Jeff Mitchell
ec24d3d2f7
Update key_type parameter description
2018-05-19 12:20:37 -04:00
Kevin Paulisse
7a6777b41a
Docs: Clarify that revoking token revokes dynamic secrets ( #4592 )
2018-05-18 23:27:53 -07:00
Jeff Mitchell
f6b6ce1837
Add missing drsecondarycode to health API docs
2018-05-18 12:39:13 -04:00
Jeff Mitchell
2f97c3017f
Flip documented resolve_aws_unique_id value
...
Fixes #4583
2018-05-18 12:05:52 -04:00
Jim Kalafut
e47c602654
Fix GCP API parameter docs
2018-05-17 08:54:25 -07:00
Andrew Slattery
e1eafc78b5
Update KV response code ( #4568 )
...
Creating/Updating a secret in KV-V2 produces a status code `200` with a response body of `application/json`, whereas the previous documentation notated a `204 (empty body)` expected response code.
2018-05-17 08:46:19 -07:00
Jeff Mitchell
9a9638c93d
Update website ldap url text
2018-05-16 11:58:10 -04:00
Seth Vargo
5769fb4416
Update GCP secrets to be example-driven ( #4539 )
...
👍
2018-05-10 16:58:22 -04:00
Becca Petrin
df4b650e61
Restrict cert auth by CIDR ( #4478 )
2018-05-09 15:39:55 -07:00
Jeff Mitchell
9fb688f789
Clarify that rotate requires sudo
2018-05-09 10:19:35 -04:00
Jacob Friedman
38192cf97c
Changed DR docs page to fix generating secondary DR token ( #4521 )
...
The docs for how to create secondary DR tokens were incorrect, which caused issues at a customer. I fixed the documentation with the proper syntax and formatting, which I copied from the perf replication docs (after changing endpoints). Can someone take a quick look for me?
2018-05-08 13:35:48 -07:00
vishalnayak
c61fd9bba6
docs: s/entity/group-alias
2018-05-08 16:32:35 -04:00
Jeff
3bfa45e306
Typo ( #4505 )
2018-05-03 13:37:44 -07:00
Laura Uva
765b1a0cb0
Payload key should be dr_operation_token ( #4498 )
2018-05-02 18:35:51 -07:00
Nándor István Krácser
420a9b9321
Fix mapping read paths ( #4448 )
2018-04-25 09:22:30 -04:00
vishalnayak
4222df38c6
Merge branch 'master-oss' into approle-local-secretid
2018-04-24 16:17:56 -04:00
Brian Shumate
7a5d7713fd
Update curl commands / replace invalid '--payload' flag ( #4440 )
2018-04-24 11:20:29 -04:00
vishalnayak
20c7f20265
error on enable_local_secret_ids update after role creation
2018-04-23 17:05:53 -04:00
vishalnayak
b4f6b6fd31
update docs
2018-04-23 16:54:23 -04:00
Jeff Mitchell
bc0918a350
Add the ability to restrict token usage by IP. Add to token roles. ( #4412 )
...
Fixes #815
2018-04-21 10:49:16 -04:00
vishalnayak
46d4ded928
docs: update accessor lookup response
2018-04-17 11:52:58 -04:00
vishalnayak
73df4a6f8b
docs: update token lookup response
2018-04-17 11:40:00 -04:00
Sohex
f676ca9db7
Update index.html.md ( #4372 )
...
Remove duplicate of max_ttl description from end of period description under create role parameters.
2018-04-17 11:05:50 -04:00
Calvin Leung Huang
36d46452d0
Add docs for internal UI mounts endpoint ( #4369 )
...
* Add docs for internal UI mounts endpoint
* Update description section
2018-04-16 12:13:58 -04:00
Jeff Mitchell
b65832d08a
Add ability to disable an entity ( #4353 )
2018-04-13 21:49:40 -04:00
Jeff Mitchell
a7f604ff91
Fix token store role documentation around explicit max ttl
2018-04-13 09:59:12 -04:00
Brian Kassouf
915e452c0d
KV: Update 'versioned' naming to 'v2' ( #4293 )
...
* Update 'versioned' naming to 'v2'
* Make sure options are set
* Fix description of auth flag
* Review feedback
2018-04-09 09:39:32 -07:00
Chris Hoffman
e3742e5a54
Docs for configuration UI headers ( #4313 )
...
* adding /sys/config/ui headers
* adding /sys/config/ui headers
2018-04-09 12:21:02 -04:00
Chris Hoffman
295db4718f
Root Credential Rotation Docs ( #4312 )
...
* updating root credential docs
* more docs updates
* more docs updates
2018-04-09 12:20:29 -04:00
Matthew Irish
fec8f13955
UI - pki updates ( #4291 )
...
* add require_cn to pki roles
* add policy_identifiers and basic_constraints_valid_for_non_ca to pki role form
* add new fields to the PKI docs
* add add_basic_constraints field
2018-04-08 21:09:29 -05:00
Brian Kassouf
56274d854d
Versioned K/V docs ( #4259 )
...
* Work on kv docs
* Add more kv docs
* Update kv docs
* More docs updates
* address some review coments
2018-04-03 23:22:41 -07:00
Jeff Mitchell
266a57fab2
Case insensitive behavior for LDAP ( #4238 )
2018-04-03 09:52:43 -04:00
Vishal Nayak
0caa6408c2
Update group alias by ID ( #4237 )
...
* update group alias by id
* update docs
2018-04-02 10:42:01 -04:00
Vishal Nayak
3930da11d4
add entity merge API to docs ( #4234 )
2018-04-01 12:59:57 -04:00
Jeff Mitchell
4b45cb7f91
Merge branch 'master-oss' into 0.10-beta
2018-03-27 12:40:30 -04:00
Yoko
e5788b8860
Update Github auth method API reference ( #4202 )
...
* Update Github auth method API reference
* Replaced vault.rocks in API
2018-03-26 16:56:14 -07:00
Seth Vargo
04708d554c
Drop vault.rocks ( #4186 )
2018-03-23 11:41:51 -04:00
Chris Hoffman
505f0ea495
adding Azure docs ( #4185 )
...
Adding Azure Auth Method docs
2018-03-22 18:28:42 -04:00
Brian Kassouf
1626803f3f
Update kv backend and add some docs ( #4182 )
...
* Add kv backend
* Move kv in apha order
* Update kv backend and add some docs
2018-03-21 23:10:05 -04:00
Calvin Leung Huang
c54c9519c8
Passthrough request headers ( #4172 )
...
* Add passthrough request headers for secret/auth mounts
* Update comments
* Fix SyncCache deletion of passthrough_request_headers
* Remove debug line
* Case-insensitive header comparison
* Remove unnecessary allocation
* Short-circuit filteredPassthroughHeaders if there's nothing to filter
* Add whitelistedHeaders list
* Update router logic after merge
* Add whitelist test
* Add lowercase x-vault-kv-client to whitelist
* Add back const
* Refactor whitelist logic
2018-03-21 19:56:47 -04:00
emily
468cad19f3
Docs for Vault GCP secrets plugin ( #4159 )
2018-03-21 15:02:38 -04:00
Brian Shumate
6c0b238459
Docs: update formatting / heading ( #4175 )
...
- Correct Generate Disaster Recovery Operation Token heading level
- Tighten up formatting/trailing spaces
2018-03-21 10:14:52 -04:00
Josh Soref
e43b76ef97
Spelling ( #4119 )
2018-03-20 14:54:10 -04:00
Jason Martin
7054005e9f
README Spelling error ( #4165 )
2018-03-20 11:45:56 -04:00
Jeff Mitchell
f7e80837a7
Note that you can set a CA chain when using set-signed.
...
Fixes #2246
2018-03-19 19:44:07 -04:00
Jacob Crowther
53b0e5971d
Add Cryptr to related tools ( #4126 )
2018-03-19 14:46:54 -04:00
Jeff Mitchell
9e596fcef2
Update path-help to make clear you shouldn't put things in the URL.
...
Remove from website docs as those have been long deprecated.
2018-03-19 11:50:16 -04:00
Joel Thompson
29551c0b1b
Allow non-prefix-matched IAM role and instance profile ARNs in AWS auth backend ( #4071 )
...
* Update aws auth docs with new semantics
Moving away from implicitly globbed bound_iam_role_arn and
bound_iam_instance_profile_arn variables to make them explicit
* Refactor tests to reduce duplication
auth/aws EC2 login tests had the same flow duplicated a few times, so
refactoring to reduce duplication
* Add tests for aws auth explicit wildcard constraints
* Remove implicit prefix matching from AWS auth backend
In the aws auth backend, bound_iam_role_arn and
bound_iam_instance_profile_arn were ALWAYS prefix matched, and there was
no way to opt out of this implicit prefix matching. This now makes the
implicit prefix matching an explicit opt-in feature by requiring users
to specify a * at the end of an ARN if they want the prefix matching.
2018-03-17 21:24:49 -04:00
Joel Thompson
d349f5b0a7
auth/aws: Allow binding by EC2 instance IDs ( #3816 )
...
* auth/aws: Allow binding by EC2 instance IDs
This allows specifying a list of EC2 instance IDs that are allowed to
bind to the role. To keep style formatting with the other bindings, this
is still called bound_ec2_instance_id rather than bound_ec2_instance_ids
as I intend to convert the other bindings to accept lists as well (where
it makes sense) and keeping them with singular names would be the
easiest for backwards compatibility.
Partially fixes #3797
2018-03-15 09:19:28 -07:00
Brian Nuszkowski
ecb3fe21b7
Add PKCS1v15 as a RSA signature and verification option on the Transit secret engine ( #4018 )
...
Option to specify the RSA signature type, in specific add support for PKCS1v15
2018-03-15 09:17:02 -07:00