Commit Graph

161 Commits

Author SHA1 Message Date
Scott Miller
e315ef31ec
Remove the Beta flag from Seal HA (#27437) 2024-06-11 16:36:58 +01:00
Scott Miller
de84d373c1
Document environment variable usage in Seal HA (#27421)
* Document how environment variables work with seal names

* wording
2024-06-10 11:37:59 -05:00
Jonathan Frappier
ef10c1a2a4
Add TCP TLS guide (#27318)
* Add TCP TLS guide

* Fix example listener stanza missing }

* Update website/content/docs/configuration/listener/tcp-tls.mdx

Co-authored-by: Jamie Finnigan <jfinnigan@hashicorp.com>

* Update website/content/docs/configuration/listener/tcp-tls.mdx

Co-authored-by: Jamie Finnigan <jfinnigan@hashicorp.com>

* Update website/content/docs/configuration/listener/tcp-tls.mdx

Co-authored-by: Jamie Finnigan <jfinnigan@hashicorp.com>

* Update website/content/docs/configuration/listener/tcp-tls.mdx

Co-authored-by: Jamie Finnigan <jfinnigan@hashicorp.com>

* Update website/content/docs/configuration/listener/tcp-tls.mdx

Co-authored-by: Jamie Finnigan <jfinnigan@hashicorp.com>

* Update website/content/docs/configuration/listener/tcp-tls.mdx

Co-authored-by: Jamie Finnigan <jfinnigan@hashicorp.com>

* Suggestions for TCP-TLS docs (#27335)

* recreating edits

* Fix nav entry

---------

Co-authored-by: Jamie Finnigan <jfinnigan@hashicorp.com>
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2024-06-05 09:48:10 -04:00
Violet Hynes
1d87ed8aaf
Add docs and changelog for PR 9733 (#27313) 2024-06-03 14:09:57 -04:00
Lucy Davinhart || Strawb System
b5e58a73b0
Update raft.mdx (#27275) 2024-05-30 10:33:56 -04:00
Roberto Hidalgo
6e72397a86
Allow setting of Consul ServiceMeta tags from config file (#11084)
* Allow setting of Consul ServiceMeta tags from config file

probably a bad idea, let's see how it works
scaffold tests

* kick circleci

* Add links to consul docs

Co-authored-by: Violet Hynes <a.xenasis@gmail.com>

* add changelog note

* use relative developer docs links

* address feedback

* please linter

---------

Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
2024-05-27 16:28:10 -04:00
Sarah Chavis
53ec4d5f7b
[DOCS] Manage resources with TF (#27171)
---------

Co-authored-by: CJ <105300705+cjobermaier@users.noreply.github.com>
Co-authored-by: Brian Shumate <brianshumate@users.noreply.github.com>
2024-05-24 09:55:27 -07:00
CJ
5787c17b97
Docs/waf vault tf (#26515)
---------

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
Co-authored-by: Chris Stella <chris.stella.84@gmail.com>
2024-05-13 08:21:06 -07:00
Meggie
a5c9364c68
Added some notes about TLS and browser Secure Contexts (#26946)
* Added some notes about TLS and browser Secure Contexts

* Fixed an unrelated indent and color for note

* Bolding word to add visual distinction
2024-05-10 16:01:54 -04:00
Paul Banks
0a06215d1a
Documentation for Adaptive Overload Protection (#26690)
* Document enabling config

* Fix nav data JSON after disabling over-zealous prettifier

* Address review feedback

* Add warning about reloading config during overload

* Bad metrics links

* Another bad link

* Add upgrade note about deprecation

---------

Co-authored-by: Mike Palmiotto <mike.palmiotto@hashicorp.com>
2024-05-10 17:55:57 +01:00
benz0
758c967369
Update tcp.mdx (#26816)
per customer request in support ticket #141025 I've updated the description of tls_disable_client_certs to provide clarification.

previous pr for this change was approved but needed to be resubmitted because of problems with my GH account.  See #26601
2024-05-06 11:03:13 -04:00
prabhat-hashi
c88967abb5
Docs- Update info on key rotation (#23274)
* Docs- Update info on key rotation

Added a sentence about needing to seal-rewrap if you want to disable or delete old key.

* rectified the url for seal-rewrap

rectified the url for seal-rewrap

* fixed some grammar

* Update website/content/docs/configuration/seal/pkcs11.mdx

---------

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2024-05-01 15:42:54 -07:00
Yoko Hyakuna
2becdceab0
Replace 'HCP Vault' with 'HCP Vault Dedicated' (#26457)
* Replace 'HCP Vault' with 'HCP Vault Dedicated'

* Replace 'HCP Vault' with 'HCP Vault Dedicated' where applicable

* Replace 'Terraform Cloud' with 'HCP Terraform'

* Minor format fixes

* Update the side-nav title to 'HCP Terraform'

* Undo changes to Terraform Cloud secrets engine
2024-04-22 08:44:13 -04:00
Theron Voran
e4f9d024c8
docs/vault-helm: updates for v0.28.0 release (#26282) 2024-04-12 13:37:56 -07:00
Paul Banks
9c12a6acc7
Docs/mount namespace entry size (#26119)
* Update documentation for namespace/mount entry size limit

* Clarify defaults

* Better wording for storage size partial that appears on different pages

* Active voice!

* No this

* Fix confusing terminology
2024-04-08 12:43:07 +01:00
Jason N
e9cb557ef1
Add support for forwarded Tls-Client-Cert (#17272)
* Add support for x_forwarded_for_client_cert_header

* add changelog entry

* add tests for a badly and properly formatted certs

* both conditions should be true

* handle case where r.TLS is nil

* prepend client_certs to PeerCertificates list

* Add support for x_forwarded_for_client_cert_header

* add changelog entry

* add tests for a badly and properly formatted certs

* both conditions should be true

* handle case where r.TLS is nil

* prepend client_certs to PeerCertificates list

* add option for decoders to handle different proxies

* Add support for x_forwarded_for_client_cert_header

* add changelog entry

* add tests for a badly and properly formatted certs

* both conditions should be true

* handle case where r.TLS is nil

* prepend client_certs to PeerCertificates list

* add option for decoders to handle different proxies

* fix tests

* fix typo

---------

Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
Co-authored-by: Scott Miller <smiller@hashicorp.com>
Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
2024-04-05 11:22:46 -05:00
Sarah Chavis
038aaa3ff7
1.16 release notes and beta cleanup (#26247)
Co-authored-by: Tom Proctor <tomhjp@users.noreply.github.com>
2024-04-03 22:18:40 +01:00
Scott Miller
f319d98665
Re-add beta designation (#26190)
* Re-add beta designation

* nl

* mark the migration section beta too

* beta
2024-03-27 15:16:27 -04:00
Josh Black
6d69761751
raft-wal docs (#25572)
* starting on docs

* add docs for raft-wal

* some tweaks

* Apply suggestions from code review

Co-authored-by: Mike Palmiotto <mike.palmiotto@hashicorp.com>

* Edits for Raft WAL (#26123)

* not just one filename

* update file pattern for wal files

---------

Co-authored-by: Mike Palmiotto <mike.palmiotto@hashicorp.com>
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2024-03-25 16:42:48 -07:00
Scott Miller
c6da02962d
Add a configuration flag for enabling multiseal (Seal HA), CE side (#25908)
* Add a configuration flag for enabling multiseal (Seal HA), CE side

* imports

* no quotes

* get rid of dep on ent config

* Abstract enableMultiSeal for a build time switch

* license headers

* wip

* gate physical seal gen fetch by a param

* docs tweak, remove core flag

* updates from the ent pr

* update stub

* update test fixtures for enable_multiseal

* use accessor

* add a test fixture for non-multiseal diagnose

* remove debugging crtuch

* Do handle phys seal gen info even if multiseal is off, in order to facilitate enable/disable safeties

* more enabled flag handling

* Accept seal gen info if we were previously disabled, and persist it

* update unit test

* Validation happens postUnseal, so this test is invalid

* Dont continue setting conf if seal loading fails during SIGHUP

* Update website/content/docs/configuration/seal/seal-ha.mdx

Thanks, that does sound much clearer

Co-authored-by: Jason O'Donnell <2160810+jasonodonnell@users.noreply.github.com>

* use validation if previous gen was enabled

* unit test update

* stub SetMultisealEnabled

* bring over more changes from ent

* this was an unfix

---------

Co-authored-by: Jason O'Donnell <2160810+jasonodonnell@users.noreply.github.com>
2024-03-22 14:23:05 +00:00
Scott Miller
14816dcf86
Be explicit about Shamir seals in Seal HA (#26092) 2024-03-22 09:25:20 -04:00
Victor Rodriguez
e4aba1516d
Do not refresh seal-wrapped values when there are unhealthy seals. (#25801)
* Do not refresh seal-wrapped values when there are unhealthy seals.

Modify Access.IsUpToDate() to consider entries as being up-to-date when one or
more encryption wrappers fail to encrypt the test value, since re-wrapping the
value would result in the loss of the ciphertext for the unhealthy wrappers.

In addition, make Access.IsUpToDate() return true is the key set ID has not been
populated and the caller has not forced key ID refresh.

Make Access.Encrypt() return an error for any encryption wrapper that is skipped
due to being unhealthy.

* Update Seal HA documentation.

Mention that the barrier key and the recovery keys cannot be rotated while there
are unhealthy seals.

Document environment variable VAULT_SEAL_REWRAP_SAFETY.
2024-03-07 15:50:36 +00:00
Scott Miller
7943a9e094
Add a fuller example of a Seal HA compatible seal stanza (#25704)
* Add a fuller example of a Seal HA compatible seal stanza

* abs link
2024-02-29 12:45:53 -06:00
Yoko Hyakuna
f7a00c7430
Add enterprise badge (#25707) 2024-02-29 08:41:24 -08:00
Mike Palmiotto
9ddd23cf62
Request Limiter docs (#25557)
Co-authored-by: miagilepner <mia.epner@hashicorp.com>
2024-02-27 16:24:44 -05:00
Scott Miller
96498316f1
Seal HA documentation updates (#25316)
* Seal HA documentation updates

* anchor

* rel link

* remove beta

* try again on internal link

* still trying to get this internal redirect to work

* try without path
2024-02-08 16:00:50 -06:00
Scott Miller
453e352844
Document max_parallel for PKCS#11 seals (#25291) 2024-02-08 15:51:28 +00:00
Tom Proctor
6e111d92fe
Support setting plugin TMPDIR in config as well as env (#24978) 2024-01-30 13:10:23 +00:00
Andrei Burd
7049ce027e
Update index.mdx (#24763) 2024-01-11 13:33:27 -08:00
Matthew Irish
73254908e6
docs(web repl): add initial docs about the UI REPL (#24642)
* docs(web repl): add initial docs about the UI REPL

* feature(repl): add link to the new docs in the REPL

* chore(repl): Web CLI or Broweser CLI -> Web REPL

* Use Hds::Link::Inline instead of DocLink

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>

* Update ui/app/templates/components/console/ui-panel.hbs

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>

* Update website/content/docs/commands/web.mdx

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>

* Update website/content/docs/commands/web.mdx

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>

* Fix typos and update phrasing.

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>

* docs(web repl): add a refrence to the repl docs on the ui config page

* Update KV version 2 reference

Co-authored-by: Chelsea Shaw <82459713+hashishaw@users.noreply.github.com>

* fix linting

---------

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>
Co-authored-by: Chelsea Shaw <82459713+hashishaw@users.noreply.github.com>
2024-01-02 22:17:51 +00:00
Justin Clayton
e7838a3594
Add some clarity to retry_join docs (#24605)
This edit was made based on customer feedback
2023-12-20 16:24:38 -08:00
Sean Ellefson
98d0125960
Adding note about node-id being generated when unset (#24101)
* Adding note about `node-id` being generated when unset

* Update website/content/docs/configuration/storage/raft.mdx

* Correct linter error

---------

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2023-12-13 21:15:57 +00:00
miagilepner
2db1941fd8
Docs updates about redirection and metrics (#24445)
* docs updates

* remove comma
2023-12-11 15:49:38 +01:00
Theron Voran
f951fe5429
docs/vault-helm: updates for v0.27.0 release (#24178) 2023-11-17 10:13:48 -08:00
Kyle Schochenmaier
ec610f273f
[docs] update docs for latest 0.26.0 release (#23890)
* update docs for latest release
* update to 0.26.1
2023-10-31 11:19:57 -07:00
Jason O'Donnell
66494c8129
core: fix bug where deadlock detection was always on for expiration and quotas (#23902)
* server: fix bug where deadlock detection was on for expiration and quotas

* trim spaces

* Add tests

* Use trimspace and lower

* Update test

* changelog

* fix config parsing
2023-10-30 12:49:46 -04:00
Theron Voran
41cc3b31bf
docs/vault-helm: updates for the last release (v0.25.0) (#23844) 2023-10-26 08:37:54 -07:00
Peter Wilson
beafc1de75
Docs listener config - tweak (#23572)
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2023-10-11 12:10:52 -07:00
Marc Boudreau
01cd9d37bb
Add Ability to Disable Replication Status Endpoints in Listener Configuration (#23547)
* CI: Pre-emptively delete logs dir after cache restore in test-collect-reports (#23600)

* Fix OktaNumberChallenge (#23565)

* remove arg

* changelog

* exclude changelog in verifying doc/ui PRs (#23601)

* Audit: eventlogger sink node reopen on SIGHUP (#23598)

* ensure nodes are asked to reload audit files on SIGHUP

* added changelog

* Capture errors emitted from all nodes during proccessing of audit pipelines (#23582)

* Update security-scan.yml

* Listeners: Redaction only for TCP (#23592)

* redaction should only work for TCP listeners, also fix bug that allowed custom response headers for unix listeners

* fix failing test

* updates from PR feedback

* fix panic when unlocking unlocked user (#23611)

* VAULT-18307: update rotation period for aws static roles on update (#23528)

* add disable_replication_status_endpoints tcp listener config parameter

* add wrapping handler for disabled replication status endpoints setting

* adapt disable_replication_status_endpoints configuration parsing code to refactored parsing code

* refactor configuration parsing code to facilitate testing

* fix a panic when parsing configuration

* update refactored configuration parsing code

* fix merge corruption

* add changelog file

* document new TCP listener configuration parameter

* make sure disable_replication_status_endpoints only has effect on TCP listeners

* use active voice for explanation of disable_replication_status_endpoints

* fix minor merge issue

---------

Co-authored-by: Kuba Wieczorek <kuba.wieczorek@hashicorp.com>
Co-authored-by: Angel Garbarino <Monkeychip@users.noreply.github.com>
Co-authored-by: Hamid Ghaf <83242695+hghaf099@users.noreply.github.com>
Co-authored-by: Peter Wilson <peter.wilson@hashicorp.com>
Co-authored-by: Mark Collao <106274486+mcollao-hc@users.noreply.github.com>
Co-authored-by: davidadeleon <56207066+davidadeleon@users.noreply.github.com>
Co-authored-by: kpcraig <3031348+kpcraig@users.noreply.github.com>
2023-10-11 14:23:21 -04:00
Peter Wilson
2912f5b539
documentation for redaction configuration on listeners (#23568)
* documentation for redaction configuration on listeners

* fix relative paths for /vault/
2023-10-09 20:34:41 +01:00
Scott Miller
ebef296c30
Be a bit more explicit about the need for two seals. (#23553)
* Be a bit more explicit about th need for two seals

* Add a mixture note
2023-10-06 11:29:17 -05:00
Sarah Chavis
8952b69eba
Make additional changes (#23416) 2023-09-28 17:24:12 -07:00
Marc Boudreau
a3936f1467
VAULT-20339: fixed typo in parameter name and moved it to correct section (#23287)
* docs: fixed typo in parameter name and moved it to correct section

* add changelog file
2023-09-28 10:04:32 -04:00
Scott Miller
036cbcebd9
First draft of Seal HA documentation (#23252)
* wip

* Initial draft of Seal HA docs

* nav data

* Fix env var name

* title

* Note partially wrapped values and disabled seal participation

* Update website/data/docs-nav-data.json

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>

* correct initial upgrade limitation

* Add note about shamir seals and migration

* fix nav json

* snapshot note

* availability note

* seal-backend-status

* Add a couple more clarifying statements

* header typo

* correct initial upgrade wording

* Update website/content/docs/configuration/seal/seal-ha.mdx

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>

* Update website/content/docs/concepts/seal.mdx

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>

---------

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2023-09-22 13:18:48 -05:00
soly-hashicorp
4b9b5d60e6
Update raft.mdx (#23001)
* Update raft.mdx
---------

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2023-09-15 09:55:35 -07:00
Scott Miller
8c4b4650ae
Typo in seal config doc for pkcs#11 (#22905)
* Typo in seal config doc for pkcs#11

* Update ENV var list

---------

Co-authored-by: Steve Clark <steven.clark@hashicorp.com>
2023-09-08 10:56:34 -05:00
Ellie
bd36e66ea6
Add config value that gives users options to skip calculating role for each lease (#22651)
* Add config value that gives users options to skip calculating role for each lease

* add changelog

* change name

* add config for testing

* Update changelog/22651.txt

Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>

* update tests, docs and reorder logic in conditional

* fix comment

* update comment

* fix comment again

* Update comments and change if order

* change comment again

* add other comment

* fix tests

* add documentation

* edit docs

* Update http/util.go

Co-authored-by: Mike Palmiotto <mike.palmiotto@hashicorp.com>

* Update vault/core.go

* Update vault/core.go

* update var name

* udpate docs

* Update vault/request_handling.go

Co-authored-by: Mike Palmiotto <mike.palmiotto@hashicorp.com>

* 1 more docs change

---------

Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
Co-authored-by: Mike Palmiotto <mike.palmiotto@hashicorp.com>
2023-09-01 07:01:41 -05:00
Sarah Chavis
bd3596610f
Add the appropriate enterprise alerts for seal wrapping (#22628) 2023-08-30 11:09:49 -07:00
Sean Ellefson
9cd0d919f5
Add note to outline correspondence with Consul config (#22545)
* Add note to outline correspondence with Consul config

Calling out corresponding parameter for Vault's integrated storage `max_entry_size` with Consul's `kv_max_value_size`.

* Update website/content/docs/configuration/storage/raft.mdx

---------

Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
2023-08-29 10:20:01 -04:00
divyaac
da6815e5a4
Chroot Listener Docs (#22503)
* Chroot Listener Docs

* Update website/content/docs/configuration/listener/tcp.mdx

Co-authored-by: Nick Cabatoff <ncabatoff@hashicorp.com>

* Update website/content/docs/configuration/listener/tcp.mdx

Co-authored-by: Nick Cabatoff <ncabatoff@hashicorp.com>

Update website/content/docs/configuration/listener/tcp.mdx

Co-authored-by: Nick Cabatoff <ncabatoff@hashicorp.com>

Added a statement on what happens when namespace does not exist

* Information on what will happen if a namespace is provided through the CLI or the header

* Changed from specified value to default value

* Edit typo

* Edited docs with clarification on appending

* Edited docs

* Update website/content/docs/configuration/listener/tcp.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

---------

Co-authored-by: Nick Cabatoff <ncabatoff@hashicorp.com>
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2023-08-23 17:13:00 -07:00