Remove documentation for the Venafi plugin. This change aligns with the
standard approach of having third-party plugins host and maintain their
own documentation (e.g., KeyFactor, AppviewX).
Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
* Add API warning based on DB type
* Add deprecation notice
* Add warning to the top of the docs pages
* Update capabilities table
* Filter SQLConnectionProducer fields from unrecognized parameters warning
* Add test case
* Promote HVS as an alternative solution
* Update website/content/partials/tips/try-hvs.mdx
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
---------
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
* wip
* finish azure docs
* some fixes
* get role heading to where it was
* Apply suggestions from code review
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
* Update website/content/docs/secrets/azure.mdx
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
* pr comments
* add aws
* gcp configuration
* fix formatting
* remove indents for parser
* formatting fixed?
* Update website/content/docs/secrets/gcp.mdx
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
* Apply suggestions from code review
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
* try again
* might be the end of me
* tried running npm run format and got some promising results
* missed
* this should work
* numbering fixes
* Apply suggestions from code review
add group="gui"
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
* Update azure.mdx
change heading to match
---------
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
* database/mssql: set default root rotation stmt for contained db
* changelog
* add rotate root test
* fix test
* update passwords to make mssql happy
* create admin user
* update contained user create query
* remove test
* Updated the PostgreSQL database creation command to ensure the static role name is consistent.
The role name specified in allowed_roles="my-role" under the section "Rootless Configuration and Password Rotation for Static Roles" should align with the static role name in step #3. Previously, the command incorrectly used "my-static-role"; it should be "my-role" to match the earlier step.
The same role name should also be used when reading the static credentials in step #4
* Added the file changelog/29138.txt
* Delete changelog/29138.txt
---------
Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
Co-authored-by: akshya96 <87045294+akshya96@users.noreply.github.com>
Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
Support all fields of the name constraints extension when generating CA certs.
The PKI secrets engine only provided parameter permitted_dns_domains to create
the name constraints extension when generating CA certificates.
Add the following parameters to provide full support for the extension:
* permitted_email_addresses
* permitted_ip_ranges
* permitted_uri_domains
* excluded_dns_domains
* excluded_email_addresses
* excluded_ip_ranges
* excluded_uri_domains
Specifying any combination of these parameters will trigger the creation of the
name constraints extension as per RFC 5280 section 4.2.1.10.
* Update the title & description for SEO improvement
* Minor updates for style consistency
* Revert back the change
* Update website/content/docs/secrets/aws.mdx
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
---------
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
* Update the page description for SEO improvement
* Update the description for SEO improvement
* Update the description
* Update website/content/docs/secrets/transform/ff3-tweak-details.mdx
Co-authored-by: Jonathan Frappier <92055993+jonathanfrappier@users.noreply.github.com>
* Fixing a typo
* Incorporate review feedback
---------
Co-authored-by: Jonathan Frappier <92055993+jonathanfrappier@users.noreply.github.com>
* Match the page_title and H1 header
* Update website/content/docs/secrets/databases/index.mdx
Co-authored-by: Brian Shumate <brianshumate@users.noreply.github.com>
---------
Co-authored-by: Brian Shumate <brianshumate@users.noreply.github.com>
* clarify subkey read in GUI
* add screenshots
* add to index
* update kv nav steps
* update alt text for screenshot
* update steps
* edits
* fix build error and simplify path structure
* fix paths
* missed one
* missed another one >_<
* Update website/content/docs/secrets/kv/kv-v2/cookbook/write-data.mdx
---------
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
* add read subkey to docs
* TW edits
* fix copy/paste error
* correct nil --> null for API results
* make example data match between CLI and API (1 of 2)
* make example data match between CLI and API (2 of 2)
---------
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
* Support trimming trailing slashes via a mount tuneable to support CMPv2
* changelog/
* Perform trimming in handleLoginRequest too
* Eagerly fetch the mount entry so we only test this once
* Add a mount match function that gets path and entry
* Update vault/request_handling.go
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
* more docs
* Some patches (from ENT) didnt apply
* patch fail
* Update vault/router.go
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
* PR feedback
* dupe
* another dupe
* Add support for enabling trim_request_trailing_slashes on mount creation
* Fix read mount api returning configuration for trim_request_trailing_slashes
* Fix test assertion
* Switch enable and tune arguments to BoolPtrVal to allow end-users to specify false flag
* Add trim-request-trailing-slashes to the auth enable API and CLI
---------
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>