From 0249f6e2408c2339e6f65259209944bdb873a75d Mon Sep 17 00:00:00 2001 From: Angel Garbarino Date: Thu, 2 Feb 2023 14:17:13 -0700 Subject: [PATCH] prepend vault to model docLinks (#18965) --- ui/app/models/database/connection.js | 4 ++-- ui/app/models/oidc/provider.js | 2 +- ui/app/models/pki/role.js | 10 +++++----- 3 files changed, 8 insertions(+), 8 deletions(-) diff --git a/ui/app/models/database/connection.js b/ui/app/models/database/connection.js index 2e55afabd..9ce113e20 100644 --- a/ui/app/models/database/connection.js +++ b/ui/app/models/database/connection.js @@ -54,7 +54,7 @@ export default Model.extend({ defaultSubText: 'Unless a custom policy is specified, Vault will use a default: 20 characters with at least 1 uppercase, 1 lowercase, 1 number, and 1 dash character.', defaultShown: 'Default', - docLink: '/docs/concepts/password-policies', + docLink: '/vault/docs/concepts/password-policies', }), // common fields @@ -106,7 +106,7 @@ export default Model.extend({ subText: 'Enter the custom username template to use.', defaultSubText: 'Template describing how dynamic usernames are generated. Vault will use the default for this plugin.', - docLink: '/docs/concepts/username-templating', + docLink: '/vault/docs/concepts/username-templating', defaultShown: 'Default', }), max_open_connections: attr('number', { diff --git a/ui/app/models/oidc/provider.js b/ui/app/models/oidc/provider.js index 7ffa8fc6f..e3937d687 100644 --- a/ui/app/models/oidc/provider.js +++ b/ui/app/models/oidc/provider.js @@ -20,7 +20,7 @@ export default class OidcProviderModel extends Model { subText: 'The scheme, host, and optional port for your issuer. This will be used to build the URL that validates ID tokens.', placeholderText: 'e.g. https://example.com:8200', - docLink: '/api-docs/secret/identity/oidc-provider#create-or-update-a-provider', + docLink: '/vault/api-docs/secret/identity/oidc-provider#create-or-update-a-provider', helpText: `Optional. This defaults to a URL with Vault's api_addr`, }) issuer; diff --git a/ui/app/models/pki/role.js b/ui/app/models/pki/role.js index d1cd6ffc6..bb3d45478 100644 --- a/ui/app/models/pki/role.js +++ b/ui/app/models/pki/role.js @@ -128,7 +128,7 @@ export default class PkiRoleModel extends Model { subText: 'Specifies if certificates issued/signed against this role will have Vault leases attached to them.', editType: 'boolean', - docLink: '/api-docs/secret/pki#create-update-role', + docLink: '/vault/api-docs/secret/pki#create-update-role', }) generateLease; @@ -138,7 +138,7 @@ export default class PkiRoleModel extends Model { subText: 'This can improve performance when issuing large numbers of certificates. However, certificates issued in this way cannot be enumerated or revoked.', editType: 'boolean', - docLink: '/api-docs/secret/pki#create-update-role', + docLink: '/vault/api-docs/secret/pki#create-update-role', }) noStore; @@ -210,7 +210,7 @@ export default class PkiRoleModel extends Model { label: 'URI Subject Alternative Names (URI SANs)', subText: 'Defines allowed URI Subject Alternative Names. Add one item per row', editType: 'stringArray', - docLink: '/docs/concepts/policies', + docLink: '/vault/docs/concepts/policies', }) allowedUriSans; @@ -218,7 +218,7 @@ export default class PkiRoleModel extends Model { label: 'Allow URI SANs template', subText: 'If true, the URI SANs above may contain templates, as with ACL Path Templating.', editType: 'boolean', - docLink: '/docs/concepts/policies', + docLink: '/vault/docs/concepts/policies', }) allowUriSansTemplate; @@ -330,7 +330,7 @@ export default class PkiRoleModel extends Model { footer: { text: 'These options can interact intricately with one another. For more information,', docText: 'learn more here.', - docLink: '/api-docs/secret/pki#allowed_domains', + docLink: '/vault/api-docs/secret/pki#allowed_domains', }, }, 'Key parameters': {