint

* Some fixes for UI issues

 - Fix padding scheme dropdown console error by adding values
   to the transit-key-actions.hbs
 - Populate both padding scheme drop down menus within rewrap,
   not just the one padding_scheme
 - Do not submit a padding_scheme value through POST for non-rsa keys

* Fix Transit rewrap API to use decrypt_padding_scheme, encrypt_padding_scheme

 - Map the appropriate API fields for the RSA padding scheme to the
   batch items within the rewrap API
 - Add the ability to create RSA keys within the encrypt API endpoint
 - Add test case for rewrap api that leverages the padding_scheme fields

* Fix code linting issues

* simply padding scheme enum

* Apply suggestions from code review

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>

* Fix padding_scheme processing on data key api

 - The data key api was using the incorrect parameter name for
   the padding scheme
 - Enforce that padding_scheme is only used on RSA keys, we
   are punting on supporting it for managed keys at the moment.

* Add tests for parsePaddingSchemeArg

* Add missing copywrite headers

* Some small UI fixes

* Add missing param to datakey in api-docs

* Do not send padding_scheme for non-RSA key types within UI

* add UI tests for transit key actions form

---------

Co-authored-by: Marcel Lanz <marcellanz@n-1.ch>
Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
Co-authored-by: Steve Clark <steven.clark@hashicorp.com>
Co-authored-by: claire bontempo <cbontempo@hashicorp.com>
2024-10-09 09:30:14 -05:00
vinay-gopalan
08e8776dfb
Add documentation for new rootless password rotation workflow for DB Static Roles (#28374)
Co-authored-by: John-Michael Faircloth <fairclothjm@users.noreply.github.com>
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2024-10-07 15:51:30 +00:00
Steven Clark
baf794b621
Remove duplicated allow_empty_principals parameter in role api docs (#28580) 2024-10-03 09:54:22 -04:00
Chris Capurso
759751a27b
add aws and k8s auth examples to export (#28481)
* add aws and k8s auth examples to export

* add clarification to alias name source

* fix links
2024-10-01 09:44:00 -04:00
Steven Clark
70d5c5e582
Update ssh docs to add missing conditional for valid_principals (#28530) 2024-09-27 17:13:20 -04:00
Steven Clark
2db2a9fb5d
PKI: Track last time auto tidy was run across restarts (#28488)
* Track the last PKI auto-tidy time ran for use across nodes

 - If the interval time for auto-tidy is longer then say a regularly
   scheduled restart of Vault, auto-tidy is never run. This is due to
   the time of the last run of tidy is only kept in memory and
   initialized on startup to the current time
 - Store the last run of any tidy, to maintain previous behavior, to
   a cluster local file, which is read in/initialized upon a mount
   initialization.

* Add auto-tidy configuration fields for backing off at startup

* Add new auto-tidy fields to UI

* Update api docs for auto-tidy

* Add cl

* Update field description text

* Apply Claire's suggestions from code review

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>

* Implementing PR feedback from the UI team

* remove explicit defaults and types so we retrieve from backend, decouple enabling auto tidy from duration, move params to auto settings section

---------

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>
Co-authored-by: claire bontempo <cbontempo@hashicorp.com>
2024-09-26 09:47:11 -04:00
Raja Nadar
7cf6cbd330
Update libraries.mdx section for VaultSharp (#28426)
* Update libraries.mdx section for VaultSharp

Added more info on VaultSharp for latest .NET version support and comprehensiveness of auth and secret backends supported

* Update website/content/api-docs/libraries.mdx

Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>

---------

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
2024-09-24 09:20:08 -07:00
Scott Miller
12f03b073a
Make reception of an empty valid principals configurable based on a role flag. (#28466)
* Make reception of an empty valid principals configurable based on a role flag.

Adds allow_empty_principals, which if true allows valid_principals on credential generation calls
to be empty.

* changelog

* Allow empty principals on unrelated unit test

* whitespace
2024-09-23 17:20:11 -05:00
Owen Zhang
e848f1683d
Update namespaces.mdx (#28314)
Add "@include 'alerts/enterprise-only.mdx'" since namespace is an enterprise feature

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2024-09-19 18:28:58 -07:00
gerardma77
17664bcfbe
Adding AD lifetime period of an old password note to Vault LDAP secrets Engine API Documentation (#28429)
* adding_OldPasswordAllowedPeriod_waring

* Updated note for AD password

* Update website/content/api-docs/secret/ldap.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

---------

Co-authored-by: Equus quagga <jan.prinsloo@hashicorp.com>
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2024-09-19 12:08:32 -07:00
miagilepner
d00715d129
VAULT-28478: Updates to autopilot docs (#28331)
* restructure

* update command

* fixes

* fix command flags

* revert makefile change

* remove tick log
2024-09-17 10:53:18 +02:00
Rachel Culpepper
978b3aee52
add ce changes and documentation for tidying cmpv2 nonce store (#28362)
* add ce changes and documentation for tidying cmpv2 nonce store

* add build tag

* fix test failures

* fix backend test
2024-09-12 11:32:51 -05:00
Steven Clark
10df48b3e1
Remove beta tags from CMPv2 docs (#28339) 2024-09-10 16:18:38 -04:00
John-Michael Faircloth
f7701e1d8c
docs: add postgres TLS docs (#28302)
* docs: add postgres TLS docs

* fix link formatting
2024-09-09 12:34:16 -05:00
Robert
3bda80649f
Add docs for github sync environment secrets (#28175)
---------

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2024-09-05 16:11:01 -05:00
Scott Miller
047ec756c0
Document CMPv2 (#27915)
* CMPv2 Documentation, and restructuring of Issuance Protocols into its own section for PKI.

* title

* CMPv2 API

* Add default path policy

* Update website/content/docs/secrets/pki/cmpv2.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/docs/secrets/pki/cmpv2.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/docs/secrets/pki/cmpv2.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/docs/secrets/pki/cmpv2.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* respond to some PR feedback

* pr feedback

* Fix nav and add key_usage

* Update website/content/docs/secrets/pki/cmpv2.mdx

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>

* Update website/content/docs/secrets/pki/cmpv2.mdx

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>

* Update website/content/api-docs/secret/pki/issuance.mdx

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>

* Docs fixes

---------

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2024-09-04 17:24:50 -05:00
Chris Capurso
5b79c078c3
Activity Export API doc updates (#28172)
* remove export from restricted endpoints

* enhance activity export JSON examples

* fix nulls

* add missing local_entity_alias fields

* add JSON and CSV response examples

* Simplify namespace filtering concept

Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>

---------

Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
2024-08-30 14:43:17 -04:00
Kit Haines
edf6851eb4
Key Usage Enablement for Ent-Feature CMPv2 (#28237)
* Key Usage Enablement for Ent-Feature CMPv2
2024-08-30 17:05:20 +00:00
kevin-loehfelm
e4309e2a1a
correct typo (#28077) 2024-08-15 09:26:51 -07:00
divyaac
36998a5ed6
CE: Added deleted namespace string (#28080)
* Applied oss patch and added docs

* Edited docs issues
2024-08-14 20:59:44 +00:00
Yoko Hyakuna
34a1796d03
[Docs] Create 'Troubleshoot' section (#28028)
* Create 'Troubleshoot' section

* Remove extra spaces

* Update redirects.js

* Remove extra comma

* Change the title

* Update website/content/docs/troubleshoot/generate-root-token.mdx

Co-authored-by: Brian Shumate <brianshumate@users.noreply.github.com>

* Update website/content/docs/troubleshoot/generate-root-token.mdx

Co-authored-by: Brian Shumate <brianshumate@users.noreply.github.com>

* Update website/content/docs/troubleshoot/generate-root-token.mdx

Co-authored-by: Brian Shumate <brianshumate@users.noreply.github.com>

* Update website/content/docs/troubleshoot/generate-root-token.mdx

Co-authored-by: Brian Shumate <brianshumate@users.noreply.github.com>

* Update website/content/docs/troubleshoot/generate-root-token.mdx

Co-authored-by: Brian Shumate <brianshumate@users.noreply.github.com>

* Update website/content/docs/troubleshoot/generate-root-token.mdx

Co-authored-by: Brian Shumate <brianshumate@users.noreply.github.com>

* Update website/content/docs/troubleshoot/generate-root-token.mdx

Co-authored-by: Brian Shumate <brianshumate@users.noreply.github.com>

* Update website/content/docs/troubleshoot/generate-root-token.mdx

Co-authored-by: Brian Shumate <brianshumate@users.noreply.github.com>

* Update website/content/docs/troubleshoot/generate-root-token.mdx

Co-authored-by: Brian Shumate <brianshumate@users.noreply.github.com>

* Update website/content/docs/troubleshoot/generate-root-token.mdx

Co-authored-by: Brian Shumate <brianshumate@users.noreply.github.com>

* edit suggestions (#28047)

* Fix the relative path - add missing '/'

* Fix a typo

---------

Co-authored-by: Brian Shumate <brianshumate@users.noreply.github.com>
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2024-08-09 14:21:41 -07:00
Meggie
fd1e53d256
Edit alias_name_source explanation (#27382)
* Edit alias_name_source explanation

We wanted to clarify the difference between the two options and the implications.

* Add missing backticks

* Add comma

* Update website/content/api-docs/auth/kubernetes.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

---------

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2024-08-07 16:07:36 -07:00
divyaac
8a5ae2bf37
Client Count Docs Updates/Cleanup (#27862)
* Docs changes

* More condensation of docs

* Added some clarity on date ranges

* Edited wording'

* Added estimation client count info

* Update website/content/api-docs/system/internal-counters.mdx

Co-authored-by: miagilepner <mia.epner@hashicorp.com>

---------

Co-authored-by: miagilepner <mia.epner@hashicorp.com>
2024-08-06 15:59:37 -07:00
akshya96
e1d3c322e7
Auto-rolling billing start docs PR (#27926)
* auto-roll docs changes

* addressing comments

* address comments

* Update website/content/api-docs/system/internal-counters.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* addressing some changes

* update docs

* update docs with common explanation file

* updated note info

* fix 1.18 upgrade doc

* fix content-check error

* Update website/content/partials/auto-roll-billing-start-example.mdx

Co-authored-by: miagilepner <mia.epner@hashicorp.com>

---------

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
Co-authored-by: miagilepner <mia.epner@hashicorp.com>
2024-08-06 16:09:00 +00:00
Meggie
1f7e589850
Add link from api-docs to namespace docs (#27502)
I wanted to make the list of API endpoints with restricted namespace access easier to find.

I considered adding the partial directly here, but thought the explanation in the link would have been helpful.
2024-08-05 12:44:26 -04:00
kevin-loehfelm
7c13168d7d
added delete role to website documentation (#27883)
* added delete role to website documentation

* added changlog
2024-07-26 15:18:45 -07:00
divyaac
4bde6b5e55
Remove distinct_entities and non_entity_tokens from ResponseCounts and update docs (#27849)
* Updated response counts

* Updated docs and removed references to derpecated fields in ResponseCounts
2024-07-25 10:29:23 -07:00
Yoko Hyakuna
f1aa3bd7ca
[Docs] Add a warning about namespace info for HVD (#27812)
* Add a warning about namespace info for HVD

* Minor edit
2024-07-19 13:04:51 -07:00
John-Michael Faircloth
3f90e9ac38
docs: add missing rotation_statements to oracle docs (#27802) 2024-07-17 18:14:49 -04:00
John-Michael Faircloth
d444a32f8c
docs: add missing rotation_statements to mssql api docs (#27800) 2024-07-17 10:30:00 -05:00
Violet Hynes
ce904105f9
Update docs around dead_server_last_contact_threshold (#27793)
* Update docs around dead_server_last_contact_threshold

* Grammar
2024-07-16 14:44:33 -04:00
aphorise
3d4f00a1d5
Docs: autosnapshots notes around AWS EKS & S3 configuration requirments (#27646)
* Docs: autosnapshots notes around AWS EKS & S3 configuration requirments.

* Docs: corrected autosnapshots notes around AWS EKS & S3 configuration requirments.

* Update website/content/docs/enterprise/automated-integrated-storage-snapshots.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/api-docs/system/storage/raftautosnapshots.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

---------

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2024-07-15 06:31:24 -07:00
Milena Zlaticanin
f7ccefa4a4
Update azure docs to include new param (#27680)
* Update azure docs to include new param

* update
2024-07-03 12:53:56 -07:00
Ben Ash
a05deb5f37
AWS secrets: add support for STS session tags (#27620)
Adds support for configuring session tags for assume role operations.
2024-07-02 10:48:52 -04:00