645 Commits

Author SHA1 Message Date
aphorise
6d59868fb8
Docs: Tranform secrets encode parameter: expiration added. (#25168)
* Docs: Tranform secrets encode parameter:  added.

* Docs: Tranform secrets encode parameter `expiration` text corrected & formating on `ttl` too.

* Docs: Tranform secrets encode parameter `expiration` formating & correction.

* Update website/content/api-docs/secret/transform.mdx
2024-02-02 10:20:10 -05:00
Thy Ton
aab72100fb
add new config option use_annotations_as_alias_metadata for k8s auth on api docs (#24941) 2024-02-01 11:45:53 -08:00
Jakob Beckmann
2a566f40fc
docs(kubernetes-auth): add API documentation for kubernetes auth namespace selectors (#19318)
Co-authored-by: Thy Ton <maithytonn@gmail.com>
2024-02-01 11:41:07 -08:00
Austin Gebauer
677d98a821
oidc/provider: adds code_challenge_methods_supported to metadata (#24979)
* oidc/provider: adds code_challenge_methods_supported to metadata

* adds changelog

* adds docs
2024-01-22 13:40:13 -08:00
Nestor Reyes
4811fd1962
Update oracle.mdx missing feature flags (#23517)
* Update oracle.mdx missing feature flags

Adding missing feature flags to API doc. 
split_statements and disconnect_sessions.

Related PR
https://github.com/hashicorp/vault-plugin-database-oracle/pull/62

* Update website/content/api-docs/secret/databases/oracle.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

---------

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2024-01-22 13:59:04 -06:00
Marc Boudreau
dcde458e33
VAULT-23051: Documenting API Endpoints (#24845)
* api documentation changes

* document management endpoints

* add new website page to the navigation

* include explanation message retrieval from namespaces up to root namespace

* added clarification statement to the create and update operations documentation

* fixed inconsistency in sample request

* Apply suggestions from code review

Co-authored-by: Jonathan Frappier <92055993+jonathanfrappier@users.noreply.github.com>

---------

Co-authored-by: Jonathan Frappier <92055993+jonathanfrappier@users.noreply.github.com>
2024-01-19 16:13:03 -05:00
Stefan Zhelyazkov
f4978b3efd
Updating Vault docs for JWT support of numeric bound_claims (#24921)
* Add a note that the role name is available as role in entity alias metadata

* Update JWT docs for numeric bound_claims
2024-01-18 13:57:30 +00:00
Tom Proctor
80f85a05f6
New root namespace plugin reload API sys/plugins/reload/:type/:name (#24878) 2024-01-17 15:46:27 +00:00
helenfufu
c6ba0f44ba
update /sys/leader api docs (#24816) 2024-01-11 13:27:53 -06:00
claire bontempo
db7e4b4283
small doc fix (#24720) 2024-01-09 13:47:34 -08:00
Max Winslow
54bfd792be
Sample payload is empty for AWS auth login request in API docs (#24106)
* Update aws.mdx

* Update aws.mdx
2024-01-09 12:28:37 -05:00
divyaac
87ab7497fa
Docs changes (#24242) 2024-01-05 15:31:16 -08:00
Thy Ton
2cd8bbaa75
add token_reviewer_jwt_set to resp data on config read example on k8s auth api doc (#24564) 2024-01-04 13:27:49 -05:00
Andy Assareh
ab2e0e5a28
typo corrections - spelling and grammar (#24625)
* typo corrections - spelling

* spelling and grammar
2024-01-04 12:50:42 -05:00
Max Coulombe
1cae21fb2f
Fix small doc error (#24627)
* fix small doc error for vercel destination

Co-authored-by: Calvin Leung Huang <1883212+calvn@users.noreply.github.com>

---------

Co-authored-by: Calvin Leung Huang <1883212+calvn@users.noreply.github.com>
2023-12-22 09:14:22 -05:00
benz0
954da5006c
Update audit.mdx (#24561)
* Update audit.mdx

Per the discussion here: https://hashicorp.enterprise.slack.com/archives/CPEPB6WRL/p1656678311708759

This parameter does not apply to DR replication.
This document should specify that the `local` parameter only applies to performance replication because even with this enabled the audit device configuration is still replicated to a DR cluster. This is also the expected and desired behavior.

* Fixed typos

---------

Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
2023-12-19 18:10:53 +00:00
claire bontempo
2c19bbe145
Consistently refer to Key Value secrets engine as KV (#24529)
* VAULT-21427 change ui references from K/V to KV

* references in docs/

* website json data

* go command errors

* replace Key/Value with Key Value

* add changelog

* update test

* update secret list header badge

* two more test updates
2023-12-14 11:28:58 -08:00
owenzorrin
7df1b64a3d
Update ldap.mdx (#24338)
add missing use_token_groups parameter

* use_token_groups - (Optional) Use the Active Directory tokenGroups constructed attribute of the user to find the group memberships
https://registry.terraform.io/providers/hashicorp/vault/latest/docs/resources/ldap_auth_backend#use_token_groups
2023-12-13 15:06:20 -08:00
Sungyoon Jeong
7336cf70ad
docs: fix typo in aws.mdx (#24435) 2023-12-13 12:37:13 -08:00
Tom Proctor
dc5c3e8d97
New database plugin API to reload by plugin name (#24472) 2023-12-13 10:23:34 +00:00
Steven Clark
a41852379b
Document and augment tests that PKI accepts 8192 bit RSA keys (#24364)
- Noticed that our documentation was out of date, we allow 8192
   bit RSA keys to be used as an argument to the various PKI
   issuer/key creation APIs.
 - Augument some unit tests to verify this continues to work
2023-12-05 15:26:03 -05:00
Milena Zlaticanin
aa9b02307d
Update Azure Secrets docs (#24279) 2023-12-04 15:41:25 -07:00
Tom Proctor
030bba4e68
Support rootless plugin containers (#24236)
* Pulls in github.com/go-secure-stdlib/plugincontainer@v0.3.0 which exposes a new `Config.Rootless` option to opt in to extra container configuration options that allow establishing communication with a non-root plugin within a rootless container runtime.
* Adds a new "rootless" option for plugin runtimes, so Vault needs to be explicitly told whether the container runtime on the machine is rootless or not. It defaults to false as rootless installs are not the default.
* Updates `run_config.go` to use the new option when the plugin runtime is rootless.
* Adds new `-rootless` flag to `vault plugin runtime register`, and `rootless` API option to the register API.
* Adds rootless Docker installation to CI to support tests for the new functionality.
* Minor test refactor to minimise the number of test Vault cores that need to be made for the external plugin container tests.
* Documentation for the new rootless configuration and the new (reduced) set of restrictions for plugin containers.
* As well as adding rootless support, we've decided to drop explicit support for podman for now, but there's no barrier other than support burden to adding it back again in future so it will depend on demand.
2023-11-28 14:07:07 +00:00
Robert
3726d8fb1d
Add configuration section to sync API docs (#24179)
* Add configuration section

* Add restricted root namespace alert
2023-11-27 16:10:37 -06:00
Steven Clark
b7dff9777d
Allow backends to extract credentials from payloads and trigger an authentication workflow (#23924)
* wip

* Work on the tuneable allowance and some bugs

* Call handleCancellableRequest instead, which gets the audit order more correct and includes the preauth response

* Get rid of no longer needed operation

* Phew, this wasn't necessary

* Add auth error handling by the backend, and fix a bug with handleInvalidCredentials

* Cleanup req/resp naming

* Use the new form, and data

* Discovered that tokens werent really being checked because isLoginRequest returns true for the re-request into the backend, when it shouldnt

* Add a few more checks in the delegated request handler for bad inputs

 - Protect the delegated handler from bad inputs from the backend such
   as an empty accessor, a path that isn't registered as a login request
 - Add similar protections for bad auth results as we do in the normal
   login request paths. Technically not 100% needed but if somehow the
   handleCancelableRequest doesn't use the handleLoginRequest code path
   we could get into trouble in the future
 - Add delegated-auth-accessors flag to the secrets tune command and
   api-docs

* Unit tests and some small fixes

* Remove transit preauth test, rely on unit tests

* Cleanup and add a little more commentary in tests

* Fix typos, add another failure use-case which we reference a disabled auth mount

* PR Feedback

 - Use router to lookup mount instead of defining a new lookup method
 - Enforce auth table types and namespace when mount is found
 - Define a type alias for the handleInvalidCreds
 - Fix typos/grammar
 - Clean up globals in test

* Additional PR feedback

 - Add test for delegated auth handler
 - Force batch token usage
 - Add a test to validate failures if a non-batch token is used
 - Check for Data member being nil in test cases

* Update failure error message around requiring batch tokens

* Trap MFA requests

* Reword some error messages

* Add test and fixes for delegated response wrapping

* Move MFA test to dedicated mount

 - If the delegated auth tests were running in parallel, the MFA test
   case might influence the other tests, so move the MFA to a dedicated
   mount

* PR feedback: use textproto.CanonicalMIMEHeaderKey

 - Change the X-Vault-Wrap-Ttl constant to X-Vault-Wrap-TTL
   and use textproto.CanonicalMIMEHeaderKey to format it
   within the delete call.
 - This protects the code around changes of the constant typing

* PR feedback

 - Append Error to RequestDelegatedAuth
 - Force error interface impl through explicit nil var assignment on
   RequestDelegatedAuthError
 - Clean up test factory and leverage NewTestSoloCluster
 - Leverage newer maps.Clone as this is 1.16 only

---------

Co-authored-by: Scott G. Miller <smiller@hashicorp.com>
2023-11-21 14:36:49 -05:00
Steven Clark
53040690a2
PKI: Do not set NextUpdate OCSP field when ocsp_expiry is 0 (#24192)
* Do not set NextUpdate OCSP field when ocsp_expiry is 0

* Add cl
2023-11-20 10:32:05 -05:00
Max Coulombe
af46b954f6
Document secrets sync LIST request modifications (#23975)
* * document list request adjustments

---------

Co-authored-by: Robert <17119716+robmonte@users.noreply.github.com>
2023-11-10 09:04:26 -05:00
Robert
54bf0807c1
secrets/aws: add support for STS Session Tokens with TOTP (#23690)
* Add test coverage

* Add session_token field, deprecate security_token

* Undo auth docs

* Update api docs

* Add MFA code support

---------

Co-authored-by: Graham Christensen <graham@grahamc.com>
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
Co-authored-by: Austin Gebauer <34121980+austingebauer@users.noreply.github.com>
2023-11-08 17:06:28 -06:00
Steven Clark
750ab337ea
Add missing allowed_managed_key param to mount creation doc (#23948)
- We had updated the mount tune api, but missed it within the
   creation api docs
2023-11-02 08:26:00 -04:00
kpcraig
dd15e5296f
Add documentation for new ldap param (#23817) 2023-11-01 11:33:53 -04:00
Raymond Ho
2c8dea8733
remove subscription id in docs (#23923) 2023-10-31 15:17:57 -07:00
Steven Clark
8c9929bed2
Update specifics around managed keys support in Transit (#23795) 2023-10-26 13:45:15 -04:00
Marc Boudreau
550c99ae3b
VAULT-20669: Add New Authenticated Endpoint for Version (#23740)
* add sys/internal/ui/version path

* add read capability for sys/internal/ui/version in default policy

* add changelog file

* doc: add api-docs page for sys/internal/ui/version

* add godoc for pathInternalUIVersion function

* add tests for functions in version package

* remove unreachable code

* use closure to restore version at end of test function

* use an example version in sample response

* Update website/content/api-docs/system/internal-ui-version.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Apply suggestions from code review

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/api-docs/system/internal-ui-version.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* add copyright header to version_test.go

---------

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2023-10-26 12:52:52 -04:00
Andreas Gruhler
548b7a094b
Fix backticks for cluster_aia_path (#23845) 2023-10-26 08:28:16 -04:00
claire bontempo
db4819427a
docs/add line separators to curl requests secrets sync (#23681)
* add line separators to curl requests

* revert unsync change
2023-10-23 08:29:26 -07:00
Brian Scholer
a0a150b7f1
Update step-down.mdx to describe behavior against non-active nodes (#23657)
* Update step-down.mdx to describe behavior against non-active nodes

Behavior changed in Vault 1.9:
https://developer.hashicorp.com/vault/docs/v1.9.x/commands/operator/step-down
2023-10-18 19:33:46 -07:00
claire bontempo
676ed96a6c
minor doc fixes (#23656) 2023-10-13 21:55:19 -04:00
claire bontempo
9197f002eb
fix repository typo (#23654) 2023-10-13 13:39:31 -07:00
Skybladev2
a485837cb6
Add method and path for Read the client count configuration (#23551) 2023-10-12 10:10:04 -04:00
Sarah Chavis
1b7b5a1c6e
Update enterprise vs hcp alerts (#23619) 2023-10-11 17:59:27 -05:00
kpcraig
30f19b383f
VAULT-18307: update rotation period for aws static roles on update (#23528) 2023-10-11 17:06:58 +00:00
Skybladev2
d74d920b6e
Fix Read config title level (#23543) 2023-10-09 13:06:18 -07:00
Skybladev2
6ff9fcabab
Fix path for Delete metadata and all versions (#23542)
* Fix path for Delete metadata and all versions

* fix template - remove unneeded trailing double colon
2023-10-09 13:05:49 -07:00
Skybladev2
ec026ad2ce
Remove asterixes in header (#23548) 2023-10-09 13:03:54 -07:00
Max Coulombe
acf0736590
Slight rephrase for the association API endpoints (#23393)
* slight rephrase for the association API endpoints
---------

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2023-10-05 14:53:21 -04:00
Sarah Chavis
8ee4b1e1d0
[DOCS] Confirm restricted endpoint alerts (main) (#23514)
* Make sure includes are fully correct
* Remove duplicates and sort A-Z
2023-10-05 13:00:40 -04:00
Austin Gebauer
526d0f4502
auth/saml: adds API docs for verbose_logging config (#23370) 2023-09-29 11:15:38 +09:00
Hamid Ghaf
305d6d9b67
merkle corruption checker docs (#22971)
* merkle corruption checker docs

* doc link fix

* fix the link again

* Update website/content/api-docs/system/replication/index.mdx

Co-authored-by: Mike Palmiotto <mike.palmiotto@hashicorp.com>

* Apply suggestions from code review

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
Co-authored-by: Mike Palmiotto <mike.palmiotto@hashicorp.com>

* feedback

* Apply suggestions from code review

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

---------

Co-authored-by: Mike Palmiotto <mike.palmiotto@hashicorp.com>
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2023-09-28 15:11:16 -07:00
Thy Ton
98e9d0c95e
add API docs for plugin runtimes (#23223)
Co-authored-by: Tom Proctor <tomhjp@users.noreply.github.com>
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2023-09-28 05:35:22 +00:00
Kuba Wieczorek
6685565b7e
[VAULT-20073] Docs: update docs on Sentinel RGP group policy application (#23292)
Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
Co-authored-by: Peter Wilson <peter.wilson@hashicorp.com>
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2023-09-27 21:38:29 +01:00