Consistent capitalization
This commit is contained in:
parent
63705661b4
commit
4954bb35da
|
@ -63,7 +63,7 @@ export default DS.RESTAdapter.extend({
|
|||
let options = passedOptions;
|
||||
let controlGroup = this.get('controlGroup');
|
||||
let controlGroupToken = controlGroup.tokenForUrl(url);
|
||||
// if we have a control group token that matches the intendedUrl,
|
||||
// if we have a Control Group token that matches the intendedUrl,
|
||||
// then we want to unwrap it and return the unwrapped response as
|
||||
// if it were the initial request
|
||||
// To do this, we rewrite the function args
|
||||
|
|
|
@ -125,7 +125,7 @@ export default Component.extend(DEFAULTS, {
|
|||
}),
|
||||
|
||||
unwrapToken: task(function*(token) {
|
||||
// will be using the token auth method, so set it here
|
||||
// will be using the Token Auth Method, so set it here
|
||||
this.set('selectedAuth', 'token');
|
||||
let adapter = this.get('store').adapterFor('tools');
|
||||
try {
|
||||
|
@ -152,7 +152,7 @@ export default Component.extend(DEFAULTS, {
|
|||
store.unloadAll('auth-method');
|
||||
});
|
||||
} catch (e) {
|
||||
this.set('error', `There was an error fetching auth methods: ${e.errors[0]}`);
|
||||
this.set('error', `There was an error fetching Auth Methods: ${e.errors[0]}`);
|
||||
}
|
||||
}),
|
||||
|
||||
|
|
|
@ -66,12 +66,12 @@ export default Component.extend({
|
|||
return 'You have been given authorization';
|
||||
}
|
||||
if (isApproved) {
|
||||
return 'This control group has been authorized';
|
||||
return 'This Control Group has been authorized';
|
||||
}
|
||||
if (currentUserIsRequesting) {
|
||||
return 'The path you requested is locked by a control group';
|
||||
return 'The path you requested is locked by a Control Group';
|
||||
}
|
||||
return 'Someone is requesting access to a path locked by a control group';
|
||||
return 'Someone is requesting access to a path locked by a Control Group';
|
||||
}),
|
||||
|
||||
refresh: task(function*() {
|
||||
|
|
|
@ -60,7 +60,7 @@ export default Component.extend({
|
|||
{
|
||||
key: 'secrets',
|
||||
name: 'Secrets',
|
||||
steps: ['Enabling a secrets engine', 'Adding a secret'],
|
||||
steps: ['Enabling a Secrets Engine', 'Adding a secret'],
|
||||
selected: false,
|
||||
show: true,
|
||||
disabled: false,
|
||||
|
@ -71,7 +71,7 @@ export default Component.extend({
|
|||
{
|
||||
key: 'authentication',
|
||||
name: 'Authentication',
|
||||
steps: ['Enabling an auth method', 'Managing your auth method'],
|
||||
steps: ['Enabling an Auth Method', 'Managing your Auth Method'],
|
||||
selected: false,
|
||||
show: true,
|
||||
disabled: false,
|
||||
|
|
|
@ -56,11 +56,11 @@ export default Component.extend({
|
|||
actionText: computed('mountSubtype', function() {
|
||||
switch (this.get('mountSubtype')) {
|
||||
case 'aws':
|
||||
return 'Generate Credential';
|
||||
return 'Generate credential';
|
||||
case 'ssh':
|
||||
return 'Sign Keys';
|
||||
return 'Sign keys';
|
||||
case 'pki':
|
||||
return 'Generate Certificate';
|
||||
return 'Generate certificate';
|
||||
default:
|
||||
return null;
|
||||
}
|
||||
|
|
|
@ -15,10 +15,10 @@ export default Controller.extend({
|
|||
const { type, path } = method.getProperties('type', 'path');
|
||||
try {
|
||||
yield method.destroyRecord();
|
||||
this.get('flashMessages').success(`The ${type} auth method at ${path} has been disabled.`);
|
||||
this.get('flashMessages').success(`The ${type} Auth Method at ${path} has been disabled.`);
|
||||
} catch (err) {
|
||||
this.get('flashMessages').danger(
|
||||
`There was an error disabling auth method at ${path}: ${err.errors.join(' ')}.`
|
||||
`There was an error disabling Auth Method at ${path}: ${err.errors.join(' ')}.`
|
||||
);
|
||||
}
|
||||
}).drop(),
|
||||
|
|
|
@ -31,10 +31,10 @@ export default Controller.extend({
|
|||
const { engineType, path } = engine;
|
||||
try {
|
||||
yield engine.destroyRecord();
|
||||
this.get('flashMessages').success(`The ${engineType} secrets engine at ${path} has been disabled.`);
|
||||
this.get('flashMessages').success(`The ${engineType} Secrets Engine at ${path} has been disabled.`);
|
||||
} catch (err) {
|
||||
this.get('flashMessages').danger(
|
||||
`There was an error disabling the ${engineType} secrets engine at ${path}: ${err.errors.join(' ')}.`
|
||||
`There was an error disabling the ${engineType} Secrets Engine at ${path}: ${err.errors.join(' ')}.`
|
||||
);
|
||||
}
|
||||
}).drop(),
|
||||
|
|
|
@ -31,7 +31,7 @@ export default DS.Model.extend({
|
|||
config: fragment('mount-config', { defaultValue: {} }),
|
||||
local: attr('boolean', {
|
||||
helpText:
|
||||
'When replication is enabled, a local mount will not be replicated across clusters. This can only be specified at mount time.',
|
||||
'When Replication is enabled, a local mount will not be replicated across clusters. This can only be specified at mount time.',
|
||||
}),
|
||||
sealWrap: attr('boolean', {
|
||||
helpText:
|
||||
|
|
|
@ -16,6 +16,6 @@ export default DS.Model.extend({
|
|||
maxTtl: attr({
|
||||
defaultValue: 0,
|
||||
editType: 'ttl',
|
||||
label: 'Max TTL',
|
||||
label: 'Maximum TTL',
|
||||
}),
|
||||
});
|
||||
|
|
|
@ -5,7 +5,7 @@ export default Fragment.extend({
|
|||
version: attr('number', {
|
||||
label: 'Version',
|
||||
helpText:
|
||||
'The KV Secrets engine can operate in different modes. Version 1 is the original generic secrets engine the allows for storing of static key/value pairs. Version 2 added more features including data versioning, TTLs, and check and set.',
|
||||
'The KV Secrets Engine can operate in different modes. Version 1 is the original generic Secrets Engine the allows for storing of static key/value pairs. Version 2 added more features including data versioning, TTLs, and check and set.',
|
||||
possibleValues: [2, 1],
|
||||
defaultFormValue: 2,
|
||||
}),
|
||||
|
|
|
@ -23,7 +23,7 @@ export default DS.Model.extend({
|
|||
options: fragment('mount-options', { defaultValue: {} }),
|
||||
local: attr('boolean', {
|
||||
helpText:
|
||||
'When replication is enabled, a local mount will not be replicated across clusters. This can only be specified at mount time.',
|
||||
'When Replication is enabled, a local mount will not be replicated across clusters. This can only be specified at mount time.',
|
||||
}),
|
||||
sealWrap: attr('boolean', {
|
||||
helpText:
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
<form {{action (perform saveModel) on="submit"}}>
|
||||
<div class="box is-sideless is-fullwidth is-marginless">
|
||||
<NamespaceReminder @mode="save" @noun="auth method" />
|
||||
<NamespaceReminder @mode="save" @noun="Auth Method" />
|
||||
{{message-error model=model}}
|
||||
{{#if model.attrs}}
|
||||
{{#each model.attrs as |attr|}}
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
<form {{action (perform saveModel) on="submit"}}>
|
||||
<div class="box is-sideless is-fullwidth is-marginless">
|
||||
<NamespaceReminder @mode="save" @noun="auth method" />
|
||||
<NamespaceReminder @mode="save" @noun="Auth Method" />
|
||||
{{message-error model=model}}
|
||||
{{#each model.tuneAttrs as |attr|}}
|
||||
{{form-field data-test-field attr=attr model=model}}
|
||||
|
|
|
@ -6,7 +6,7 @@
|
|||
</p>
|
||||
{{else if (eq section "crl")}}
|
||||
<h2 class="title is-5" data-test-title="true">
|
||||
Certificate Revocation List (CRL) Config
|
||||
Certificate Revocation List (CRL) config
|
||||
</h2>
|
||||
<p class="has-text-grey-dark" data-test-text="true">
|
||||
Set the duration for which the generated CRL should be marked valid.
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
{{#link-to "vault.cluster.access.namespaces.create"}}
|
||||
Create namespace
|
||||
Create Namespace
|
||||
{{/link-to}}
|
||||
|
||||
<LearnLink @path="/vault/security/namespaces">
|
||||
Learn More
|
||||
Learn more
|
||||
</LearnLink>
|
||||
|
|
|
@ -25,7 +25,7 @@
|
|||
Edit {{lowercase (humanize model.identityType)}}
|
||||
{{/link-to}}
|
||||
<LearnLink @path="/vault/identity-access-management/iam-identity">
|
||||
Learn More
|
||||
Learn more
|
||||
</LearnLink>
|
||||
</EmptyState>
|
||||
{{/each-in}}
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
data-test-cluster-status
|
||||
data-test-warning-text
|
||||
/>
|
||||
<span class="title is-5" data-test-temp-license>Temporary License</span>
|
||||
<span class="title is-5" data-test-temp-license>Temporary license</span>
|
||||
<form {{action "saveModel" text on="submit"}}>
|
||||
<div class="box is-shadowless is-fullwidth is-marginless">
|
||||
<div class="field">
|
||||
|
|
|
@ -10,15 +10,15 @@
|
|||
/>
|
||||
|
||||
{{#if (eq mountType "auth")}}
|
||||
{{concat "Enable " typeInfo.displayName " authentication method"}}
|
||||
{{concat "Enable " typeInfo.displayName " Authentication Method"}}
|
||||
{{else}}
|
||||
{{concat "Enable " typeInfo.displayName " secrets engine"}}
|
||||
{{concat "Enable " typeInfo.displayName " Secrets Engine"}}
|
||||
{{/if}}
|
||||
{{/with}}
|
||||
{{else if (eq mountType "auth")}}
|
||||
Enable an authentication method
|
||||
Enable an Authentication Method
|
||||
{{else}}
|
||||
Enable a secrets engine
|
||||
Enable a Secrets Engine
|
||||
{{/if}}
|
||||
</h1>
|
||||
</p.levelLeft>
|
||||
|
@ -27,7 +27,7 @@
|
|||
<div class="box is-sideless is-fullwidth is-marginless">
|
||||
<NamespaceReminder
|
||||
@mode="enable"
|
||||
@noun={{if (eq mountType "auth") "auth method" "secret engine"}}
|
||||
@noun={{if (eq mountType "auth") "Auth Method" "secret engine"}}
|
||||
/>
|
||||
|
||||
{{message-error model=mountModel}}
|
||||
|
|
|
@ -11,9 +11,9 @@
|
|||
<p.levelLeft>
|
||||
<h1 class="title is-3" data-test-secret-header="true">
|
||||
{{#if (eq mode "create") }}
|
||||
Create an SSH Role
|
||||
Create an SSH role
|
||||
{{else if (eq mode 'edit')}}
|
||||
Edit SSH Role
|
||||
Edit SSH role
|
||||
{{else}}
|
||||
SSH Role <code>{{model.id}}</code>
|
||||
{{/if}}
|
||||
|
@ -43,7 +43,7 @@
|
|||
class="button has-icon-right is-ghost is-compact"
|
||||
data-test-backend-credentials=true
|
||||
}}
|
||||
Generate Credentials
|
||||
Generate credentials
|
||||
{{i-con glyph="chevron-right" size=11}}
|
||||
{{/secret-link}}
|
||||
{{else}}
|
||||
|
@ -53,7 +53,7 @@
|
|||
class="button has-icon-right is-ghost is-compact"
|
||||
data-test-backend-credentials=true
|
||||
}}
|
||||
Sign Keys
|
||||
Sign keys
|
||||
{{i-con glyph="chevron-right" size=11}}
|
||||
{{/secret-link}}
|
||||
{{/if}}
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
{{#if (and (or @model.isNew @canEditV2Secret) @isV2 (not @model.isStub))}}
|
||||
<div data-test-metadata-fields class="form-section box is-shadowless is-fullwidth">
|
||||
<label class="title is-5">
|
||||
Secret Metadata
|
||||
Secret metadata
|
||||
</label>
|
||||
{{#each @model.fields as |attr|}}
|
||||
<FormField data-test-field @attr={{attr}} @model={{this.model}} />
|
||||
|
@ -13,9 +13,9 @@
|
|||
<div class="form-section">
|
||||
<label class="title is-5">
|
||||
{{#if isV2}}
|
||||
Version Data
|
||||
Version data
|
||||
{{else}}
|
||||
Secret Data
|
||||
Secret data
|
||||
{{/if}}
|
||||
</label>
|
||||
<JsonEditor
|
||||
|
@ -28,9 +28,9 @@
|
|||
<div class="form-section">
|
||||
<label class="title is-5">
|
||||
{{#if isV2}}
|
||||
Version Data
|
||||
Version data
|
||||
{{else}}
|
||||
Secret Data
|
||||
Secret data
|
||||
{{/if}}
|
||||
</label>
|
||||
{{#each @secretData as |secret index|}}
|
||||
|
|
|
@ -11,11 +11,11 @@
|
|||
<p.levelLeft>
|
||||
<h1 class="title is-3">
|
||||
{{#if (eq mode "create") }}
|
||||
Create Secret
|
||||
Create secret
|
||||
{{else if (and isV2 (eq mode 'edit'))}}
|
||||
Create New Version
|
||||
Create new version
|
||||
{{else if (eq mode 'edit')}}
|
||||
Edit Secret
|
||||
Edit secret
|
||||
{{else}}
|
||||
{{key.id}}
|
||||
{{/if}}
|
||||
|
@ -68,7 +68,7 @@
|
|||
@class={{concat "link link-plain has-text-weight-semibold" (if D.isOpen " is-active")}}
|
||||
@tagName="button"
|
||||
>
|
||||
Copy Secret
|
||||
Copy secret
|
||||
</D.trigger>
|
||||
<D.content @class="popup-menu-content is-wide">
|
||||
<nav class="box menu">
|
||||
|
@ -92,7 +92,7 @@
|
|||
data-test-wrap-button
|
||||
disabled={{isWrapping}}
|
||||
>
|
||||
Wrap Secret
|
||||
Wrap secret
|
||||
</button>
|
||||
{{else}}
|
||||
<MaskedInput
|
||||
|
@ -128,7 +128,7 @@
|
|||
class="link link-plain has-text-weight-semibold"
|
||||
data-test-secret-edit="true"
|
||||
>
|
||||
Edit Secret
|
||||
Edit secret
|
||||
</LinkTo>
|
||||
{{/if}}
|
||||
</div>
|
||||
|
@ -172,9 +172,9 @@
|
|||
<LinkTo class="link" @params={{array (query-params version=secretVersion.version)}}>
|
||||
Version {{secretVersion.version}}
|
||||
{{#if (eq secretVersion.version this.model.currentVersion)}}
|
||||
<ICon @glyph="checkmark-circled-outline" @excludeIconClass={{true}} @size="13" @class="has-text-success is-pulled-right" />
|
||||
<ICon @glyph="checkmark-circled-outline" @excludeIconClass={{true}} @size="13" @class="has-text-success is-pulled-right" />
|
||||
{{else if secretVersion.deleted}}
|
||||
<ICon @glyph="cancel-square-outline" @size="13" @excludeIconClass={{true}} @class="has-text-grey is-pulled-right" />
|
||||
<ICon @glyph="cancel-square-outline" @size="13" @excludeIconClass={{true}} @class="has-text-grey is-pulled-right" />
|
||||
{{/if}}
|
||||
</LinkTo>
|
||||
</li>
|
||||
|
|
|
@ -11,11 +11,11 @@
|
|||
<p.levelLeft>
|
||||
<h1 class="title is-3">
|
||||
{{#if (eq mode "create") }}
|
||||
Create Encryption Key
|
||||
Create encryption key
|
||||
{{else if (eq mode "edit") }}
|
||||
Edit Encryption Key
|
||||
Edit encryption key
|
||||
{{else}}
|
||||
Encryption Key <code>{{key.id}}</code>
|
||||
Encryption key <code>{{key.id}}</code>
|
||||
{{/if}}
|
||||
</h1>
|
||||
</p.levelLeft>
|
||||
|
|
|
@ -5,7 +5,7 @@
|
|||
@docPath="/docs/secrets/ad/index.html"
|
||||
>
|
||||
<p>
|
||||
The AD secrets engine rotates AD passwords dynamically, and is designed for
|
||||
The AD Secrets Engine rotates AD passwords dynamically, and is designed for
|
||||
a high-load environment where many instances may be accessing a shared password simultaneously.
|
||||
</p>
|
||||
</WizardSection>
|
||||
|
|
|
@ -5,6 +5,6 @@
|
|||
@docPath="/docs/secrets/alicloud/index.html"
|
||||
>
|
||||
<p>
|
||||
The AliCloud secrets engine dynamically generates AliCloud access tokens based on RAM policies, or AliCloud STS credentials based on RAM roles. This generally makes working with AliCloud easier, since it does not involve clicking in the web UI. The AliCloud access tokens are time-based and are automatically revoked when the Vault lease expires. STS credentials are short-lived, non-renewable, and expire on their own.
|
||||
The AliCloud Secrets Engine dynamically generates AliCloud access tokens based on RAM policies, or AliCloud STS credentials based on RAM roles. This generally makes working with AliCloud easier, since it does not involve clicking in the web UI. The AliCloud access tokens are time-based and are automatically revoked when the Vault lease expires. STS credentials are short-lived, non-renewable, and expire on their own.
|
||||
</p>
|
||||
</WizardSection>
|
||||
|
|
|
@ -5,6 +5,6 @@
|
|||
@docPath="/docs/auth/alicloud.html"
|
||||
>
|
||||
<p>
|
||||
The AliCloud auth method provides an automated mechanism to retrieve a Vault token for AliCloud entities.
|
||||
The AliCloud Auth Method provides an automated mechanism to retrieve a Vault token for AliCloud entities.
|
||||
</p>
|
||||
</WizardSection>
|
||||
|
|
|
@ -5,6 +5,6 @@
|
|||
@docPath="/docs/auth/approle.html"
|
||||
>
|
||||
<p>
|
||||
The approle auth method allows machines or apps to authenticate with Vault-defined roles. The open design of AppRole enables a varied set of workflows and configurations to handle large numbers of apps. This auth method is oriented to automated workflows (machines and services), and is less useful for human operators.
|
||||
The Approle Auth Method allows machines or apps to authenticate with Vault-defined roles. The open design of AppRole enables a varied set of workflows and configurations to handle large numbers of apps. This Auth Method is oriented to automated workflows (machines and services), and is less useful for human operators.
|
||||
</p>
|
||||
</WizardSection>
|
||||
|
|
|
@ -1,10 +1,10 @@
|
|||
<WizardSection
|
||||
@headerText="Configuring Your Auth Method"
|
||||
@headerText="Configuring your Auth Method"
|
||||
@docText="Docs: Authentication Methods"
|
||||
@docPath="/docs/auth/index.html"
|
||||
@instructions="Click the 'Save' link to save any extra configuration. Saving without filling anything in will use the defaults."
|
||||
>
|
||||
<p>
|
||||
You can update your new auth method configuration here.
|
||||
You can update your new Auth Method configuration here.
|
||||
</p>
|
||||
</WizardSection>
|
||||
</WizardSection>
|
||||
|
|
|
@ -4,7 +4,7 @@
|
|||
@docPath="/docs/auth/index.html"
|
||||
>
|
||||
<p>
|
||||
Fantastic! Now you're ready to use your new {{mountName}} auth method!
|
||||
Fantastic! Now you're ready to use your new {{mountName}} Auth Method!
|
||||
</p>
|
||||
</WizardSection>
|
||||
<WizardSection
|
||||
|
@ -12,7 +12,7 @@
|
|||
@class="wizard-details"
|
||||
>
|
||||
<button type="button" class="button next-feature-step" {{action onReset}}>
|
||||
Enable another auth method <ICon @glyph="loop" @size=13 />
|
||||
Enable another Auth Method <ICon @glyph="loop" @size=13 />
|
||||
</button>
|
||||
<button type="button" class="button next-feature-step" {{action onAdvance}}>
|
||||
{{nextFeature}} <ICon @glyph="chevron-right" @size=10 />
|
||||
|
|
|
@ -1,10 +1,10 @@
|
|||
<WizardSection
|
||||
@headerText="Editing Your Auth Method"
|
||||
@headerText="Editing your Auth Method"
|
||||
@docText="Docs: Authentication Methods"
|
||||
@docPath="/docs/auth/index.html"
|
||||
@instructions='Click the "View method" link to see its details.'
|
||||
>
|
||||
<p>
|
||||
You can update your new auth method configuration here.
|
||||
You can update your new Auth Method configuration here.
|
||||
</p>
|
||||
</WizardSection>
|
||||
|
|
|
@ -2,9 +2,9 @@
|
|||
@headerText="Enabling an Auth Method"
|
||||
@docText="Docs: Authentication Methods"
|
||||
@docPath="/docs/auth/index.html"
|
||||
@instructions='Choose an authentication method and click "Next" to get started.'
|
||||
@instructions='Choose an Authentication Method and click "Next" to get started.'
|
||||
>
|
||||
<p>
|
||||
Controlling who can see your secrets is important. Let's set up a an authentication method for you and your team to use. Don't worry, you can add more methods later.
|
||||
Controlling who can see your secrets is important. Let's set up a an Authentication Method for you and your team to use. Don't worry, you can add more methods later.
|
||||
</p>
|
||||
</WizardSection>
|
||||
|
|
|
@ -1,10 +1,10 @@
|
|||
<WizardSection
|
||||
@headerText="Auth Method List"
|
||||
@headerText="Auth Method list"
|
||||
@docText="Docs: Authentication Methods"
|
||||
@docPath="/docs/auth/index.html"
|
||||
@instructions='Click the ellipsis menu for your method and then click "View Configuration" to see its details.'
|
||||
@instructions='Click the ellipsis menu for your method and then click "View configuration" to see its details.'
|
||||
>
|
||||
<p>
|
||||
Awesome! Now you can see your new auth method in the list.
|
||||
Awesome! Now you can see your new Auth Method in the list.
|
||||
</p>
|
||||
</WizardSection>
|
||||
|
|
|
@ -5,6 +5,6 @@
|
|||
@docPath="/docs/secrets/aws/index.html"
|
||||
>
|
||||
<p>
|
||||
The AWS secrets engine generates AWS access credentials dynamically based on IAM policies. This generally makes working with AWS IAM easier, since it does not involve clicking in the web UI. Additionally, the process is codified and mapped to internal auth methods (such as LDAP). The AWS IAM credentials are time-based and are automatically revoked when the Vault lease expires.
|
||||
The AWS Secrets Engine generates AWS access credentials dynamically based on IAM policies. This generally makes working with AWS IAM easier, since it does not involve clicking in the web UI. Additionally, the process is codified and mapped to internal Auth Methods (such as LDAP). The AWS IAM credentials are time-based and are automatically revoked when the Vault lease expires.
|
||||
</p>
|
||||
</WizardSection>
|
||||
|
|
|
@ -5,6 +5,6 @@
|
|||
@docPath="/docs/auth/aws.html"
|
||||
>
|
||||
<p>
|
||||
The AWS auth method provides an automated mechanism to retrieve a Vault token for AWS EC2 instances and IAM principals. Unlike most Vault auth methods, this method does not require manual first-deploying, or provisioning security-sensitive credentials (tokens, username/password, client certificates, etc), by operators under many circumstances.
|
||||
The AWS Auth Method provides an automated mechanism to retrieve a Vault token for AWS EC2 instances and IAM principals. Unlike most Vault Auth Methods, this method does not require manual first-deploying, or provisioning security-sensitive credentials (tokens, username/password, client certificates, etc), by operators under many circumstances.
|
||||
</p>
|
||||
</WizardSection>
|
||||
|
|
|
@ -5,6 +5,6 @@
|
|||
@docPath="/docs/secrets/azure/index.html"
|
||||
>
|
||||
<p>
|
||||
The Azure secrets engine dynamically generates Azure service principals and role assignments. Vault roles can be mapped to one or more Azure roles, providing a simple, flexible way to manage the permissions granted to generated service principals.
|
||||
The Azure Secrets Engine dynamically generates Azure service principals and role assignments. Vault roles can be mapped to one or more Azure roles, providing a simple, flexible way to manage the permissions granted to generated service principals.
|
||||
</p>
|
||||
</WizardSection>
|
||||
|
|
|
@ -5,6 +5,6 @@
|
|||
@docPath="/docs/auth/azure.html"
|
||||
>
|
||||
<p>
|
||||
The Azure auth method allows authentication against Vault using Azure Active Directory credentials.
|
||||
The Azure Auth Method allows authentication against Vault using Azure Active Directory credentials.
|
||||
</p>
|
||||
</WizardSection>
|
||||
|
|
|
@ -5,6 +5,6 @@
|
|||
@docPath="/docs/auth/cert.html"
|
||||
>
|
||||
<p>
|
||||
The TLS Certificates auth method allows authentication using SSL/TLS client certificates which are either signed by a CA or self-signed. CA certificates are associated with a role.
|
||||
The TLS Certificates Auth Method allows authentication using SSL/TLS client certificates which are either signed by a CA or self-signed. CA certificates are associated with a role.
|
||||
</p>
|
||||
</WizardSection>
|
||||
|
|
|
@ -4,6 +4,6 @@
|
|||
@docPath="/docs/secrets/cubbyhole/index.html"
|
||||
>
|
||||
<p>
|
||||
The cubbyhole secrets engine is used to store arbitrary secrets within the configured physical storage for Vault namespaced to a token. In cubbyhole, paths are scoped per token. No token can access another token's cubbyhole. When the token expires, its cubbyhole is destroyed.
|
||||
The cubbyhole Secrets Engine is used to store arbitrary secrets within the configured physical storage for Vault namespaced to a token. In cubbyhole, paths are scoped per token. No token can access another token's cubbyhole. When the token expires, its cubbyhole is destroyed.
|
||||
</p>
|
||||
</WizardSection>
|
|
@ -5,6 +5,6 @@
|
|||
@docPath="/docs/secrets/consul/index.html"
|
||||
>
|
||||
<p>
|
||||
The Consul secrets engine generates Consul API tokens dynamically based on Consul ACL policies.
|
||||
The Consul Secrets Engine generates Consul API tokens dynamically based on Consul ACL policies.
|
||||
</p>
|
||||
</WizardSection>
|
||||
|
|
|
@ -5,6 +5,6 @@
|
|||
@docPath="/docs/secrets/databases/index.html"
|
||||
>
|
||||
<p>
|
||||
The database secrets engine generates database credentials dynamically based on configured roles.
|
||||
The database Secrets Engine generates database credentials dynamically based on configured roles.
|
||||
</p>
|
||||
</WizardSection>
|
||||
|
|
|
@ -5,6 +5,6 @@
|
|||
@docPath="/docs/secrets/gcp/index.html"
|
||||
>
|
||||
<p>
|
||||
The Google Cloud Vault secrets engine dynamically generates Google Cloud service account keys and OAuth tokens based on IAM policies. This enables users to gain access to Google Cloud resources without needing to create or manage a dedicated service account.
|
||||
The Google Cloud Vault Secrets Engine dynamically generates Google Cloud service account keys and OAuth tokens based on IAM policies. This enables users to gain access to Google Cloud resources without needing to create or manage a dedicated service account.
|
||||
</p>
|
||||
</WizardSection>
|
||||
|
|
|
@ -5,6 +5,6 @@
|
|||
@docPath="/docs/auth/gcp.html"
|
||||
>
|
||||
<p>
|
||||
The GCP auth method allows authentication against Vault using Google credentials.
|
||||
The GCP Auth Method allows authentication against Vault using Google credentials.
|
||||
</p>
|
||||
</WizardSection>
|
||||
|
|
|
@ -5,6 +5,6 @@
|
|||
@docPath="/docs/secrets/gcpkms/index.html"
|
||||
>
|
||||
<p>
|
||||
The Google Cloud KMS Vault secrets engine provides encryption and key management via Google Cloud KMS. It supports management of keys, including creation, rotation, and revocation, as well as encrypting and decrypting data with managed keys. This enables management of KMS keys through Vault's policies and IAM system.
|
||||
The Google Cloud KMS Vault Secrets Engine provides encryption and key management via Google Cloud KMS. It supports management of keys, including creation, rotation, and revocation, as well as encrypting and decrypting data with managed keys. This enables management of KMS keys through Vault's policies and IAM system.
|
||||
</p>
|
||||
</WizardSection>
|
||||
|
|
|
@ -5,6 +5,6 @@
|
|||
@docPath="/docs/auth/github.html"
|
||||
>
|
||||
<p>
|
||||
The Github auth method can be used to authenticate with Vault using a GitHub personal access token.
|
||||
The Github Auth Method can be used to authenticate with Vault using a GitHub personal access token.
|
||||
</p>
|
||||
</WizardSection>
|
||||
|
|
|
@ -5,6 +5,6 @@
|
|||
@docPath="/docs/auth/kubernetes.html"
|
||||
>
|
||||
<p>
|
||||
The Kubernetes auth method can be used to authenticate with Vault using a Kubernetes Service Account Token. This method of authentication makes it easy to introduce a Vault token into a Kubernetes Pod.
|
||||
The Kubernetes Auth Method can be used to authenticate with Vault using a Kubernetes Service Account Token. This method of authentication makes it easy to introduce a Vault token into a Kubernetes Pod.
|
||||
</p>
|
||||
</WizardSection>
|
||||
|
|
|
@ -5,6 +5,6 @@
|
|||
@docPath="/docs/secrets/kv/index.html"
|
||||
>
|
||||
<p>
|
||||
The kv secrets engine is used to store arbitrary secrets within the configured physical storage for Vault. This backend can be run in one of two modes. It can be a generic Key-Value store that stores one value for a key. Versioning can be enabled and a configurable number of versions for each key will be stored.
|
||||
The KV Secrets Engine is used to store arbitrary secrets within the configured physical storage for Vault. This backend can be run in one of two modes. It can be a generic Key-Value store that stores one value for a key. Versioning can be enabled and a configurable number of versions for each key will be stored.
|
||||
</p>
|
||||
</WizardSection>
|
||||
|
|
|
@ -5,6 +5,6 @@
|
|||
@docPath="/docs/auth/ldap.html"
|
||||
>
|
||||
<p>
|
||||
The LDAP auth method allows authentication using an existing LDAP server and user/password credentials. This allows Vault to be integrated into environments using LDAP without duplicating the user/pass configuration in multiple places.
|
||||
The LDAP Auth Method allows authentication using an existing LDAP server and user/password credentials. This allows Vault to be integrated into environments using LDAP without duplicating the user/pass configuration in multiple places.
|
||||
</p>
|
||||
</WizardSection>
|
||||
|
|
|
@ -5,6 +5,6 @@
|
|||
@docPath="/docs/auth/okta.html"
|
||||
>
|
||||
<p>
|
||||
The Okta auth method allows authentication using Okta and user/password credentials. This allows Vault to be integrated into environments using Okta.
|
||||
The Okta Auth Method allows authentication using Okta and user/password credentials. This allows Vault to be integrated into environments using Okta.
|
||||
</p>
|
||||
</WizardSection>
|
||||
|
|
|
@ -5,6 +5,6 @@
|
|||
@docPath="/docs/secrets/pki/index.html"
|
||||
>
|
||||
<p>
|
||||
The PKI secrets engine generates dynamic X.509 certificates. With this secrets engine, services can get certificates without going through the usual manual process of generating a private key and CSR, submitting to a CA, and waiting for a verification and signing process to complete.
|
||||
The PKI Secrets Engine generates dynamic X.509 certificates. With this Secrets Engine, services can get certificates without going through the usual manual process of generating a private key and CSR, submitting to a CA, and waiting for a verification and signing process to complete.
|
||||
</p>
|
||||
</WizardSection>
|
||||
|
|
|
@ -5,6 +5,6 @@
|
|||
@docPath="/docs/secrets/rabbitmq/index.html"
|
||||
>
|
||||
<p>
|
||||
The RabbitMQ secrets engine generates user credentials dynamically based on configured permissions and virtual hosts. This means that services that need to access a virtual host no longer need to hardcode credentials.
|
||||
The RabbitMQ Secrets Engine generates user credentials dynamically based on configured permissions and virtual hosts. This means that services that need to access a virtual host no longer need to hardcode credentials.
|
||||
</p>
|
||||
</WizardSection>
|
||||
|
|
|
@ -5,6 +5,6 @@
|
|||
@docPath="/docs/auth/radius.html"
|
||||
>
|
||||
<p>
|
||||
The RADIUS auth method allows users to authenticate with Vault using an existing RADIUS server that accepts the PAP authentication scheme.
|
||||
The RADIUS Auth Method allows users to authenticate with Vault using an existing RADIUS server that accepts the PAP authentication scheme.
|
||||
</p>
|
||||
</WizardSection>
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
<WizardSection
|
||||
@headerText="Your New Role"
|
||||
@headerText="Your new role"
|
||||
>
|
||||
<p>
|
||||
With our new role, we can generate a credential that has the same permissions as that role. Click on "Generate Credentials" links at the top of the page.
|
||||
|
|
|
@ -1,27 +1,27 @@
|
|||
{{#if isSupported}}
|
||||
<WizardSection
|
||||
<WizardSection
|
||||
@headerText={{unless actionText "All set!" "Generate Credential"}}
|
||||
>
|
||||
<p>
|
||||
{{#if actionText}}
|
||||
Here is your generated credential. As you can see, we can only show the credential once, so you'll want to be sure to save it. If you need another credential in the future, just come back and generate a new one.
|
||||
{{else}}
|
||||
Well done!
|
||||
Well done!
|
||||
{{/if}}
|
||||
You're now ready to start using your new {{mountName}} secrets engine.
|
||||
You're now ready to start using your new {{mountName}} Secrets Engine.
|
||||
</p>
|
||||
</WizardSection>
|
||||
{{else}}
|
||||
<WizardSection
|
||||
<WizardSection
|
||||
@headerText="Viewing engine configuration"
|
||||
>
|
||||
<p>
|
||||
Here you can see all the details of your new engine. This can be useful to get information for things like TTL or Seal Wrap settings.
|
||||
</p>
|
||||
</WizardSection>
|
||||
</WizardSection>
|
||||
{{/if}}
|
||||
<WizardSection
|
||||
@headerText="Want to start again or move on?"
|
||||
<WizardSection
|
||||
@headerText="Want to start again or move on?"
|
||||
@class="wizard-details"
|
||||
>
|
||||
{{#if isSupported}}
|
||||
|
@ -30,9 +30,9 @@
|
|||
</button>
|
||||
{{/if}}
|
||||
<button type="button" class="button next-feature-step" {{action onReset}}>
|
||||
Enable another secrets engine <ICon @glyph="loop" @size=13 />
|
||||
Enable another Secrets Engine <ICon @glyph="loop" @size=13 />
|
||||
</button>
|
||||
<button type="button" class="button next-feature-step" {{action onDone}}>
|
||||
{{nextFeature}} <ICon @glyph="chevron-right" @size=10 />
|
||||
</button>
|
||||
</WizardSection>
|
||||
</WizardSection>
|
||||
|
|
|
@ -5,6 +5,6 @@
|
|||
@instructions='Select an engine and click "Next"'
|
||||
>
|
||||
<p>
|
||||
Vault is all about managing secrets, so let's set up your first secrets engine. You can use a static engine to store your secrets locally in Vault, or connect to a cloud backend with one of the dynamic engines.
|
||||
Vault is all about managing secrets, so let's set up your first Secrets Engine. You can use a static engine to store your secrets locally in Vault, or connect to a cloud backend with one of the dynamic engines.
|
||||
</p>
|
||||
</WizardSection>
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
<WizardSection
|
||||
@headerText="Viewing engine configuration"
|
||||
@instructions='Find the engine in the list and click on "View Configuration" in the menu on the right.'
|
||||
@instructions='Find the engine in the list and click on "View configuration" in the menu on the right.'
|
||||
>
|
||||
<p>
|
||||
This engine isn't fully supported in the Vault UI yet, but you can view and edit the configuration and use the Vault Browser CLI to interact with the engine just like you would on the command-line.
|
||||
|
|
|
@ -5,6 +5,6 @@
|
|||
@docPath="/docs/secrets/ssh/index.html"
|
||||
>
|
||||
<p>
|
||||
The Vault SSH secrets engine provides secure authentication and authorization for access to machines via the SSH protocol. The Vault SSH secrets engine helps manage access to machine infrastructure, providing several ways to issue SSH credentials.
|
||||
The Vault SSH Secrets Engine provides secure authentication and authorization for access to machines via the SSH protocol. The Vault SSH Secrets Engine helps manage access to machine infrastructure, providing several ways to issue SSH credentials.
|
||||
</p>
|
||||
</WizardSection>
|
||||
|
|
|
@ -5,6 +5,6 @@
|
|||
@docPath="/docs/secrets/totp/index.html"
|
||||
>
|
||||
<p>
|
||||
The TOTP secrets engine generates time-based credentials according to the TOTP standard.
|
||||
The TOTP Secrets Engine generates time-based credentials according to the TOTP standard.
|
||||
</p>
|
||||
</WizardSection>
|
||||
|
|
|
@ -5,6 +5,6 @@
|
|||
@docPath="/docs/secrets/transit/index.html"
|
||||
>
|
||||
<p>
|
||||
The transit secrets engine handles cryptographic functions on data in-transit. Vault doesn't store the data sent to the secrets engine. It can also be viewed as "cryptography as a service" or "encryption as a service".
|
||||
The Transit Secrets Engine handles cryptographic functions on data in-transit. Vault doesn't store the data sent to the Secrets Engine. It can also be viewed as "cryptography as a service" or "encryption as a service".
|
||||
</p>
|
||||
</WizardSection>
|
||||
|
|
|
@ -5,6 +5,6 @@
|
|||
@docPath="/docs/auth/userpass.html"
|
||||
>
|
||||
<p>
|
||||
The Username & Password auth method allows users to authenticate with Vault using a username and password combination.
|
||||
The Username & Password Auth Method allows users to authenticate with Vault using a username and password combination.
|
||||
</p>
|
||||
</WizardSection>
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
<div class="field">
|
||||
<label for="token" class="is-label">GitHub Token</label>
|
||||
<label for="token" class="is-label">GitHub token</label>
|
||||
<div class="control">
|
||||
{{input
|
||||
type="password"
|
||||
|
|
|
@ -19,7 +19,7 @@
|
|||
</div>
|
||||
<div class="level-item level-left">
|
||||
<div>
|
||||
<h4 class="label">Max TTL</h4>
|
||||
<h4 class="label">Maximum TTL</h4>
|
||||
<span data-test-secret-backend-details="max-ttl">
|
||||
{{backend.config.max_lease_ttl}}
|
||||
</span>
|
||||
|
|
|
@ -1,9 +1,9 @@
|
|||
<h4 class="title is-5 is-marginless">
|
||||
Disable replication
|
||||
Disable Replication
|
||||
</h4>
|
||||
<div class="content">
|
||||
<p>
|
||||
Disable {{replicationDisplayMode}} replication entirely on the cluster.
|
||||
Disable {{replicationDisplayMode}} Replication entirely on the cluster.
|
||||
{{#if model.replicationAttrs.isPrimary}}
|
||||
Any secondaries will no longer be able to connect.
|
||||
{{else if (eq model.replicationAttrs.modeForUrl 'bootstrapping')}}
|
||||
|
@ -55,12 +55,12 @@
|
|||
)
|
||||
)
|
||||
buttonClasses="button is-primary"
|
||||
confirmMessage=(concat "Are you sure you want to disable replication on this cluster?")
|
||||
confirmMessage=(concat "Are you sure you want to disable Replication on this cluster?")
|
||||
confirmButtonText="Disable"
|
||||
cancelButtonText="Cancel"
|
||||
data-test-disable-replication=true
|
||||
}}
|
||||
Disable replication
|
||||
Disable Replication
|
||||
{{/confirm-action}}
|
||||
</div>
|
||||
</div>
|
||||
|
|
|
@ -59,7 +59,7 @@
|
|||
{{else}}
|
||||
<p class="has-text-grey-dark box is-shadowless is-fullwidth has-slim-padding">
|
||||
<label for="replication-mode" class="is-label is-block">
|
||||
Type of Replication
|
||||
Type of replication
|
||||
</label>
|
||||
In both Performance and Disaster Recovery (DR) Replication, secondaries share the underlying configuration, policies, and supporting secrets as their primary cluster.
|
||||
</p>
|
||||
|
@ -102,7 +102,7 @@
|
|||
</p>
|
||||
{{else}}
|
||||
<p class="help has-text-grey-dark">
|
||||
Performance replication scales workloads horizontally across clusters to make requests faster. Local secondaries handle read requests but forward writes to the primary to be handled.
|
||||
Performance Replication scales workloads horizontally across clusters to make requests faster. Local secondaries handle read requests but forward writes to the primary to be handled.
|
||||
</p>
|
||||
{{/if}}
|
||||
</div>
|
||||
|
@ -163,7 +163,7 @@
|
|||
</div>
|
||||
{{else}}
|
||||
<p>
|
||||
The token you are using is not authorized to enable primary replication.
|
||||
The token you are using is not authorized to enable primary replication.
|
||||
</p>
|
||||
{{/if}}
|
||||
{{else}}
|
||||
|
@ -185,7 +185,7 @@
|
|||
{{#if showExplanation}}
|
||||
<p>
|
||||
When running as a DR secondary Vault is read only.
|
||||
For this reason, we don't allow other replication modes to operate at the same time. This cluster is also
|
||||
For this reason, we don't allow other Replication modes to operate at the same time. This cluster is also
|
||||
currently operating as a Performance {{capitalize cluster.performance.modeForUrl}}.
|
||||
</p>
|
||||
{{/if}}
|
||||
|
@ -250,7 +250,7 @@
|
|||
<div class="field is-grouped box is-fullwidth is-bottomless">
|
||||
<div class="control">
|
||||
<button type="submit" class="button is-primary" disabled={{disallowEnable}} data-test-replication-enable=true>
|
||||
Enable replication
|
||||
Enable Replication
|
||||
</button>
|
||||
</div>
|
||||
</div>
|
||||
|
|
|
@ -16,7 +16,7 @@
|
|||
@class="is-block"
|
||||
@toggleAttr="showOptions"
|
||||
@toggleTarget={{this}}
|
||||
@openLabel="Hide Options"
|
||||
@openLabel="Hide options"
|
||||
@closedLabel="Options"
|
||||
/>
|
||||
{{#if showOptions}}
|
||||
|
@ -77,7 +77,7 @@
|
|||
<p>Promote the cluster to primary.
|
||||
<AlertInline
|
||||
@type="warning"
|
||||
@message="Vault replication is not designed for active-active usage and enabling two primaries should never be done, as it can lead to data loss if they or their secondaries are ever reconnected.
|
||||
@message="Vault Replication is not designed for active-active usage and enabling two primaries should never be done, as it can lead to data loss if they or their secondaries are ever reconnected.
|
||||
If the cluster has a primary, be sure to demote it before promoting a secondary."
|
||||
/>
|
||||
</p>
|
||||
|
|
|
@ -19,11 +19,11 @@
|
|||
</code>
|
||||
</small>
|
||||
{{else if (and (eq mode 'performance') (not version.hasPerfReplication))}}
|
||||
Learn More
|
||||
Learn more
|
||||
{{else if auth.currentToken}}
|
||||
Enable {{if (eq mode 'performance') 'Performance' 'DR'}}
|
||||
{{else}}
|
||||
Not Enabled
|
||||
Not enabled
|
||||
{{/if}}
|
||||
</div>
|
||||
<div class="level-right">
|
||||
|
|
|
@ -34,7 +34,7 @@
|
|||
{{#if (eq mode 'dr')}}
|
||||
DR is designed to protect against catastrophic failure of entire clusters. Secondaries do not forward service requests (until they are elected and become a new primary).
|
||||
{{else}}
|
||||
Performance replication scales workloads horizontally across clusters to make requests faster. Local secondaries handle read requests but forward writes to the primary to be handled.
|
||||
Performance Replication scales workloads horizontally across clusters to make requests faster. Local secondaries handle read requests but forward writes to the primary to be handled.
|
||||
{{/if}}
|
||||
</p>
|
||||
{{/if}}
|
||||
|
|
|
@ -6,7 +6,7 @@
|
|||
</p>
|
||||
<div class="field">
|
||||
<label for="dr_operation_token" class="is-label">
|
||||
DR Operation Token
|
||||
DR Operation token
|
||||
</label>
|
||||
<div class="control">
|
||||
{{input class="input" id="dr_operation_token" name="dr_operation_token" value=dr_operation_token}}
|
||||
|
@ -24,7 +24,7 @@
|
|||
@class="is-block"
|
||||
@toggleAttr="showOptions"
|
||||
@toggleTarget={{this}}
|
||||
@openLabel="Hide Options"
|
||||
@openLabel="Hide options"
|
||||
@closedLabel="Options"
|
||||
/>
|
||||
{{#if showOptions}}
|
||||
|
|
|
@ -9,7 +9,7 @@
|
|||
{{#each model.fields as |attr|}}
|
||||
{{#if (eq attr.name "policyDocument")}}
|
||||
{{#info-table-row label=(capitalize (or attr.options.label (humanize (dasherize attr.name)))) value=model.policyDocument}}
|
||||
<pre><code class="is-paddingless">{{stringify (jsonify model.policyDocument)}}</code></pre>
|
||||
<pre><code class="is-paddingless">{{stringify (jsonify model.policyDocument)}}</code></pre>
|
||||
{{/info-table-row}}
|
||||
{{else}}
|
||||
{{info-table-row label=(capitalize (or attr.options.label (humanize (dasherize attr.name)))) value=(get model attr.name)}}
|
||||
|
|
|
@ -13,14 +13,14 @@
|
|||
{{#if item.canGenerate}}
|
||||
<li class="action">
|
||||
{{#link-to "vault.cluster.secrets.backend.credentials" item.id (query-params action="issue") data-test-role-pki-link="generate-certificate"}}
|
||||
Generate Certificate
|
||||
Generate certificate
|
||||
{{/link-to}}
|
||||
</li>
|
||||
{{/if}}
|
||||
{{#if item.canSign}}
|
||||
<li class="action">
|
||||
{{#link-to "vault.cluster.secrets.backend.credentials" item.id (query-params action="sign") data-test-role-pki-link="sign-certificate"}}
|
||||
Sign Certificate
|
||||
Sign certificate
|
||||
{{/link-to}}
|
||||
</li>
|
||||
{{/if}}
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
<ul>
|
||||
{{#link-to "vault.cluster.settings.configure-secret-backend" model.id (query-params tab='') tagName="li"}}
|
||||
{{#link-to "vault.cluster.settings.configure-secret-backend" model.id (query-params tab='') data-test-aws-link="root-creds"}}
|
||||
Dynamic IAM Root Credentials
|
||||
Dynamic IAM root credentials
|
||||
{{/link-to}}
|
||||
{{/link-to}}
|
||||
|
||||
|
@ -49,7 +49,7 @@
|
|||
|
||||
<div class="field">
|
||||
<label for="access" class="is-label">
|
||||
Access Key
|
||||
Access key
|
||||
</label>
|
||||
<div class="control">
|
||||
{{input type="text" id="access" name="access" class="input" autocomplete="off" value=accessKey data-test-aws-input="accessKey"}}
|
||||
|
@ -58,7 +58,7 @@
|
|||
|
||||
<div class="field">
|
||||
<label for="secret" class="is-label">
|
||||
Secret Key
|
||||
Secret key
|
||||
</label>
|
||||
<div class="control">
|
||||
{{input type="password" id="secret" name="secret" class="input" value=secretKey data-test-aws-input="secretKey"}}
|
||||
|
@ -95,7 +95,7 @@
|
|||
</div>
|
||||
<div class="field">
|
||||
<label for="iam" class="is-label">
|
||||
IAM Endpoint
|
||||
IAM endpoint
|
||||
</label>
|
||||
<div class="control">
|
||||
{{input type="text" id="iam" name="iam" class="input" value=iamEndpoint}}
|
||||
|
@ -103,7 +103,7 @@
|
|||
</div>
|
||||
<div class="field">
|
||||
<label for="sts" class="is-label">
|
||||
STS Endpoint
|
||||
STS endpoint
|
||||
</label>
|
||||
<div class="control">
|
||||
{{input type="text" id="sts" name="sts" class="input" value=stsEndpoint}}
|
||||
|
|
|
@ -5,7 +5,7 @@
|
|||
{{#link-to 'vault.cluster.settings.configure-secret-backend.section' section tagName="li" activeClass="is-active"}}
|
||||
{{#link-to 'vault.cluster.settings.configure-secret-backend.section' section}}
|
||||
{{#if (eq section 'cert')}}
|
||||
CA Certificate
|
||||
CA certificate
|
||||
{{else if (eq section 'urls')}}
|
||||
URLs
|
||||
{{else if (eq section 'crl')}}
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
<div class="box is-fullwidth is-sideless is-marginless">
|
||||
<div class="field">
|
||||
<label for="publicKey" class="is-label">
|
||||
Public Key
|
||||
Public key
|
||||
</label>
|
||||
<div class="control">
|
||||
{{textarea
|
||||
|
@ -44,7 +44,7 @@
|
|||
<NamespaceReminder @mode="save" @noun="configuration" />
|
||||
<div class="field">
|
||||
<label for="privateKey" class="is-label">
|
||||
Private Key
|
||||
Private key
|
||||
</label>
|
||||
<div class="control">
|
||||
{{textarea name="privateKey" id="privateKey" class="input" value=model.privateKey}}
|
||||
|
@ -52,7 +52,7 @@
|
|||
</div>
|
||||
<div class="field">
|
||||
<label for="publicKey" class="is-label">
|
||||
Public Key
|
||||
Public key
|
||||
</label>
|
||||
<div class="control">
|
||||
{{textarea name="publicKey" id="publicKey" class="input" value=model.publicKey}}
|
||||
|
@ -67,7 +67,7 @@
|
|||
data-test-ssh-input={{generateSigningKey}}
|
||||
/>
|
||||
<label for="generateSigningKey" class="is-label">
|
||||
Generate Signing Key
|
||||
Generate signing key
|
||||
{{#info-tooltip}}
|
||||
Specifies if Vault should generate the signing key pair internally
|
||||
{{/info-tooltip}}
|
||||
|
|
|
@ -4,7 +4,7 @@
|
|||
@message="A version that has been permanently deleted cannot be restored. You can see other versions of this secret in the History menu."
|
||||
>
|
||||
<DocLink @path="/docs/secrets/kv/kv-v2.html">
|
||||
Learn More
|
||||
Learn more
|
||||
</DocLink>
|
||||
</EmptyState>
|
||||
{{else if (and isV2 modelForData.deleted)}}
|
||||
|
@ -14,7 +14,7 @@
|
|||
You can also see other versions of this secret in the History menu."
|
||||
>
|
||||
<DocLink @path="/docs/secrets/kv/kv-v2.html">
|
||||
Learn More
|
||||
Learn more
|
||||
</DocLink>
|
||||
</EmptyState>
|
||||
{{else}}
|
||||
|
|
|
@ -73,7 +73,7 @@
|
|||
@class="has-text-black has-text-weight-semibold"
|
||||
>
|
||||
{{if backendModel.isV2KV
|
||||
"Create New Version"
|
||||
"Create new version"
|
||||
"Edit"
|
||||
}}
|
||||
</SecretLink>
|
||||
|
@ -93,7 +93,7 @@
|
|||
data-test-v2-kv-delete=item.id
|
||||
}}
|
||||
{{if backendModel.isV2KV
|
||||
"Permanently Delete"
|
||||
"Permanently delete"
|
||||
"Delete"
|
||||
}}
|
||||
{{/confirm-action}}
|
||||
|
|
|
@ -48,7 +48,7 @@
|
|||
<li>
|
||||
{{#link-to "vault.cluster.replication"}}
|
||||
<div class="level is-mobile">
|
||||
<span class="level-left">Learn More</span>
|
||||
<span class="level-left">Learn more</span>
|
||||
<ICon @glyph="edition-enterprise" @size="16" @class="level-right" />
|
||||
</div>
|
||||
{{/link-to}}
|
||||
|
@ -80,7 +80,7 @@
|
|||
<li class="action">
|
||||
{{#link-to "vault.cluster.license" activeCluster.name invokeAction=onLinkClick}}
|
||||
<div class="level is-mobile">
|
||||
<span class="level-left">See Details</span>
|
||||
<span class="level-left">See details</span>
|
||||
<ICon @glyph="chevron-right" @size="12" @class="has-text-grey-light level-right" />
|
||||
</div>
|
||||
{{/link-to}}
|
||||
|
@ -92,7 +92,7 @@
|
|||
{{/unless}}
|
||||
<nav class="menu">
|
||||
<div class="menu-label">
|
||||
Seal Status
|
||||
Seal status
|
||||
</div>
|
||||
<ul class="menu-list">
|
||||
<li class="action">
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
<PageHeader as |p|>
|
||||
<p.levelLeft>
|
||||
<h1 class="title is-3">
|
||||
Hash Data
|
||||
Hash data
|
||||
</h1>
|
||||
</p.levelLeft>
|
||||
</PageHeader>
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
<PageHeader as |p|>
|
||||
<p.levelLeft>
|
||||
<h1 class="title is-3">
|
||||
Lookup Token
|
||||
Lookup token
|
||||
</h1>
|
||||
</p.levelLeft>
|
||||
</PageHeader>
|
||||
|
@ -43,7 +43,7 @@
|
|||
<div class="field is-grouped box is-fullwidth is-bottomless">
|
||||
<div class="control">
|
||||
<button type="submit" data-test-tools-submit="true" class="button is-primary">
|
||||
Lookup Token
|
||||
Lookup token
|
||||
</button>
|
||||
</div>
|
||||
</div>
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
<PageHeader as |p|>
|
||||
<p.levelLeft>
|
||||
<h1 class="title is-3">
|
||||
Random Bytes
|
||||
Random bytes
|
||||
</h1>
|
||||
</p.levelLeft>
|
||||
</PageHeader>
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
<PageHeader as |p|>
|
||||
<p.levelLeft>
|
||||
<h1 class="title is-3">
|
||||
Rewrap Token
|
||||
Rewrap token
|
||||
</h1>
|
||||
</p.levelLeft>
|
||||
</PageHeader>
|
||||
|
@ -59,7 +59,7 @@
|
|||
<div class="field is-grouped box is-fullwidth is-bottomless">
|
||||
<div class="control">
|
||||
<button type="submit" data-test-tools-submit="true" class="button is-primary">
|
||||
Rewrap Token
|
||||
Rewrap token
|
||||
</button>
|
||||
</div>
|
||||
</div>
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
<PageHeader as |p|>
|
||||
<p.levelLeft>
|
||||
<h1 class="title is-3">
|
||||
Unwrap Data
|
||||
Unwrap data
|
||||
</h1>
|
||||
</p.levelLeft>
|
||||
</PageHeader>
|
||||
|
@ -84,7 +84,7 @@
|
|||
<div class="field is-grouped box is-fullwidth is-bottomless">
|
||||
<div class="control">
|
||||
<button type="submit" data-test-tools-submit="true" class="button is-primary">
|
||||
Unwrap Data
|
||||
Unwrap data
|
||||
</button>
|
||||
</div>
|
||||
</div>
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
<PageHeader as |p|>
|
||||
<p.levelLeft>
|
||||
<h1 class="title is-3">
|
||||
Wrap Data
|
||||
Wrap data
|
||||
</h1>
|
||||
</p.levelLeft>
|
||||
</PageHeader>
|
||||
|
@ -57,7 +57,7 @@
|
|||
<div class="field is-grouped box is-fullwidth is-bottomless">
|
||||
<div class="control">
|
||||
<button type="submit" class="button is-primary" data-test-tools-submit="true" disabled={{buttonDisabled}}>
|
||||
Wrap Data
|
||||
Wrap data
|
||||
</button>
|
||||
</div>
|
||||
</div>
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
<div class="modal-content">
|
||||
<h2 class="title upgrade-overlay-title is-2 has-text-white">
|
||||
<ICon @glyph="edition-enterprise" aria-hidden="true" @size=32 />
|
||||
Try Vault Enterprise Free for 30 Days
|
||||
Try Vault Enterprise free for 30 days
|
||||
</h2>
|
||||
<h3 class="title is-5 has-text-white">
|
||||
Collaborate on secrets management and access
|
||||
|
@ -64,7 +64,7 @@
|
|||
</div>
|
||||
<p class="has-text-centered">
|
||||
<a href="https://hashicorp.com/products/vault/trial?source={{trackingSource}}" class="button is-primary has-icon-right" target="_blank" rel="noreferrer noopener">
|
||||
Start Trial
|
||||
Start trial
|
||||
{{i-con glyph="chevron-right"}}
|
||||
</a>
|
||||
</p>
|
||||
|
|
|
@ -28,7 +28,7 @@
|
|||
{{#if (eq env "development") }}
|
||||
<div class="env-banner level development">
|
||||
<div class="level-item notification has-background-dark has-text-white">
|
||||
{{i-con glyph="wand" class="type-icon"}}Local Development
|
||||
{{i-con glyph="wand" class="type-icon"}}Local development
|
||||
</div>
|
||||
</div>
|
||||
{{/if}}
|
||||
|
|
|
@ -17,7 +17,7 @@
|
|||
<form {{action (nav-to-route 'vault.cluster.access.control-group-accessor' model.id) on="submit"}}>
|
||||
<div class="box is-sideless is-fullwidth is-marginless">
|
||||
<p class="has-text-grey is-size-8">
|
||||
Control Groups add additional authorization factors to be required before satisfying a request. If you have a control group accessor, provide it here to view the lookup the authorization progress.
|
||||
Control Groups add additional authorization factors to be required before satisfying a request. If you have a Control Group accessor, provide it here to view the lookup the authorization progress.
|
||||
</p>
|
||||
<label for="accessor" class="is-label">
|
||||
Accessor
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
<PageHeader as |p|>
|
||||
<p.levelLeft>
|
||||
<h1 class="title is-3">
|
||||
Add {{lowercase (humanize model.identityType)}} for {{model.canonicalId}}
|
||||
Create {{lowercase (humanize model.identityType)}} for {{model.canonicalId}}
|
||||
</h1>
|
||||
</p.levelLeft>
|
||||
</PageHeader>
|
||||
|
|
|
@ -51,7 +51,7 @@
|
|||
Create {{identityType}}
|
||||
{{/link-to}}
|
||||
<LearnLink @path="/vault/identity-access-management/iam-identity">
|
||||
Learn More
|
||||
Learn more
|
||||
</LearnLink>
|
||||
</EmptyState>
|
||||
{{/if}}
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
<PageHeader as |p|>
|
||||
<p.levelLeft>
|
||||
<h1 class="title is-3">
|
||||
Add {{model.identityType}}
|
||||
Create {{model.identityType}}
|
||||
</h1>
|
||||
</p.levelLeft>
|
||||
</PageHeader>
|
||||
|
|
|
@ -122,7 +122,7 @@
|
|||
Create {{identityType}}
|
||||
{{/link-to}}
|
||||
<LearnLink @path="/vault/identity-access-management/iam-identity">
|
||||
Learn More
|
||||
Learn more
|
||||
</LearnLink>
|
||||
</EmptyState>
|
||||
{{/if}}
|
||||
|
|
|
@ -19,7 +19,7 @@
|
|||
<p.levelRight>
|
||||
{{#unless (or (and (eq model.identityType "group") (eq model.type "internal")) model.alias)}}
|
||||
{{#link-to "vault.cluster.access.identity.aliases.add" (pluralize model.identityType) model.id class="button has-icon-right is-ghost is-compact" data-test-entity-create-link=true}}
|
||||
Add alias
|
||||
Create alias
|
||||
{{i-con glyph="chevron-right" size=11}}
|
||||
{{/link-to}}
|
||||
{{/unless}}
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
<PageHeader as |p|>
|
||||
<p.levelLeft>
|
||||
<h1 class="title is-3">
|
||||
Lookup a Lease
|
||||
Lookup a lease
|
||||
</h1>
|
||||
</p.levelLeft>
|
||||
</PageHeader>
|
||||
|
|
|
@ -54,13 +54,13 @@
|
|||
<ul class="menu-list">
|
||||
<li>
|
||||
{{#link-to "vault.cluster.access.method.section" method.id "configuration"}}
|
||||
View Configuration
|
||||
View configuration
|
||||
{{/link-to}}
|
||||
</li>
|
||||
{{#if method.canEdit}}
|
||||
<li>
|
||||
{{#link-to "vault.cluster.settings.auth.configure" method.id}}
|
||||
Edit Configuration
|
||||
Edit configuration
|
||||
{{/link-to}}
|
||||
</li>
|
||||
{{/if}}
|
||||
|
@ -71,7 +71,7 @@
|
|||
confirmButtonClasses="button is-primary"
|
||||
buttonClasses="link is-destroy"
|
||||
onConfirmAction=(perform disableMethod method)
|
||||
confirmMessage=(concat "Are you sure you want to disable the " method.id " auth method at " method.path "?")
|
||||
confirmMessage=(concat "Are you sure you want to disable the " method.id " Auth Method at " method.path "?")
|
||||
showConfirm=(get this (concat "shouldDelete-" (dot-to-dash method.id)))
|
||||
class=(if (get this (concat "shouldDelete-" (dot-to-dash method.id))) "message is-block is-warning is-outline")
|
||||
containerClasses="message-body is-block"
|
||||
|
|
|
@ -10,7 +10,7 @@
|
|||
</p.top>
|
||||
<p.levelLeft>
|
||||
<h1 class="title is-3">
|
||||
Add a namespace
|
||||
Create a Namespace
|
||||
</h1>
|
||||
</p.levelLeft>
|
||||
</PageHeader>
|
||||
|
|
|
@ -7,7 +7,7 @@
|
|||
</p.levelLeft>
|
||||
<p.levelRight>
|
||||
{{#link-to 'vault.cluster.access.namespaces.create' class="button has-icon-right is-ghost is-compact"}}
|
||||
Create namespace
|
||||
Create a Namespace
|
||||
<ICon @glyph="chevron-right" @size=11 />
|
||||
{{/link-to}}
|
||||
</p.levelRight>
|
||||
|
@ -22,7 +22,7 @@
|
|||
{{#if (contains targetNamespace accessibleNamespaces)}}
|
||||
<li class="action">
|
||||
{{#link-to "vault.cluster.secrets" (query-params namespace=targetNamespace) class="is-block"}}
|
||||
Switch to namespace
|
||||
Switch to Namespace
|
||||
{{/link-to}}
|
||||
</li>
|
||||
{{/if}}
|
||||
|
|
|
@ -35,7 +35,7 @@
|
|||
>
|
||||
<div class="message-body">
|
||||
<h4 class="title is-7 is-marginless">
|
||||
Initial Root Token
|
||||
Initial root token
|
||||
</h4>
|
||||
<MaskedInput
|
||||
@class="is-highlight has-label"
|
||||
|
@ -97,7 +97,7 @@
|
|||
@class="button is-ghost"
|
||||
@stringify={{true}}
|
||||
>
|
||||
<ICon @glyph="download" @size=16 /> Download Keys
|
||||
<ICon @glyph="download" @size=16 /> Download keys
|
||||
</DownloadButton>
|
||||
</div>
|
||||
</div>
|
||||
|
@ -129,7 +129,7 @@
|
|||
for="key-shares"
|
||||
class="is-label"
|
||||
>
|
||||
Key Shares
|
||||
Key shares
|
||||
</label>
|
||||
<div class="control">
|
||||
{{input
|
||||
|
@ -153,7 +153,7 @@
|
|||
for="key-threshold"
|
||||
class="is-label"
|
||||
>
|
||||
Key Threshold
|
||||
Key threshold
|
||||
</label>
|
||||
<div class="control">
|
||||
{{input
|
||||
|
@ -172,8 +172,8 @@
|
|||
</p>
|
||||
</div>
|
||||
<ToggleButton
|
||||
@openLabel="Encrypt Output with PGP"
|
||||
@closedLabel="Encrypt Output with PGP"
|
||||
@openLabel="Encrypt output with PGP"
|
||||
@closedLabel="Encrypt output with PGP"
|
||||
@toggleTarget={{this}}
|
||||
@toggleAttr="use_pgp"
|
||||
@class="is-block"
|
||||
|
@ -190,8 +190,8 @@
|
|||
</div>
|
||||
{{/if}}
|
||||
<ToggleButton
|
||||
@openLabel="Encrypt Root Token with PGP"
|
||||
@closedLabel="Encrypt Root Token with PGP"
|
||||
@openLabel="Encrypt root token with PGP"
|
||||
@closedLabel="Encrypt root token with PGP"
|
||||
@toggleTarget={{this}}
|
||||
@toggleAttr="use_pgp_for_root"
|
||||
@class="is-block"
|
||||
|
|
|
@ -9,7 +9,7 @@
|
|||
</p.top>
|
||||
<p.levelLeft>
|
||||
<h1 class="title is-3">
|
||||
Add {{uppercase policyType}} policy
|
||||
Create {{uppercase policyType}} policy
|
||||
</h1>
|
||||
</p.levelLeft>
|
||||
</PageHeader>
|
||||
|
@ -94,7 +94,7 @@
|
|||
class="button is-primary"
|
||||
data-test-policy-save=true
|
||||
>
|
||||
Create Policy
|
||||
Create policy
|
||||
</button>
|
||||
</div>
|
||||
<div class="control">
|
||||
|
|
|
@ -160,7 +160,7 @@
|
|||
Create {{uppercase policyType}} policy
|
||||
{{/link-to}}
|
||||
<LearnLink @path="/vault/getting-started/policies">
|
||||
Learn More
|
||||
Learn more
|
||||
</LearnLink>
|
||||
</EmptyState>
|
||||
{{/if}}
|
||||
|
|
|
@ -4,7 +4,7 @@
|
|||
<li>
|
||||
{{#link-to "vault.cluster.policies" policyType data-test-policy-list-link=true}}
|
||||
<span class="sep">/</span>
|
||||
{{uppercase policyType}} Policies
|
||||
{{uppercase policyType}} policies
|
||||
{{/link-to}}
|
||||
</li>
|
||||
</nav>
|
||||
|
|
|
@ -4,7 +4,7 @@
|
|||
<li>
|
||||
{{#link-to "vault.cluster.policies" policyType data-test-policy-list-link=true}}
|
||||
<span class="sep">/</span>
|
||||
{{uppercase policyType}} Policies
|
||||
{{uppercase policyType}} policies
|
||||
{{/link-to}}
|
||||
</li>
|
||||
</nav>
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
<SplashPage as |Page|>
|
||||
<Page.header>
|
||||
<h1 class="title is-4">
|
||||
Disaster Recovery Secondary is enabled
|
||||
Disaster Recovery secondary is enabled
|
||||
</h1>
|
||||
</Page.header>
|
||||
<Page.content>
|
||||
|
@ -28,7 +28,7 @@
|
|||
<AlertBanner
|
||||
@type="warning"
|
||||
@title="Caution"
|
||||
@message="Vault replication is not designed for active-active usage and enabling two performance primaries should never be done, as it can lead to data loss if they or their secondaries are ever reconnected."
|
||||
@message="Vault Replication is not designed for active-active usage and enabling two performance primaries should never be done, as it can lead to data loss if they or their secondaries are ever reconnected."
|
||||
@class="unseal-warning"
|
||||
data-test-cluster-status
|
||||
/>
|
||||
|
@ -54,7 +54,7 @@
|
|||
>
|
||||
<p>
|
||||
Generate an Operation Token by entering a portion of the master key.
|
||||
Once all portions are entered, the generated operation token may be used to manage your Seondary Disaster Recovery cluster.
|
||||
Once all portions are entered, the generated operation token may be used to manage your secondary Disaster Recovery cluster.
|
||||
</p>
|
||||
</ShamirFlow>
|
||||
{{/unless}}
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
<h4 class="title is-5">
|
||||
Generate a secondary token
|
||||
</h4>
|
||||
<p>Generate a token to enable {{replicationMode}} replication or change primaries on secondary cluster.</p>
|
||||
<p>Generate a token to enable {{replicationMode}} Replication or change primaries on secondary cluster.</p>
|
||||
</div>
|
||||
{{message-error errors=errors}}
|
||||
{{#if token}}
|
||||
|
|
|
@ -56,7 +56,7 @@
|
|||
{{/link-to}}
|
||||
{{/if}}
|
||||
<DocLink @path="/docs/internals/replication.html">
|
||||
Learn More
|
||||
Learn more
|
||||
</DocLink>
|
||||
</EmptyState>
|
||||
{{/if}}
|
||||
|
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue