Document upper limit on Transit encryption size (#6014)

This commit is contained in:
Yoko 2019-01-08 17:57:43 -08:00 committed by GitHub
parent b002915af3
commit 0a97f95ff4
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2 changed files with 13 additions and 2 deletions

View File

@ -385,6 +385,12 @@ will be returned.
}
```
!> Vault HTTP API imposes a maximum request size of 32MB to prevent a denial
of service attack. This can be tuned per [`listener`
block](/docs/configuration/listener/tcp.html) in the Vault server
configuration.
### Sample Request
```
@ -966,7 +972,7 @@ input to this endpoint should be the output of `/backup` endpoint.
~> For safety, by default the backend will refuse to restore to an existing
key. If you want to reuse a key name, it is recommended you delete the key
before restoring. It is a good idea to attempt restoring to a different key
name first to verify that the operation successfully completes.
name first to verify that the operation successfully completes.
| Method | Path | Produces |
| :------- | :-------------------------- | :--------------------- |

View File

@ -63,7 +63,7 @@ types also generate separate HMAC keys):
* `ecdsa-p256`: ECDSA using curve P256; supports signing and signature
verification
* `rsa-2048`: 2048-bit RSA key; supports encryption, decryption, signing, and
signature verification
signature verification
* `rsa-4096`: 4096-bit RSA key; supports encryption, decryption, signing, and
signature verification
@ -144,6 +144,11 @@ the proper permission, it can use this secrets engine.
for storing the encrypted ciphertext. When the caller wants the plaintext,
it must provide the ciphertext back to Vault to decrypt the value.
!> Vault HTTP API imposes a maximum request size of 32MB to prevent a denial
of service attack. This can be tuned per [`listener`
block](/docs/configuration/listener/tcp.html) in the Vault server
configuration.
1. Decrypt a piece of data using the `/decrypt` endpoint with a named key:
```text