diff --git a/website/package-lock.json b/website/package-lock.json index 44c5e47c1..9c90c2bda 100644 --- a/website/package-lock.json +++ b/website/package-lock.json @@ -100,69 +100,52 @@ } }, "@babel/code-frame": { - "version": "7.5.5", - "resolved": "https://registry.npmjs.org/@babel/code-frame/-/code-frame-7.5.5.tgz", - "integrity": "sha512-27d4lZoomVyo51VegxI20xZPuSHusqbQag/ztrBC7wegWoQ1nLREPVSKSW8byhTlzTKyNE4ifaTA6lCp7JjpFw==", + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/code-frame/-/code-frame-7.8.3.tgz", + "integrity": "sha512-a9gxpmdXtZEInkCSHUJDLHZVBgb1QS0jhss4cPP93EW7s+uC5bikET2twEF3KV+7rDblJcmNvTR7VJejqd2C2g==", "requires": { - "@babel/highlight": "^7.0.0" + "@babel/highlight": "^7.8.3" } }, "@babel/core": { - "version": "7.7.7", - "resolved": "https://registry.npmjs.org/@babel/core/-/core-7.7.7.tgz", - "integrity": "sha512-jlSjuj/7z138NLZALxVgrx13AOtqip42ATZP7+kYl53GvDV6+4dCek1mVUo8z8c8Xnw/mx2q3d9HWh3griuesQ==", + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/core/-/core-7.8.3.tgz", + "integrity": "sha512-4XFkf8AwyrEG7Ziu3L2L0Cv+WyY47Tcsp70JFmpftbAA1K7YL/sgE9jh9HyNj08Y/U50ItUchpN0w6HxAoX1rA==", "requires": { - "@babel/code-frame": "^7.5.5", - "@babel/generator": "^7.7.7", - "@babel/helpers": "^7.7.4", - "@babel/parser": "^7.7.7", - "@babel/template": "^7.7.4", - "@babel/traverse": "^7.7.4", - "@babel/types": "^7.7.4", + "@babel/code-frame": "^7.8.3", + "@babel/generator": "^7.8.3", + "@babel/helpers": "^7.8.3", + "@babel/parser": "^7.8.3", + "@babel/template": "^7.8.3", + "@babel/traverse": "^7.8.3", + "@babel/types": "^7.8.3", "convert-source-map": "^1.7.0", "debug": "^4.1.0", + "gensync": "^1.0.0-beta.1", "json5": "^2.1.0", "lodash": "^4.17.13", "resolve": "^1.3.2", "semver": "^5.4.1", "source-map": "^0.5.0" - }, - "dependencies": { - "@babel/generator": { - "version": "7.7.7", - "resolved": "https://registry.npmjs.org/@babel/generator/-/generator-7.7.7.tgz", - "integrity": "sha512-/AOIBpHh/JU1l0ZFS4kiRCBnLi6OTHzh0RPk3h9isBxkkqELtQNFi1Vr/tiG9p1yfoUdKVwISuXWQR+hwwM4VQ==", - "requires": { - "@babel/types": "^7.7.4", - "jsesc": "^2.5.1", - "lodash": "^4.17.13", - "source-map": "^0.5.0" - } - }, - "@babel/parser": { - "version": "7.7.7", - "resolved": "https://registry.npmjs.org/@babel/parser/-/parser-7.7.7.tgz", - "integrity": "sha512-WtTZMZAZLbeymhkd/sEaPD8IQyGAhmuTuvTzLiCFM7iXiVdY0gc0IaI+cW0fh1BnSMbJSzXX6/fHllgHKwHhXw==" - } } }, "@babel/generator": { - "version": "7.7.4", - "resolved": "https://registry.npmjs.org/@babel/generator/-/generator-7.7.4.tgz", - "integrity": "sha512-m5qo2WgdOJeyYngKImbkyQrnUN1mPceaG5BV+G0E3gWsa4l/jCSryWJdM2x8OuGAOyh+3d5pVYfZWCiNFtynxg==", + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/generator/-/generator-7.8.3.tgz", + "integrity": "sha512-WjoPk8hRpDRqqzRpvaR8/gDUPkrnOOeuT2m8cNICJtZH6mwaCo3v0OKMI7Y6SM1pBtyijnLtAL0HDi41pf41ug==", "requires": { - "@babel/types": "^7.7.4", + "@babel/types": "^7.8.3", "jsesc": "^2.5.1", "lodash": "^4.17.13", "source-map": "^0.5.0" } }, "@babel/helper-annotate-as-pure": { - "version": "7.7.4", - "resolved": "https://registry.npmjs.org/@babel/helper-annotate-as-pure/-/helper-annotate-as-pure-7.7.4.tgz", - "integrity": "sha512-2BQmQgECKzYKFPpiycoF9tlb5HA4lrVyAmLLVK177EcQAqjVLciUb2/R+n1boQ9y5ENV3uz2ZqiNw7QMBBw1Og==", + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/helper-annotate-as-pure/-/helper-annotate-as-pure-7.8.3.tgz", + "integrity": "sha512-6o+mJrZBxOoEX77Ezv9zwW7WV8DdluouRKNY/IR5u/YTMuKHgugHOzYWlYvYLpLA9nPsQCAAASpCIbjI9Mv+Uw==", "requires": { - "@babel/types": "^7.7.4" + "@babel/types": "^7.8.3" } }, "@babel/helper-builder-binary-assignment-operator-visitor": { @@ -172,50 +155,38 @@ "requires": { "@babel/helper-explode-assignable-expression": "^7.8.3", "@babel/types": "^7.8.3" - }, - "dependencies": { - "@babel/types": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/types/-/types-7.8.3.tgz", - "integrity": "sha512-jBD+G8+LWpMBBWvVcdr4QysjUE4mU/syrhN17o1u3gx0/WzJB1kwiVZAXRtWbsIPOwW8pF/YJV5+nmetPzepXg==", - "requires": { - "esutils": "^2.0.2", - "lodash": "^4.17.13", - "to-fast-properties": "^2.0.0" - } - } } }, "@babel/helper-builder-react-jsx": { - "version": "7.7.4", - "resolved": "https://registry.npmjs.org/@babel/helper-builder-react-jsx/-/helper-builder-react-jsx-7.7.4.tgz", - "integrity": "sha512-kvbfHJNN9dg4rkEM4xn1s8d1/h6TYNvajy9L1wx4qLn9HFg0IkTsQi4rfBe92nxrPUFcMsHoMV+8rU7MJb3fCA==", + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/helper-builder-react-jsx/-/helper-builder-react-jsx-7.8.3.tgz", + "integrity": "sha512-JT8mfnpTkKNCboTqZsQTdGo3l3Ik3l7QIt9hh0O9DYiwVel37VoJpILKM4YFbP2euF32nkQSb+F9cUk9b7DDXQ==", "requires": { - "@babel/types": "^7.7.4", + "@babel/types": "^7.8.3", "esutils": "^2.0.0" } }, "@babel/helper-call-delegate": { - "version": "7.7.4", - "resolved": "https://registry.npmjs.org/@babel/helper-call-delegate/-/helper-call-delegate-7.7.4.tgz", - "integrity": "sha512-8JH9/B7J7tCYJ2PpWVpw9JhPuEVHztagNVuQAFBVFYluRMlpG7F1CgKEgGeL6KFqcsIa92ZYVj6DSc0XwmN1ZA==", + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/helper-call-delegate/-/helper-call-delegate-7.8.3.tgz", + "integrity": "sha512-6Q05px0Eb+N4/GTyKPPvnkig7Lylw+QzihMpws9iiZQv7ZImf84ZsZpQH7QoWN4n4tm81SnSzPgHw2qtO0Zf3A==", "requires": { - "@babel/helper-hoist-variables": "^7.7.4", - "@babel/traverse": "^7.7.4", - "@babel/types": "^7.7.4" + "@babel/helper-hoist-variables": "^7.8.3", + "@babel/traverse": "^7.8.3", + "@babel/types": "^7.8.3" } }, "@babel/helper-create-class-features-plugin": { - "version": "7.7.4", - "resolved": "https://registry.npmjs.org/@babel/helper-create-class-features-plugin/-/helper-create-class-features-plugin-7.7.4.tgz", - "integrity": "sha512-l+OnKACG4uiDHQ/aJT8dwpR+LhCJALxL0mJ6nzjB25e5IPwqV1VOsY7ah6UB1DG+VOXAIMtuC54rFJGiHkxjgA==", + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/helper-create-class-features-plugin/-/helper-create-class-features-plugin-7.8.3.tgz", + "integrity": "sha512-qmp4pD7zeTxsv0JNecSBsEmG1ei2MqwJq4YQcK3ZWm/0t07QstWfvuV/vm3Qt5xNMFETn2SZqpMx2MQzbtq+KA==", "requires": { - "@babel/helper-function-name": "^7.7.4", - "@babel/helper-member-expression-to-functions": "^7.7.4", - "@babel/helper-optimise-call-expression": "^7.7.4", - "@babel/helper-plugin-utils": "^7.0.0", - "@babel/helper-replace-supers": "^7.7.4", - "@babel/helper-split-export-declaration": "^7.7.4" + "@babel/helper-function-name": "^7.8.3", + "@babel/helper-member-expression-to-functions": "^7.8.3", + "@babel/helper-optimise-call-expression": "^7.8.3", + "@babel/helper-plugin-utils": "^7.8.3", + "@babel/helper-replace-supers": "^7.8.3", + "@babel/helper-split-export-declaration": "^7.8.3" } }, "@babel/helper-create-regexp-features-plugin": { @@ -261,12 +232,12 @@ } }, "@babel/helper-define-map": { - "version": "7.7.4", - "resolved": "https://registry.npmjs.org/@babel/helper-define-map/-/helper-define-map-7.7.4.tgz", - "integrity": "sha512-v5LorqOa0nVQUvAUTUF3KPastvUt/HzByXNamKQ6RdJRTV7j8rLL+WB5C/MzzWAwOomxDhYFb1wLLxHqox86lg==", + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/helper-define-map/-/helper-define-map-7.8.3.tgz", + "integrity": "sha512-PoeBYtxoZGtct3md6xZOCWPcKuMuk3IHhgxsRRNtnNShebf4C8YonTSblsK4tvDbm+eJAw2HAPOfCr+Q/YRG/g==", "requires": { - "@babel/helper-function-name": "^7.7.4", - "@babel/types": "^7.7.4", + "@babel/helper-function-name": "^7.8.3", + "@babel/types": "^7.8.3", "lodash": "^4.17.13" } }, @@ -277,183 +248,75 @@ "requires": { "@babel/traverse": "^7.8.3", "@babel/types": "^7.8.3" - }, - "dependencies": { - "@babel/code-frame": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/code-frame/-/code-frame-7.8.3.tgz", - "integrity": "sha512-a9gxpmdXtZEInkCSHUJDLHZVBgb1QS0jhss4cPP93EW7s+uC5bikET2twEF3KV+7rDblJcmNvTR7VJejqd2C2g==", - "requires": { - "@babel/highlight": "^7.8.3" - } - }, - "@babel/generator": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/generator/-/generator-7.8.3.tgz", - "integrity": "sha512-WjoPk8hRpDRqqzRpvaR8/gDUPkrnOOeuT2m8cNICJtZH6mwaCo3v0OKMI7Y6SM1pBtyijnLtAL0HDi41pf41ug==", - "requires": { - "@babel/types": "^7.8.3", - "jsesc": "^2.5.1", - "lodash": "^4.17.13", - "source-map": "^0.5.0" - } - }, - "@babel/helper-function-name": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-function-name/-/helper-function-name-7.8.3.tgz", - "integrity": "sha512-BCxgX1BC2hD/oBlIFUgOCQDOPV8nSINxCwM3o93xP4P9Fq6aV5sgv2cOOITDMtCfQ+3PvHp3l689XZvAM9QyOA==", - "requires": { - "@babel/helper-get-function-arity": "^7.8.3", - "@babel/template": "^7.8.3", - "@babel/types": "^7.8.3" - } - }, - "@babel/helper-get-function-arity": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-get-function-arity/-/helper-get-function-arity-7.8.3.tgz", - "integrity": "sha512-FVDR+Gd9iLjUMY1fzE2SR0IuaJToR4RkCDARVfsBBPSP53GEqSFjD8gNyxg246VUyc/ALRxFaAK8rVG7UT7xRA==", - "requires": { - "@babel/types": "^7.8.3" - } - }, - "@babel/helper-split-export-declaration": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-split-export-declaration/-/helper-split-export-declaration-7.8.3.tgz", - "integrity": "sha512-3x3yOeyBhW851hroze7ElzdkeRXQYQbFIb7gLK1WQYsw2GWDay5gAJNw1sWJ0VFP6z5J1whqeXH/WCdCjZv6dA==", - "requires": { - "@babel/types": "^7.8.3" - } - }, - "@babel/highlight": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/highlight/-/highlight-7.8.3.tgz", - "integrity": "sha512-PX4y5xQUvy0fnEVHrYOarRPXVWafSjTW9T0Hab8gVIawpl2Sj0ORyrygANq+KjcNlSSTw0YCLSNA8OyZ1I4yEg==", - "requires": { - "chalk": "^2.0.0", - "esutils": "^2.0.2", - "js-tokens": "^4.0.0" - } - }, - "@babel/parser": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/parser/-/parser-7.8.3.tgz", - "integrity": "sha512-/V72F4Yp/qmHaTALizEm9Gf2eQHV3QyTL3K0cNfijwnMnb1L+LDlAubb/ZnSdGAVzVSWakujHYs1I26x66sMeQ==" - }, - "@babel/template": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/template/-/template-7.8.3.tgz", - "integrity": "sha512-04m87AcQgAFdvuoyiQ2kgELr2tV8B4fP/xJAVUL3Yb3bkNdMedD3d0rlSQr3PegP0cms3eHjl1F7PWlvWbU8FQ==", - "requires": { - "@babel/code-frame": "^7.8.3", - "@babel/parser": "^7.8.3", - "@babel/types": "^7.8.3" - } - }, - "@babel/traverse": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/traverse/-/traverse-7.8.3.tgz", - "integrity": "sha512-we+a2lti+eEImHmEXp7bM9cTxGzxPmBiVJlLVD+FuuQMeeO7RaDbutbgeheDkw+Xe3mCfJHnGOWLswT74m2IPg==", - "requires": { - "@babel/code-frame": "^7.8.3", - "@babel/generator": "^7.8.3", - "@babel/helper-function-name": "^7.8.3", - "@babel/helper-split-export-declaration": "^7.8.3", - "@babel/parser": "^7.8.3", - "@babel/types": "^7.8.3", - "debug": "^4.1.0", - "globals": "^11.1.0", - "lodash": "^4.17.13" - } - }, - "@babel/types": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/types/-/types-7.8.3.tgz", - "integrity": "sha512-jBD+G8+LWpMBBWvVcdr4QysjUE4mU/syrhN17o1u3gx0/WzJB1kwiVZAXRtWbsIPOwW8pF/YJV5+nmetPzepXg==", - "requires": { - "esutils": "^2.0.2", - "lodash": "^4.17.13", - "to-fast-properties": "^2.0.0" - } - }, - "chalk": { - "version": "2.4.2", - "resolved": "https://registry.npmjs.org/chalk/-/chalk-2.4.2.tgz", - "integrity": "sha512-Mti+f9lpJNcwF4tWV8/OrTTtF1gZi+f8FqlyAdouralcFWFQWF2+NgCHShjkCb+IFBLq9buZwE1xckQU4peSuQ==", - "requires": { - "ansi-styles": "^3.2.1", - "escape-string-regexp": "^1.0.5", - "supports-color": "^5.3.0" - } - } } }, "@babel/helper-function-name": { - "version": "7.7.4", - "resolved": "https://registry.npmjs.org/@babel/helper-function-name/-/helper-function-name-7.7.4.tgz", - "integrity": "sha512-AnkGIdiBhEuiwdoMnKm7jfPfqItZhgRaZfMg1XX3bS25INOnLPjPG1Ppnajh8eqgt5kPJnfqrRHqFqmjKDZLzQ==", + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/helper-function-name/-/helper-function-name-7.8.3.tgz", + "integrity": "sha512-BCxgX1BC2hD/oBlIFUgOCQDOPV8nSINxCwM3o93xP4P9Fq6aV5sgv2cOOITDMtCfQ+3PvHp3l689XZvAM9QyOA==", "requires": { - "@babel/helper-get-function-arity": "^7.7.4", - "@babel/template": "^7.7.4", - "@babel/types": "^7.7.4" + "@babel/helper-get-function-arity": "^7.8.3", + "@babel/template": "^7.8.3", + "@babel/types": "^7.8.3" } }, "@babel/helper-get-function-arity": { - "version": "7.7.4", - "resolved": "https://registry.npmjs.org/@babel/helper-get-function-arity/-/helper-get-function-arity-7.7.4.tgz", - "integrity": "sha512-QTGKEdCkjgzgfJ3bAyRwF4yyT3pg+vDgan8DSivq1eS0gwi+KGKE5x8kRcbeFTb/673mkO5SN1IZfmCfA5o+EA==", + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/helper-get-function-arity/-/helper-get-function-arity-7.8.3.tgz", + "integrity": "sha512-FVDR+Gd9iLjUMY1fzE2SR0IuaJToR4RkCDARVfsBBPSP53GEqSFjD8gNyxg246VUyc/ALRxFaAK8rVG7UT7xRA==", "requires": { - "@babel/types": "^7.7.4" + "@babel/types": "^7.8.3" } }, "@babel/helper-hoist-variables": { - "version": "7.7.4", - "resolved": "https://registry.npmjs.org/@babel/helper-hoist-variables/-/helper-hoist-variables-7.7.4.tgz", - "integrity": "sha512-wQC4xyvc1Jo/FnLirL6CEgPgPCa8M74tOdjWpRhQYapz5JC7u3NYU1zCVoVAGCE3EaIP9T1A3iW0WLJ+reZlpQ==", + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/helper-hoist-variables/-/helper-hoist-variables-7.8.3.tgz", + "integrity": "sha512-ky1JLOjcDUtSc+xkt0xhYff7Z6ILTAHKmZLHPxAhOP0Nd77O+3nCsd6uSVYur6nJnCI029CrNbYlc0LoPfAPQg==", "requires": { - "@babel/types": "^7.7.4" + "@babel/types": "^7.8.3" } }, "@babel/helper-member-expression-to-functions": { - "version": "7.7.4", - "resolved": "https://registry.npmjs.org/@babel/helper-member-expression-to-functions/-/helper-member-expression-to-functions-7.7.4.tgz", - "integrity": "sha512-9KcA1X2E3OjXl/ykfMMInBK+uVdfIVakVe7W7Lg3wfXUNyS3Q1HWLFRwZIjhqiCGbslummPDnmb7vIekS0C1vw==", + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/helper-member-expression-to-functions/-/helper-member-expression-to-functions-7.8.3.tgz", + "integrity": "sha512-fO4Egq88utkQFjbPrSHGmGLFqmrshs11d46WI+WZDESt7Wu7wN2G2Iu+NMMZJFDOVRHAMIkB5SNh30NtwCA7RA==", "requires": { - "@babel/types": "^7.7.4" + "@babel/types": "^7.8.3" } }, "@babel/helper-module-imports": { - "version": "7.7.4", - "resolved": "https://registry.npmjs.org/@babel/helper-module-imports/-/helper-module-imports-7.7.4.tgz", - "integrity": "sha512-dGcrX6K9l8258WFjyDLJwuVKxR4XZfU0/vTUgOQYWEnRD8mgr+p4d6fCUMq/ys0h4CCt/S5JhbvtyErjWouAUQ==", + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/helper-module-imports/-/helper-module-imports-7.8.3.tgz", + "integrity": "sha512-R0Bx3jippsbAEtzkpZ/6FIiuzOURPcMjHp+Z6xPe6DtApDJx+w7UYyOLanZqO8+wKR9G10s/FmHXvxaMd9s6Kg==", "requires": { - "@babel/types": "^7.7.4" + "@babel/types": "^7.8.3" } }, "@babel/helper-module-transforms": { - "version": "7.7.5", - "resolved": "https://registry.npmjs.org/@babel/helper-module-transforms/-/helper-module-transforms-7.7.5.tgz", - "integrity": "sha512-A7pSxyJf1gN5qXVcidwLWydjftUN878VkalhXX5iQDuGyiGK3sOrrKKHF4/A4fwHtnsotv/NipwAeLzY4KQPvw==", + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/helper-module-transforms/-/helper-module-transforms-7.8.3.tgz", + "integrity": "sha512-C7NG6B7vfBa/pwCOshpMbOYUmrYQDfCpVL/JCRu0ek8B5p8kue1+BCXpg2vOYs7w5ACB9GTOBYQ5U6NwrMg+3Q==", "requires": { - "@babel/helper-module-imports": "^7.7.4", - "@babel/helper-simple-access": "^7.7.4", - "@babel/helper-split-export-declaration": "^7.7.4", - "@babel/template": "^7.7.4", - "@babel/types": "^7.7.4", + "@babel/helper-module-imports": "^7.8.3", + "@babel/helper-simple-access": "^7.8.3", + "@babel/helper-split-export-declaration": "^7.8.3", + "@babel/template": "^7.8.3", + "@babel/types": "^7.8.3", "lodash": "^4.17.13" } }, "@babel/helper-optimise-call-expression": { - "version": "7.7.4", - "resolved": "https://registry.npmjs.org/@babel/helper-optimise-call-expression/-/helper-optimise-call-expression-7.7.4.tgz", - "integrity": "sha512-VB7gWZ2fDkSuqW6b1AKXkJWO5NyNI3bFL/kK79/30moK57blr6NbH8xcl2XcKCwOmJosftWunZqfO84IGq3ZZg==", + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/helper-optimise-call-expression/-/helper-optimise-call-expression-7.8.3.tgz", + "integrity": "sha512-Kag20n86cbO2AvHca6EJsvqAd82gc6VMGule4HwebwMlwkpXuVqrNRj6CkCV2sKxgi9MyAUnZVnZ6lJ1/vKhHQ==", "requires": { - "@babel/types": "^7.7.4" + "@babel/types": "^7.8.3" } }, "@babel/helper-plugin-utils": { - "version": "7.0.0", - "resolved": "https://registry.npmjs.org/@babel/helper-plugin-utils/-/helper-plugin-utils-7.0.0.tgz", - "integrity": "sha512-CYAOUCARwExnEixLdB6sDm2dIJ/YgEAKDM1MOeMeZu9Ld/bDgVo8aiWrXwcY7OBh+1Ea2uUcVRcxKk0GJvW7QA==" + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/helper-plugin-utils/-/helper-plugin-utils-7.8.3.tgz", + "integrity": "sha512-j+fq49Xds2smCUNYmEHF9kGNkhbet6yVIBp4e6oeQpH1RUs/Ir06xUKzDjDkGcaaokPiTNs2JBWHjaE4csUkZQ==" }, "@babel/helper-regex": { "version": "7.8.3", @@ -473,150 +336,34 @@ "@babel/template": "^7.8.3", "@babel/traverse": "^7.8.3", "@babel/types": "^7.8.3" - }, - "dependencies": { - "@babel/code-frame": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/code-frame/-/code-frame-7.8.3.tgz", - "integrity": "sha512-a9gxpmdXtZEInkCSHUJDLHZVBgb1QS0jhss4cPP93EW7s+uC5bikET2twEF3KV+7rDblJcmNvTR7VJejqd2C2g==", - "requires": { - "@babel/highlight": "^7.8.3" - } - }, - "@babel/generator": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/generator/-/generator-7.8.3.tgz", - "integrity": "sha512-WjoPk8hRpDRqqzRpvaR8/gDUPkrnOOeuT2m8cNICJtZH6mwaCo3v0OKMI7Y6SM1pBtyijnLtAL0HDi41pf41ug==", - "requires": { - "@babel/types": "^7.8.3", - "jsesc": "^2.5.1", - "lodash": "^4.17.13", - "source-map": "^0.5.0" - } - }, - "@babel/helper-annotate-as-pure": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-annotate-as-pure/-/helper-annotate-as-pure-7.8.3.tgz", - "integrity": "sha512-6o+mJrZBxOoEX77Ezv9zwW7WV8DdluouRKNY/IR5u/YTMuKHgugHOzYWlYvYLpLA9nPsQCAAASpCIbjI9Mv+Uw==", - "requires": { - "@babel/types": "^7.8.3" - } - }, - "@babel/helper-function-name": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-function-name/-/helper-function-name-7.8.3.tgz", - "integrity": "sha512-BCxgX1BC2hD/oBlIFUgOCQDOPV8nSINxCwM3o93xP4P9Fq6aV5sgv2cOOITDMtCfQ+3PvHp3l689XZvAM9QyOA==", - "requires": { - "@babel/helper-get-function-arity": "^7.8.3", - "@babel/template": "^7.8.3", - "@babel/types": "^7.8.3" - } - }, - "@babel/helper-get-function-arity": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-get-function-arity/-/helper-get-function-arity-7.8.3.tgz", - "integrity": "sha512-FVDR+Gd9iLjUMY1fzE2SR0IuaJToR4RkCDARVfsBBPSP53GEqSFjD8gNyxg246VUyc/ALRxFaAK8rVG7UT7xRA==", - "requires": { - "@babel/types": "^7.8.3" - } - }, - "@babel/helper-split-export-declaration": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-split-export-declaration/-/helper-split-export-declaration-7.8.3.tgz", - "integrity": "sha512-3x3yOeyBhW851hroze7ElzdkeRXQYQbFIb7gLK1WQYsw2GWDay5gAJNw1sWJ0VFP6z5J1whqeXH/WCdCjZv6dA==", - "requires": { - "@babel/types": "^7.8.3" - } - }, - "@babel/highlight": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/highlight/-/highlight-7.8.3.tgz", - "integrity": "sha512-PX4y5xQUvy0fnEVHrYOarRPXVWafSjTW9T0Hab8gVIawpl2Sj0ORyrygANq+KjcNlSSTw0YCLSNA8OyZ1I4yEg==", - "requires": { - "chalk": "^2.0.0", - "esutils": "^2.0.2", - "js-tokens": "^4.0.0" - } - }, - "@babel/parser": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/parser/-/parser-7.8.3.tgz", - "integrity": "sha512-/V72F4Yp/qmHaTALizEm9Gf2eQHV3QyTL3K0cNfijwnMnb1L+LDlAubb/ZnSdGAVzVSWakujHYs1I26x66sMeQ==" - }, - "@babel/template": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/template/-/template-7.8.3.tgz", - "integrity": "sha512-04m87AcQgAFdvuoyiQ2kgELr2tV8B4fP/xJAVUL3Yb3bkNdMedD3d0rlSQr3PegP0cms3eHjl1F7PWlvWbU8FQ==", - "requires": { - "@babel/code-frame": "^7.8.3", - "@babel/parser": "^7.8.3", - "@babel/types": "^7.8.3" - } - }, - "@babel/traverse": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/traverse/-/traverse-7.8.3.tgz", - "integrity": "sha512-we+a2lti+eEImHmEXp7bM9cTxGzxPmBiVJlLVD+FuuQMeeO7RaDbutbgeheDkw+Xe3mCfJHnGOWLswT74m2IPg==", - "requires": { - "@babel/code-frame": "^7.8.3", - "@babel/generator": "^7.8.3", - "@babel/helper-function-name": "^7.8.3", - "@babel/helper-split-export-declaration": "^7.8.3", - "@babel/parser": "^7.8.3", - "@babel/types": "^7.8.3", - "debug": "^4.1.0", - "globals": "^11.1.0", - "lodash": "^4.17.13" - } - }, - "@babel/types": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/types/-/types-7.8.3.tgz", - "integrity": "sha512-jBD+G8+LWpMBBWvVcdr4QysjUE4mU/syrhN17o1u3gx0/WzJB1kwiVZAXRtWbsIPOwW8pF/YJV5+nmetPzepXg==", - "requires": { - "esutils": "^2.0.2", - "lodash": "^4.17.13", - "to-fast-properties": "^2.0.0" - } - }, - "chalk": { - "version": "2.4.2", - "resolved": "https://registry.npmjs.org/chalk/-/chalk-2.4.2.tgz", - "integrity": "sha512-Mti+f9lpJNcwF4tWV8/OrTTtF1gZi+f8FqlyAdouralcFWFQWF2+NgCHShjkCb+IFBLq9buZwE1xckQU4peSuQ==", - "requires": { - "ansi-styles": "^3.2.1", - "escape-string-regexp": "^1.0.5", - "supports-color": "^5.3.0" - } - } } }, "@babel/helper-replace-supers": { - "version": "7.7.4", - "resolved": "https://registry.npmjs.org/@babel/helper-replace-supers/-/helper-replace-supers-7.7.4.tgz", - "integrity": "sha512-pP0tfgg9hsZWo5ZboYGuBn/bbYT/hdLPVSS4NMmiRJdwWhP0IznPwN9AE1JwyGsjSPLC364I0Qh5p+EPkGPNpg==", + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/helper-replace-supers/-/helper-replace-supers-7.8.3.tgz", + "integrity": "sha512-xOUssL6ho41U81etpLoT2RTdvdus4VfHamCuAm4AHxGr+0it5fnwoVdwUJ7GFEqCsQYzJUhcbsN9wB9apcYKFA==", "requires": { - "@babel/helper-member-expression-to-functions": "^7.7.4", - "@babel/helper-optimise-call-expression": "^7.7.4", - "@babel/traverse": "^7.7.4", - "@babel/types": "^7.7.4" + "@babel/helper-member-expression-to-functions": "^7.8.3", + "@babel/helper-optimise-call-expression": "^7.8.3", + "@babel/traverse": "^7.8.3", + "@babel/types": "^7.8.3" } }, "@babel/helper-simple-access": { - "version": "7.7.4", - "resolved": "https://registry.npmjs.org/@babel/helper-simple-access/-/helper-simple-access-7.7.4.tgz", - "integrity": "sha512-zK7THeEXfan7UlWsG2A6CI/L9jVnI5+xxKZOdej39Y0YtDYKx9raHk5F2EtK9K8DHRTihYwg20ADt9S36GR78A==", + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/helper-simple-access/-/helper-simple-access-7.8.3.tgz", + "integrity": "sha512-VNGUDjx5cCWg4vvCTR8qQ7YJYZ+HBjxOgXEl7ounz+4Sn7+LMD3CFrCTEU6/qXKbA2nKg21CwhhBzO0RpRbdCw==", "requires": { - "@babel/template": "^7.7.4", - "@babel/types": "^7.7.4" + "@babel/template": "^7.8.3", + "@babel/types": "^7.8.3" } }, "@babel/helper-split-export-declaration": { - "version": "7.7.4", - "resolved": "https://registry.npmjs.org/@babel/helper-split-export-declaration/-/helper-split-export-declaration-7.7.4.tgz", - "integrity": "sha512-guAg1SXFcVr04Guk9eq0S4/rWS++sbmyqosJzVs8+1fH5NI+ZcmkaSkc7dmtAFbHFva6yRJnjW3yAcGxjueDug==", + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/helper-split-export-declaration/-/helper-split-export-declaration-7.8.3.tgz", + "integrity": "sha512-3x3yOeyBhW851hroze7ElzdkeRXQYQbFIb7gLK1WQYsw2GWDay5gAJNw1sWJ0VFP6z5J1whqeXH/WCdCjZv6dA==", "requires": { - "@babel/types": "^7.7.4" + "@babel/types": "^7.8.3" } }, "@babel/helper-wrap-function": { @@ -628,130 +375,22 @@ "@babel/template": "^7.8.3", "@babel/traverse": "^7.8.3", "@babel/types": "^7.8.3" - }, - "dependencies": { - "@babel/code-frame": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/code-frame/-/code-frame-7.8.3.tgz", - "integrity": "sha512-a9gxpmdXtZEInkCSHUJDLHZVBgb1QS0jhss4cPP93EW7s+uC5bikET2twEF3KV+7rDblJcmNvTR7VJejqd2C2g==", - "requires": { - "@babel/highlight": "^7.8.3" - } - }, - "@babel/generator": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/generator/-/generator-7.8.3.tgz", - "integrity": "sha512-WjoPk8hRpDRqqzRpvaR8/gDUPkrnOOeuT2m8cNICJtZH6mwaCo3v0OKMI7Y6SM1pBtyijnLtAL0HDi41pf41ug==", - "requires": { - "@babel/types": "^7.8.3", - "jsesc": "^2.5.1", - "lodash": "^4.17.13", - "source-map": "^0.5.0" - } - }, - "@babel/helper-function-name": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-function-name/-/helper-function-name-7.8.3.tgz", - "integrity": "sha512-BCxgX1BC2hD/oBlIFUgOCQDOPV8nSINxCwM3o93xP4P9Fq6aV5sgv2cOOITDMtCfQ+3PvHp3l689XZvAM9QyOA==", - "requires": { - "@babel/helper-get-function-arity": "^7.8.3", - "@babel/template": "^7.8.3", - "@babel/types": "^7.8.3" - } - }, - "@babel/helper-get-function-arity": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-get-function-arity/-/helper-get-function-arity-7.8.3.tgz", - "integrity": "sha512-FVDR+Gd9iLjUMY1fzE2SR0IuaJToR4RkCDARVfsBBPSP53GEqSFjD8gNyxg246VUyc/ALRxFaAK8rVG7UT7xRA==", - "requires": { - "@babel/types": "^7.8.3" - } - }, - "@babel/helper-split-export-declaration": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-split-export-declaration/-/helper-split-export-declaration-7.8.3.tgz", - "integrity": "sha512-3x3yOeyBhW851hroze7ElzdkeRXQYQbFIb7gLK1WQYsw2GWDay5gAJNw1sWJ0VFP6z5J1whqeXH/WCdCjZv6dA==", - "requires": { - "@babel/types": "^7.8.3" - } - }, - "@babel/highlight": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/highlight/-/highlight-7.8.3.tgz", - "integrity": "sha512-PX4y5xQUvy0fnEVHrYOarRPXVWafSjTW9T0Hab8gVIawpl2Sj0ORyrygANq+KjcNlSSTw0YCLSNA8OyZ1I4yEg==", - "requires": { - "chalk": "^2.0.0", - "esutils": "^2.0.2", - "js-tokens": "^4.0.0" - } - }, - "@babel/parser": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/parser/-/parser-7.8.3.tgz", - "integrity": "sha512-/V72F4Yp/qmHaTALizEm9Gf2eQHV3QyTL3K0cNfijwnMnb1L+LDlAubb/ZnSdGAVzVSWakujHYs1I26x66sMeQ==" - }, - "@babel/template": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/template/-/template-7.8.3.tgz", - "integrity": "sha512-04m87AcQgAFdvuoyiQ2kgELr2tV8B4fP/xJAVUL3Yb3bkNdMedD3d0rlSQr3PegP0cms3eHjl1F7PWlvWbU8FQ==", - "requires": { - "@babel/code-frame": "^7.8.3", - "@babel/parser": "^7.8.3", - "@babel/types": "^7.8.3" - } - }, - "@babel/traverse": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/traverse/-/traverse-7.8.3.tgz", - "integrity": "sha512-we+a2lti+eEImHmEXp7bM9cTxGzxPmBiVJlLVD+FuuQMeeO7RaDbutbgeheDkw+Xe3mCfJHnGOWLswT74m2IPg==", - "requires": { - "@babel/code-frame": "^7.8.3", - "@babel/generator": "^7.8.3", - "@babel/helper-function-name": "^7.8.3", - "@babel/helper-split-export-declaration": "^7.8.3", - "@babel/parser": "^7.8.3", - "@babel/types": "^7.8.3", - "debug": "^4.1.0", - "globals": "^11.1.0", - "lodash": "^4.17.13" - } - }, - "@babel/types": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/types/-/types-7.8.3.tgz", - "integrity": "sha512-jBD+G8+LWpMBBWvVcdr4QysjUE4mU/syrhN17o1u3gx0/WzJB1kwiVZAXRtWbsIPOwW8pF/YJV5+nmetPzepXg==", - "requires": { - "esutils": "^2.0.2", - "lodash": "^4.17.13", - "to-fast-properties": "^2.0.0" - } - }, - "chalk": { - "version": "2.4.2", - "resolved": "https://registry.npmjs.org/chalk/-/chalk-2.4.2.tgz", - "integrity": "sha512-Mti+f9lpJNcwF4tWV8/OrTTtF1gZi+f8FqlyAdouralcFWFQWF2+NgCHShjkCb+IFBLq9buZwE1xckQU4peSuQ==", - "requires": { - "ansi-styles": "^3.2.1", - "escape-string-regexp": "^1.0.5", - "supports-color": "^5.3.0" - } - } } }, "@babel/helpers": { - "version": "7.7.4", - "resolved": "https://registry.npmjs.org/@babel/helpers/-/helpers-7.7.4.tgz", - "integrity": "sha512-ak5NGZGJ6LV85Q1Zc9gn2n+ayXOizryhjSUBTdu5ih1tlVCJeuQENzc4ItyCVhINVXvIT/ZQ4mheGIsfBkpskg==", + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/helpers/-/helpers-7.8.3.tgz", + "integrity": "sha512-LmU3q9Pah/XyZU89QvBgGt+BCsTPoQa+73RxAQh8fb8qkDyIfeQnmgs+hvzhTCKTzqOyk7JTkS3MS1S8Mq5yrQ==", "requires": { - "@babel/template": "^7.7.4", - "@babel/traverse": "^7.7.4", - "@babel/types": "^7.7.4" + "@babel/template": "^7.8.3", + "@babel/traverse": "^7.8.3", + "@babel/types": "^7.8.3" } }, "@babel/highlight": { - "version": "7.5.0", - "resolved": "https://registry.npmjs.org/@babel/highlight/-/highlight-7.5.0.tgz", - "integrity": "sha512-7dV4eu9gBxoM0dAnj/BCFDW9LFU0zvTrkq0ugM7pnHEgguOEeOz1so2ZghEdzviYzQEED0r4EAgpsBChKy1TRQ==", + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/highlight/-/highlight-7.8.3.tgz", + "integrity": "sha512-PX4y5xQUvy0fnEVHrYOarRPXVWafSjTW9T0Hab8gVIawpl2Sj0ORyrygANq+KjcNlSSTw0YCLSNA8OyZ1I4yEg==", "requires": { "chalk": "^2.0.0", "esutils": "^2.0.2", @@ -771,9 +410,9 @@ } }, "@babel/parser": { - "version": "7.7.5", - "resolved": "https://registry.npmjs.org/@babel/parser/-/parser-7.7.5.tgz", - "integrity": "sha512-KNlOe9+/nk4i29g0VXgl8PEXIRms5xKLJeuZ6UptN0fHv+jDiriG+y94X6qAgWTR0h3KaoM1wK5G5h7MHFRSig==" + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/parser/-/parser-7.8.3.tgz", + "integrity": "sha512-/V72F4Yp/qmHaTALizEm9Gf2eQHV3QyTL3K0cNfijwnMnb1L+LDlAubb/ZnSdGAVzVSWakujHYs1I26x66sMeQ==" }, "@babel/plugin-proposal-async-generator-functions": { "version": "7.8.3", @@ -783,22 +422,15 @@ "@babel/helper-plugin-utils": "^7.8.3", "@babel/helper-remap-async-to-generator": "^7.8.3", "@babel/plugin-syntax-async-generators": "^7.8.0" - }, - "dependencies": { - "@babel/helper-plugin-utils": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-plugin-utils/-/helper-plugin-utils-7.8.3.tgz", - "integrity": "sha512-j+fq49Xds2smCUNYmEHF9kGNkhbet6yVIBp4e6oeQpH1RUs/Ir06xUKzDjDkGcaaokPiTNs2JBWHjaE4csUkZQ==" - } } }, "@babel/plugin-proposal-class-properties": { - "version": "7.7.4", - "resolved": "https://registry.npmjs.org/@babel/plugin-proposal-class-properties/-/plugin-proposal-class-properties-7.7.4.tgz", - "integrity": "sha512-EcuXeV4Hv1X3+Q1TsuOmyyxeTRiSqurGJ26+I/FW1WbymmRRapVORm6x1Zl3iDIHyRxEs+VXWp6qnlcfcJSbbw==", + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/plugin-proposal-class-properties/-/plugin-proposal-class-properties-7.8.3.tgz", + "integrity": "sha512-EqFhbo7IosdgPgZggHaNObkmO1kNUe3slaKu54d5OWvy+p9QIKOzK1GAEpAIsZtWVtPXUHSMcT4smvDrCfY4AA==", "requires": { - "@babel/helper-create-class-features-plugin": "^7.7.4", - "@babel/helper-plugin-utils": "^7.0.0" + "@babel/helper-create-class-features-plugin": "^7.8.3", + "@babel/helper-plugin-utils": "^7.8.3" } }, "@babel/plugin-proposal-dynamic-import": { @@ -810,11 +442,6 @@ "@babel/plugin-syntax-dynamic-import": "^7.8.0" }, "dependencies": { - "@babel/helper-plugin-utils": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-plugin-utils/-/helper-plugin-utils-7.8.3.tgz", - "integrity": "sha512-j+fq49Xds2smCUNYmEHF9kGNkhbet6yVIBp4e6oeQpH1RUs/Ir06xUKzDjDkGcaaokPiTNs2JBWHjaE4csUkZQ==" - }, "@babel/plugin-syntax-dynamic-import": { "version": "7.8.3", "resolved": "https://registry.npmjs.org/@babel/plugin-syntax-dynamic-import/-/plugin-syntax-dynamic-import-7.8.3.tgz", @@ -832,13 +459,6 @@ "requires": { "@babel/helper-plugin-utils": "^7.8.3", "@babel/plugin-syntax-json-strings": "^7.8.0" - }, - "dependencies": { - "@babel/helper-plugin-utils": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-plugin-utils/-/helper-plugin-utils-7.8.3.tgz", - "integrity": "sha512-j+fq49Xds2smCUNYmEHF9kGNkhbet6yVIBp4e6oeQpH1RUs/Ir06xUKzDjDkGcaaokPiTNs2JBWHjaE4csUkZQ==" - } } }, "@babel/plugin-proposal-nullish-coalescing-operator": { @@ -851,12 +471,12 @@ } }, "@babel/plugin-proposal-object-rest-spread": { - "version": "7.7.4", - "resolved": "https://registry.npmjs.org/@babel/plugin-proposal-object-rest-spread/-/plugin-proposal-object-rest-spread-7.7.4.tgz", - "integrity": "sha512-rnpnZR3/iWKmiQyJ3LKJpSwLDcX/nSXhdLk4Aq/tXOApIvyu7qoabrige0ylsAJffaUC51WiBu209Q0U+86OWQ==", + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/plugin-proposal-object-rest-spread/-/plugin-proposal-object-rest-spread-7.8.3.tgz", + "integrity": "sha512-8qvuPwU/xxUCt78HocNlv0mXXo0wdh9VT1R04WU8HGOfaOob26pF+9P5/lYjN/q7DHOX1bvX60hnhOvuQUJdbA==", "requires": { - "@babel/helper-plugin-utils": "^7.0.0", - "@babel/plugin-syntax-object-rest-spread": "^7.7.4" + "@babel/helper-plugin-utils": "^7.8.3", + "@babel/plugin-syntax-object-rest-spread": "^7.8.0" } }, "@babel/plugin-proposal-optional-catch-binding": { @@ -866,13 +486,6 @@ "requires": { "@babel/helper-plugin-utils": "^7.8.3", "@babel/plugin-syntax-optional-catch-binding": "^7.8.0" - }, - "dependencies": { - "@babel/helper-plugin-utils": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-plugin-utils/-/helper-plugin-utils-7.8.3.tgz", - "integrity": "sha512-j+fq49Xds2smCUNYmEHF9kGNkhbet6yVIBp4e6oeQpH1RUs/Ir06xUKzDjDkGcaaokPiTNs2JBWHjaE4csUkZQ==" - } } }, "@babel/plugin-proposal-optional-chaining": { @@ -891,13 +504,6 @@ "requires": { "@babel/helper-create-regexp-features-plugin": "^7.8.3", "@babel/helper-plugin-utils": "^7.8.3" - }, - "dependencies": { - "@babel/helper-plugin-utils": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-plugin-utils/-/helper-plugin-utils-7.8.3.tgz", - "integrity": "sha512-j+fq49Xds2smCUNYmEHF9kGNkhbet6yVIBp4e6oeQpH1RUs/Ir06xUKzDjDkGcaaokPiTNs2JBWHjaE4csUkZQ==" - } } }, "@babel/plugin-syntax-async-generators": { @@ -906,21 +512,14 @@ "integrity": "sha512-tycmZxkGfZaxhMRbXlPXuVFpdWlXpir2W4AMhSJgRKzk/eDlIXOhb2LHWoLpDF7TEHylV5zNhykX6KAgHJmTNw==", "requires": { "@babel/helper-plugin-utils": "^7.8.0" - }, - "dependencies": { - "@babel/helper-plugin-utils": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-plugin-utils/-/helper-plugin-utils-7.8.3.tgz", - "integrity": "sha512-j+fq49Xds2smCUNYmEHF9kGNkhbet6yVIBp4e6oeQpH1RUs/Ir06xUKzDjDkGcaaokPiTNs2JBWHjaE4csUkZQ==" - } } }, "@babel/plugin-syntax-class-properties": { - "version": "7.7.4", - "resolved": "https://registry.npmjs.org/@babel/plugin-syntax-class-properties/-/plugin-syntax-class-properties-7.7.4.tgz", - "integrity": "sha512-JH3v5ZOeKT0qqdJ9BeBcZTFQiJOMax8RopSr1bH6ASkZKo2qWsvBML7W1mp89sszBRDBBRO8snqcByGdrMTdMg==", + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/plugin-syntax-class-properties/-/plugin-syntax-class-properties-7.8.3.tgz", + "integrity": "sha512-UcAyQWg2bAN647Q+O811tG9MrJ38Z10jjhQdKNAL8fsyPzE3cCN/uT+f55cFVY4aGO4jqJAvmqsuY3GQDwAoXg==", "requires": { - "@babel/helper-plugin-utils": "^7.0.0" + "@babel/helper-plugin-utils": "^7.8.3" } }, "@babel/plugin-syntax-dynamic-import": { @@ -932,11 +531,11 @@ } }, "@babel/plugin-syntax-flow": { - "version": "7.7.4", - "resolved": "https://registry.npmjs.org/@babel/plugin-syntax-flow/-/plugin-syntax-flow-7.7.4.tgz", - "integrity": "sha512-2AMAWl5PsmM5KPkB22cvOkUyWk6MjUaqhHNU5nSPUl/ns3j5qLfw2SuYP5RbVZ0tfLvePr4zUScbICtDP2CUNw==", + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/plugin-syntax-flow/-/plugin-syntax-flow-7.8.3.tgz", + "integrity": "sha512-innAx3bUbA0KSYj2E2MNFSn9hiCeowOFLxlsuhXzw8hMQnzkDomUr9QCD7E9VF60NmnG1sNTuuv6Qf4f8INYsg==", "requires": { - "@babel/helper-plugin-utils": "^7.0.0" + "@babel/helper-plugin-utils": "^7.8.3" } }, "@babel/plugin-syntax-json-strings": { @@ -945,21 +544,14 @@ "integrity": "sha512-lY6kdGpWHvjoe2vk4WrAapEuBR69EMxZl+RoGRhrFGNYVK8mOPAW8VfbT/ZgrFbXlDNiiaxQnAtgVCZ6jv30EA==", "requires": { "@babel/helper-plugin-utils": "^7.8.0" - }, - "dependencies": { - "@babel/helper-plugin-utils": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-plugin-utils/-/helper-plugin-utils-7.8.3.tgz", - "integrity": "sha512-j+fq49Xds2smCUNYmEHF9kGNkhbet6yVIBp4e6oeQpH1RUs/Ir06xUKzDjDkGcaaokPiTNs2JBWHjaE4csUkZQ==" - } } }, "@babel/plugin-syntax-jsx": { - "version": "7.7.4", - "resolved": "https://registry.npmjs.org/@babel/plugin-syntax-jsx/-/plugin-syntax-jsx-7.7.4.tgz", - "integrity": "sha512-wuy6fiMe9y7HeZBWXYCGt2RGxZOj0BImZ9EyXJVnVGBKO/Br592rbR3rtIQn0eQhAk9vqaKP5n8tVqEFBQMfLg==", + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/plugin-syntax-jsx/-/plugin-syntax-jsx-7.8.3.tgz", + "integrity": "sha512-WxdW9xyLgBdefoo0Ynn3MRSkhe5tFVxxKNVdnZSh318WrG2e2jH+E9wd/++JsqcLJZPfz87njQJ8j2Upjm0M0A==", "requires": { - "@babel/helper-plugin-utils": "^7.0.0" + "@babel/helper-plugin-utils": "^7.8.3" } }, "@babel/plugin-syntax-nullish-coalescing-operator": { @@ -968,21 +560,14 @@ "integrity": "sha512-aSff4zPII1u2QD7y+F8oDsz19ew4IGEJg9SVW+bqwpwtfFleiQDMdzA/R+UlWDzfnHFCxxleFT0PMIrR36XLNQ==", "requires": { "@babel/helper-plugin-utils": "^7.8.0" - }, - "dependencies": { - "@babel/helper-plugin-utils": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-plugin-utils/-/helper-plugin-utils-7.8.3.tgz", - "integrity": "sha512-j+fq49Xds2smCUNYmEHF9kGNkhbet6yVIBp4e6oeQpH1RUs/Ir06xUKzDjDkGcaaokPiTNs2JBWHjaE4csUkZQ==" - } } }, "@babel/plugin-syntax-object-rest-spread": { - "version": "7.7.4", - "resolved": "https://registry.npmjs.org/@babel/plugin-syntax-object-rest-spread/-/plugin-syntax-object-rest-spread-7.7.4.tgz", - "integrity": "sha512-mObR+r+KZq0XhRVS2BrBKBpr5jqrqzlPvS9C9vuOf5ilSwzloAl7RPWLrgKdWS6IreaVrjHxTjtyqFiOisaCwg==", + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/plugin-syntax-object-rest-spread/-/plugin-syntax-object-rest-spread-7.8.3.tgz", + "integrity": "sha512-XoqMijGZb9y3y2XskN+P1wUGiVwWZ5JmoDRwx5+3GmEplNyVM2s2Dg8ILFQm8rWM48orGy5YpI5Bl8U1y7ydlA==", "requires": { - "@babel/helper-plugin-utils": "^7.0.0" + "@babel/helper-plugin-utils": "^7.8.0" } }, "@babel/plugin-syntax-optional-catch-binding": { @@ -991,13 +576,6 @@ "integrity": "sha512-6VPD0Pc1lpTqw0aKoeRTMiB+kWhAoT24PA+ksWSBrFtl5SIRVpZlwN3NNPQjehA2E/91FV3RjLWoVTglWcSV3Q==", "requires": { "@babel/helper-plugin-utils": "^7.8.0" - }, - "dependencies": { - "@babel/helper-plugin-utils": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-plugin-utils/-/helper-plugin-utils-7.8.3.tgz", - "integrity": "sha512-j+fq49Xds2smCUNYmEHF9kGNkhbet6yVIBp4e6oeQpH1RUs/Ir06xUKzDjDkGcaaokPiTNs2JBWHjaE4csUkZQ==" - } } }, "@babel/plugin-syntax-optional-chaining": { @@ -1006,13 +584,6 @@ "integrity": "sha512-KoK9ErH1MBlCPxV0VANkXW2/dw4vlbGDrFgz8bmUsBGYkFRcbRwMh6cIJubdPrkxRwuGdtCk0v/wPTKbQgBjkg==", "requires": { "@babel/helper-plugin-utils": "^7.8.0" - }, - "dependencies": { - "@babel/helper-plugin-utils": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-plugin-utils/-/helper-plugin-utils-7.8.3.tgz", - "integrity": "sha512-j+fq49Xds2smCUNYmEHF9kGNkhbet6yVIBp4e6oeQpH1RUs/Ir06xUKzDjDkGcaaokPiTNs2JBWHjaE4csUkZQ==" - } } }, "@babel/plugin-syntax-top-level-await": { @@ -1021,13 +592,6 @@ "integrity": "sha512-kwj1j9lL/6Wd0hROD3b/OZZ7MSrZLqqn9RAZ5+cYYsflQ9HZBIKCUkr3+uL1MEJ1NePiUbf98jjiMQSv0NMR9g==", "requires": { "@babel/helper-plugin-utils": "^7.8.3" - }, - "dependencies": { - "@babel/helper-plugin-utils": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-plugin-utils/-/helper-plugin-utils-7.8.3.tgz", - "integrity": "sha512-j+fq49Xds2smCUNYmEHF9kGNkhbet6yVIBp4e6oeQpH1RUs/Ir06xUKzDjDkGcaaokPiTNs2JBWHjaE4csUkZQ==" - } } }, "@babel/plugin-syntax-typescript": { @@ -1036,21 +600,14 @@ "integrity": "sha512-GO1MQ/SGGGoiEXY0e0bSpHimJvxqB7lktLLIq2pv8xG7WZ8IMEle74jIe1FhprHBWjwjZtXHkycDLZXIWM5Wfg==", "requires": { "@babel/helper-plugin-utils": "^7.8.3" - }, - "dependencies": { - "@babel/helper-plugin-utils": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-plugin-utils/-/helper-plugin-utils-7.8.3.tgz", - "integrity": "sha512-j+fq49Xds2smCUNYmEHF9kGNkhbet6yVIBp4e6oeQpH1RUs/Ir06xUKzDjDkGcaaokPiTNs2JBWHjaE4csUkZQ==" - } } }, "@babel/plugin-transform-arrow-functions": { - "version": "7.7.4", - "resolved": "https://registry.npmjs.org/@babel/plugin-transform-arrow-functions/-/plugin-transform-arrow-functions-7.7.4.tgz", - "integrity": "sha512-zUXy3e8jBNPiffmqkHRNDdZM2r8DWhCB7HhcoyZjiK1TxYEluLHAvQuYnTT+ARqRpabWqy/NHkO6e3MsYB5YfA==", + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/plugin-transform-arrow-functions/-/plugin-transform-arrow-functions-7.8.3.tgz", + "integrity": "sha512-0MRF+KC8EqH4dbuITCWwPSzsyO3HIWWlm30v8BbbpOrS1B++isGxPnnuq/IZvOX5J2D/p7DQalQm+/2PnlKGxg==", "requires": { - "@babel/helper-plugin-utils": "^7.0.0" + "@babel/helper-plugin-utils": "^7.8.3" } }, "@babel/plugin-transform-async-to-generator": { @@ -1061,79 +618,54 @@ "@babel/helper-module-imports": "^7.8.3", "@babel/helper-plugin-utils": "^7.8.3", "@babel/helper-remap-async-to-generator": "^7.8.3" - }, - "dependencies": { - "@babel/helper-module-imports": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-module-imports/-/helper-module-imports-7.8.3.tgz", - "integrity": "sha512-R0Bx3jippsbAEtzkpZ/6FIiuzOURPcMjHp+Z6xPe6DtApDJx+w7UYyOLanZqO8+wKR9G10s/FmHXvxaMd9s6Kg==", - "requires": { - "@babel/types": "^7.8.3" - } - }, - "@babel/helper-plugin-utils": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-plugin-utils/-/helper-plugin-utils-7.8.3.tgz", - "integrity": "sha512-j+fq49Xds2smCUNYmEHF9kGNkhbet6yVIBp4e6oeQpH1RUs/Ir06xUKzDjDkGcaaokPiTNs2JBWHjaE4csUkZQ==" - }, - "@babel/types": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/types/-/types-7.8.3.tgz", - "integrity": "sha512-jBD+G8+LWpMBBWvVcdr4QysjUE4mU/syrhN17o1u3gx0/WzJB1kwiVZAXRtWbsIPOwW8pF/YJV5+nmetPzepXg==", - "requires": { - "esutils": "^2.0.2", - "lodash": "^4.17.13", - "to-fast-properties": "^2.0.0" - } - } } }, "@babel/plugin-transform-block-scoped-functions": { - "version": "7.7.4", - "resolved": "https://registry.npmjs.org/@babel/plugin-transform-block-scoped-functions/-/plugin-transform-block-scoped-functions-7.7.4.tgz", - "integrity": "sha512-kqtQzwtKcpPclHYjLK//3lH8OFsCDuDJBaFhVwf8kqdnF6MN4l618UDlcA7TfRs3FayrHj+svYnSX8MC9zmUyQ==", + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/plugin-transform-block-scoped-functions/-/plugin-transform-block-scoped-functions-7.8.3.tgz", + "integrity": "sha512-vo4F2OewqjbB1+yaJ7k2EJFHlTP3jR634Z9Cj9itpqNjuLXvhlVxgnjsHsdRgASR8xYDrx6onw4vW5H6We0Jmg==", "requires": { - "@babel/helper-plugin-utils": "^7.0.0" + "@babel/helper-plugin-utils": "^7.8.3" } }, "@babel/plugin-transform-block-scoping": { - "version": "7.7.4", - "resolved": "https://registry.npmjs.org/@babel/plugin-transform-block-scoping/-/plugin-transform-block-scoping-7.7.4.tgz", - "integrity": "sha512-2VBe9u0G+fDt9B5OV5DQH4KBf5DoiNkwFKOz0TCvBWvdAN2rOykCTkrL+jTLxfCAm76l9Qo5OqL7HBOx2dWggg==", + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/plugin-transform-block-scoping/-/plugin-transform-block-scoping-7.8.3.tgz", + "integrity": "sha512-pGnYfm7RNRgYRi7bids5bHluENHqJhrV4bCZRwc5GamaWIIs07N4rZECcmJL6ZClwjDz1GbdMZFtPs27hTB06w==", "requires": { - "@babel/helper-plugin-utils": "^7.0.0", + "@babel/helper-plugin-utils": "^7.8.3", "lodash": "^4.17.13" } }, "@babel/plugin-transform-classes": { - "version": "7.7.4", - "resolved": "https://registry.npmjs.org/@babel/plugin-transform-classes/-/plugin-transform-classes-7.7.4.tgz", - "integrity": "sha512-sK1mjWat7K+buWRuImEzjNf68qrKcrddtpQo3swi9j7dUcG6y6R6+Di039QN2bD1dykeswlagupEmpOatFHHUg==", + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/plugin-transform-classes/-/plugin-transform-classes-7.8.3.tgz", + "integrity": "sha512-SjT0cwFJ+7Rbr1vQsvphAHwUHvSUPmMjMU/0P59G8U2HLFqSa082JO7zkbDNWs9kH/IUqpHI6xWNesGf8haF1w==", "requires": { - "@babel/helper-annotate-as-pure": "^7.7.4", - "@babel/helper-define-map": "^7.7.4", - "@babel/helper-function-name": "^7.7.4", - "@babel/helper-optimise-call-expression": "^7.7.4", - "@babel/helper-plugin-utils": "^7.0.0", - "@babel/helper-replace-supers": "^7.7.4", - "@babel/helper-split-export-declaration": "^7.7.4", + "@babel/helper-annotate-as-pure": "^7.8.3", + "@babel/helper-define-map": "^7.8.3", + "@babel/helper-function-name": "^7.8.3", + "@babel/helper-optimise-call-expression": "^7.8.3", + "@babel/helper-plugin-utils": "^7.8.3", + "@babel/helper-replace-supers": "^7.8.3", + "@babel/helper-split-export-declaration": "^7.8.3", "globals": "^11.1.0" } }, "@babel/plugin-transform-computed-properties": { - "version": "7.7.4", - "resolved": "https://registry.npmjs.org/@babel/plugin-transform-computed-properties/-/plugin-transform-computed-properties-7.7.4.tgz", - "integrity": "sha512-bSNsOsZnlpLLyQew35rl4Fma3yKWqK3ImWMSC/Nc+6nGjC9s5NFWAer1YQ899/6s9HxO2zQC1WoFNfkOqRkqRQ==", + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/plugin-transform-computed-properties/-/plugin-transform-computed-properties-7.8.3.tgz", + "integrity": "sha512-O5hiIpSyOGdrQZRQ2ccwtTVkgUDBBiCuK//4RJ6UfePllUTCENOzKxfh6ulckXKc0DixTFLCfb2HVkNA7aDpzA==", "requires": { - "@babel/helper-plugin-utils": "^7.0.0" + "@babel/helper-plugin-utils": "^7.8.3" } }, "@babel/plugin-transform-destructuring": { - "version": "7.7.4", - "resolved": "https://registry.npmjs.org/@babel/plugin-transform-destructuring/-/plugin-transform-destructuring-7.7.4.tgz", - "integrity": "sha512-4jFMXI1Cu2aXbcXXl8Lr6YubCn6Oc7k9lLsu8v61TZh+1jny2BWmdtvY9zSUlLdGUvcy9DMAWyZEOqjsbeg/wA==", + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/plugin-transform-destructuring/-/plugin-transform-destructuring-7.8.3.tgz", + "integrity": "sha512-H4X646nCkiEcHZUZaRkhE2XVsoz0J/1x3VVujnn96pSoGCtKPA99ZZA+va+gK+92Zycd6OBKCD8tDb/731bhgQ==", "requires": { - "@babel/helper-plugin-utils": "^7.0.0" + "@babel/helper-plugin-utils": "^7.8.3" } }, "@babel/plugin-transform-dotall-regex": { @@ -1143,13 +675,6 @@ "requires": { "@babel/helper-create-regexp-features-plugin": "^7.8.3", "@babel/helper-plugin-utils": "^7.8.3" - }, - "dependencies": { - "@babel/helper-plugin-utils": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-plugin-utils/-/helper-plugin-utils-7.8.3.tgz", - "integrity": "sha512-j+fq49Xds2smCUNYmEHF9kGNkhbet6yVIBp4e6oeQpH1RUs/Ir06xUKzDjDkGcaaokPiTNs2JBWHjaE4csUkZQ==" - } } }, "@babel/plugin-transform-duplicate-keys": { @@ -1158,13 +683,6 @@ "integrity": "sha512-s8dHiBUbcbSgipS4SMFuWGqCvyge5V2ZeAWzR6INTVC3Ltjig/Vw1G2Gztv0vU/hRG9X8IvKvYdoksnUfgXOEQ==", "requires": { "@babel/helper-plugin-utils": "^7.8.3" - }, - "dependencies": { - "@babel/helper-plugin-utils": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-plugin-utils/-/helper-plugin-utils-7.8.3.tgz", - "integrity": "sha512-j+fq49Xds2smCUNYmEHF9kGNkhbet6yVIBp4e6oeQpH1RUs/Ir06xUKzDjDkGcaaokPiTNs2JBWHjaE4csUkZQ==" - } } }, "@babel/plugin-transform-exponentiation-operator": { @@ -1174,55 +692,48 @@ "requires": { "@babel/helper-builder-binary-assignment-operator-visitor": "^7.8.3", "@babel/helper-plugin-utils": "^7.8.3" - }, - "dependencies": { - "@babel/helper-plugin-utils": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-plugin-utils/-/helper-plugin-utils-7.8.3.tgz", - "integrity": "sha512-j+fq49Xds2smCUNYmEHF9kGNkhbet6yVIBp4e6oeQpH1RUs/Ir06xUKzDjDkGcaaokPiTNs2JBWHjaE4csUkZQ==" - } } }, "@babel/plugin-transform-flow-strip-types": { - "version": "7.7.4", - "resolved": "https://registry.npmjs.org/@babel/plugin-transform-flow-strip-types/-/plugin-transform-flow-strip-types-7.7.4.tgz", - "integrity": "sha512-w9dRNlHY5ElNimyMYy0oQowvQpwt/PRHI0QS98ZJCTZU2bvSnKXo5zEiD5u76FBPigTm8TkqzmnUTg16T7qbkA==", + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/plugin-transform-flow-strip-types/-/plugin-transform-flow-strip-types-7.8.3.tgz", + "integrity": "sha512-g/6WTWG/xbdd2exBBzMfygjX/zw4eyNC4X8pRaq7aRHRoDUCzAIu3kGYIXviOv8BjCuWm8vDBwjHcjiRNgXrPA==", "requires": { - "@babel/helper-plugin-utils": "^7.0.0", - "@babel/plugin-syntax-flow": "^7.7.4" + "@babel/helper-plugin-utils": "^7.8.3", + "@babel/plugin-syntax-flow": "^7.8.3" } }, "@babel/plugin-transform-for-of": { - "version": "7.7.4", - "resolved": "https://registry.npmjs.org/@babel/plugin-transform-for-of/-/plugin-transform-for-of-7.7.4.tgz", - "integrity": "sha512-zZ1fD1B8keYtEcKF+M1TROfeHTKnijcVQm0yO/Yu1f7qoDoxEIc/+GX6Go430Bg84eM/xwPFp0+h4EbZg7epAA==", + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/plugin-transform-for-of/-/plugin-transform-for-of-7.8.3.tgz", + "integrity": "sha512-ZjXznLNTxhpf4Q5q3x1NsngzGA38t9naWH8Gt+0qYZEJAcvPI9waSStSh56u19Ofjr7QmD0wUsQ8hw8s/p1VnA==", "requires": { - "@babel/helper-plugin-utils": "^7.0.0" + "@babel/helper-plugin-utils": "^7.8.3" } }, "@babel/plugin-transform-function-name": { - "version": "7.7.4", - "resolved": "https://registry.npmjs.org/@babel/plugin-transform-function-name/-/plugin-transform-function-name-7.7.4.tgz", - "integrity": "sha512-E/x09TvjHNhsULs2IusN+aJNRV5zKwxu1cpirZyRPw+FyyIKEHPXTsadj48bVpc1R5Qq1B5ZkzumuFLytnbT6g==", + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/plugin-transform-function-name/-/plugin-transform-function-name-7.8.3.tgz", + "integrity": "sha512-rO/OnDS78Eifbjn5Py9v8y0aR+aSYhDhqAwVfsTl0ERuMZyr05L1aFSCJnbv2mmsLkit/4ReeQ9N2BgLnOcPCQ==", "requires": { - "@babel/helper-function-name": "^7.7.4", - "@babel/helper-plugin-utils": "^7.0.0" + "@babel/helper-function-name": "^7.8.3", + "@babel/helper-plugin-utils": "^7.8.3" } }, "@babel/plugin-transform-literals": { - "version": "7.7.4", - "resolved": "https://registry.npmjs.org/@babel/plugin-transform-literals/-/plugin-transform-literals-7.7.4.tgz", - "integrity": "sha512-X2MSV7LfJFm4aZfxd0yLVFrEXAgPqYoDG53Br/tCKiKYfX0MjVjQeWPIhPHHsCqzwQANq+FLN786fF5rgLS+gw==", + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/plugin-transform-literals/-/plugin-transform-literals-7.8.3.tgz", + "integrity": "sha512-3Tqf8JJ/qB7TeldGl+TT55+uQei9JfYaregDcEAyBZ7akutriFrt6C/wLYIer6OYhleVQvH/ntEhjE/xMmy10A==", "requires": { - "@babel/helper-plugin-utils": "^7.0.0" + "@babel/helper-plugin-utils": "^7.8.3" } }, "@babel/plugin-transform-member-expression-literals": { - "version": "7.7.4", - "resolved": "https://registry.npmjs.org/@babel/plugin-transform-member-expression-literals/-/plugin-transform-member-expression-literals-7.7.4.tgz", - "integrity": "sha512-9VMwMO7i69LHTesL0RdGy93JU6a+qOPuvB4F4d0kR0zyVjJRVJRaoaGjhtki6SzQUu8yen/vxPKN6CWnCUw6bA==", + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/plugin-transform-member-expression-literals/-/plugin-transform-member-expression-literals-7.8.3.tgz", + "integrity": "sha512-3Wk2EXhnw+rP+IDkK6BdtPKsUE5IeZ6QOGrPYvw52NwBStw9V1ZVzxgK6fSKSxqUvH9eQPR3tm3cOq79HlsKYA==", "requires": { - "@babel/helper-plugin-utils": "^7.0.0" + "@babel/helper-plugin-utils": "^7.8.3" } }, "@babel/plugin-transform-modules-amd": { @@ -1233,114 +744,16 @@ "@babel/helper-module-transforms": "^7.8.3", "@babel/helper-plugin-utils": "^7.8.3", "babel-plugin-dynamic-import-node": "^2.3.0" - }, - "dependencies": { - "@babel/code-frame": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/code-frame/-/code-frame-7.8.3.tgz", - "integrity": "sha512-a9gxpmdXtZEInkCSHUJDLHZVBgb1QS0jhss4cPP93EW7s+uC5bikET2twEF3KV+7rDblJcmNvTR7VJejqd2C2g==", - "requires": { - "@babel/highlight": "^7.8.3" - } - }, - "@babel/helper-module-imports": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-module-imports/-/helper-module-imports-7.8.3.tgz", - "integrity": "sha512-R0Bx3jippsbAEtzkpZ/6FIiuzOURPcMjHp+Z6xPe6DtApDJx+w7UYyOLanZqO8+wKR9G10s/FmHXvxaMd9s6Kg==", - "requires": { - "@babel/types": "^7.8.3" - } - }, - "@babel/helper-module-transforms": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-module-transforms/-/helper-module-transforms-7.8.3.tgz", - "integrity": "sha512-C7NG6B7vfBa/pwCOshpMbOYUmrYQDfCpVL/JCRu0ek8B5p8kue1+BCXpg2vOYs7w5ACB9GTOBYQ5U6NwrMg+3Q==", - "requires": { - "@babel/helper-module-imports": "^7.8.3", - "@babel/helper-simple-access": "^7.8.3", - "@babel/helper-split-export-declaration": "^7.8.3", - "@babel/template": "^7.8.3", - "@babel/types": "^7.8.3", - "lodash": "^4.17.13" - } - }, - "@babel/helper-plugin-utils": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-plugin-utils/-/helper-plugin-utils-7.8.3.tgz", - "integrity": "sha512-j+fq49Xds2smCUNYmEHF9kGNkhbet6yVIBp4e6oeQpH1RUs/Ir06xUKzDjDkGcaaokPiTNs2JBWHjaE4csUkZQ==" - }, - "@babel/helper-simple-access": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-simple-access/-/helper-simple-access-7.8.3.tgz", - "integrity": "sha512-VNGUDjx5cCWg4vvCTR8qQ7YJYZ+HBjxOgXEl7ounz+4Sn7+LMD3CFrCTEU6/qXKbA2nKg21CwhhBzO0RpRbdCw==", - "requires": { - "@babel/template": "^7.8.3", - "@babel/types": "^7.8.3" - } - }, - "@babel/helper-split-export-declaration": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-split-export-declaration/-/helper-split-export-declaration-7.8.3.tgz", - "integrity": "sha512-3x3yOeyBhW851hroze7ElzdkeRXQYQbFIb7gLK1WQYsw2GWDay5gAJNw1sWJ0VFP6z5J1whqeXH/WCdCjZv6dA==", - "requires": { - "@babel/types": "^7.8.3" - } - }, - "@babel/highlight": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/highlight/-/highlight-7.8.3.tgz", - "integrity": "sha512-PX4y5xQUvy0fnEVHrYOarRPXVWafSjTW9T0Hab8gVIawpl2Sj0ORyrygANq+KjcNlSSTw0YCLSNA8OyZ1I4yEg==", - "requires": { - "chalk": "^2.0.0", - "esutils": "^2.0.2", - "js-tokens": "^4.0.0" - } - }, - "@babel/parser": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/parser/-/parser-7.8.3.tgz", - "integrity": "sha512-/V72F4Yp/qmHaTALizEm9Gf2eQHV3QyTL3K0cNfijwnMnb1L+LDlAubb/ZnSdGAVzVSWakujHYs1I26x66sMeQ==" - }, - "@babel/template": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/template/-/template-7.8.3.tgz", - "integrity": "sha512-04m87AcQgAFdvuoyiQ2kgELr2tV8B4fP/xJAVUL3Yb3bkNdMedD3d0rlSQr3PegP0cms3eHjl1F7PWlvWbU8FQ==", - "requires": { - "@babel/code-frame": "^7.8.3", - "@babel/parser": "^7.8.3", - "@babel/types": "^7.8.3" - } - }, - "@babel/types": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/types/-/types-7.8.3.tgz", - "integrity": "sha512-jBD+G8+LWpMBBWvVcdr4QysjUE4mU/syrhN17o1u3gx0/WzJB1kwiVZAXRtWbsIPOwW8pF/YJV5+nmetPzepXg==", - "requires": { - "esutils": "^2.0.2", - "lodash": "^4.17.13", - "to-fast-properties": "^2.0.0" - } - }, - "chalk": { - "version": "2.4.2", - "resolved": "https://registry.npmjs.org/chalk/-/chalk-2.4.2.tgz", - "integrity": "sha512-Mti+f9lpJNcwF4tWV8/OrTTtF1gZi+f8FqlyAdouralcFWFQWF2+NgCHShjkCb+IFBLq9buZwE1xckQU4peSuQ==", - "requires": { - "ansi-styles": "^3.2.1", - "escape-string-regexp": "^1.0.5", - "supports-color": "^5.3.0" - } - } } }, "@babel/plugin-transform-modules-commonjs": { - "version": "7.7.5", - "resolved": "https://registry.npmjs.org/@babel/plugin-transform-modules-commonjs/-/plugin-transform-modules-commonjs-7.7.5.tgz", - "integrity": "sha512-9Cq4zTFExwFhQI6MT1aFxgqhIsMWQWDVwOgLzl7PTWJHsNaqFvklAU+Oz6AQLAS0dJKTwZSOCo20INwktxpi3Q==", + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/plugin-transform-modules-commonjs/-/plugin-transform-modules-commonjs-7.8.3.tgz", + "integrity": "sha512-JpdMEfA15HZ/1gNuB9XEDlZM1h/gF/YOH7zaZzQu2xCFRfwc01NXBMHHSTT6hRjlXJJs5x/bfODM3LiCk94Sxg==", "requires": { - "@babel/helper-module-transforms": "^7.7.5", - "@babel/helper-plugin-utils": "^7.0.0", - "@babel/helper-simple-access": "^7.7.4", + "@babel/helper-module-transforms": "^7.8.3", + "@babel/helper-plugin-utils": "^7.8.3", + "@babel/helper-simple-access": "^7.8.3", "babel-plugin-dynamic-import-node": "^2.3.0" } }, @@ -1353,112 +766,6 @@ "@babel/helper-module-transforms": "^7.8.3", "@babel/helper-plugin-utils": "^7.8.3", "babel-plugin-dynamic-import-node": "^2.3.0" - }, - "dependencies": { - "@babel/code-frame": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/code-frame/-/code-frame-7.8.3.tgz", - "integrity": "sha512-a9gxpmdXtZEInkCSHUJDLHZVBgb1QS0jhss4cPP93EW7s+uC5bikET2twEF3KV+7rDblJcmNvTR7VJejqd2C2g==", - "requires": { - "@babel/highlight": "^7.8.3" - } - }, - "@babel/helper-hoist-variables": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-hoist-variables/-/helper-hoist-variables-7.8.3.tgz", - "integrity": "sha512-ky1JLOjcDUtSc+xkt0xhYff7Z6ILTAHKmZLHPxAhOP0Nd77O+3nCsd6uSVYur6nJnCI029CrNbYlc0LoPfAPQg==", - "requires": { - "@babel/types": "^7.8.3" - } - }, - "@babel/helper-module-imports": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-module-imports/-/helper-module-imports-7.8.3.tgz", - "integrity": "sha512-R0Bx3jippsbAEtzkpZ/6FIiuzOURPcMjHp+Z6xPe6DtApDJx+w7UYyOLanZqO8+wKR9G10s/FmHXvxaMd9s6Kg==", - "requires": { - "@babel/types": "^7.8.3" - } - }, - "@babel/helper-module-transforms": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-module-transforms/-/helper-module-transforms-7.8.3.tgz", - "integrity": "sha512-C7NG6B7vfBa/pwCOshpMbOYUmrYQDfCpVL/JCRu0ek8B5p8kue1+BCXpg2vOYs7w5ACB9GTOBYQ5U6NwrMg+3Q==", - "requires": { - "@babel/helper-module-imports": "^7.8.3", - "@babel/helper-simple-access": "^7.8.3", - "@babel/helper-split-export-declaration": "^7.8.3", - "@babel/template": "^7.8.3", - "@babel/types": "^7.8.3", - "lodash": "^4.17.13" - } - }, - "@babel/helper-plugin-utils": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-plugin-utils/-/helper-plugin-utils-7.8.3.tgz", - "integrity": "sha512-j+fq49Xds2smCUNYmEHF9kGNkhbet6yVIBp4e6oeQpH1RUs/Ir06xUKzDjDkGcaaokPiTNs2JBWHjaE4csUkZQ==" - }, - "@babel/helper-simple-access": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-simple-access/-/helper-simple-access-7.8.3.tgz", - "integrity": "sha512-VNGUDjx5cCWg4vvCTR8qQ7YJYZ+HBjxOgXEl7ounz+4Sn7+LMD3CFrCTEU6/qXKbA2nKg21CwhhBzO0RpRbdCw==", - "requires": { - "@babel/template": "^7.8.3", - "@babel/types": "^7.8.3" - } - }, - "@babel/helper-split-export-declaration": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-split-export-declaration/-/helper-split-export-declaration-7.8.3.tgz", - "integrity": "sha512-3x3yOeyBhW851hroze7ElzdkeRXQYQbFIb7gLK1WQYsw2GWDay5gAJNw1sWJ0VFP6z5J1whqeXH/WCdCjZv6dA==", - "requires": { - "@babel/types": "^7.8.3" - } - }, - "@babel/highlight": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/highlight/-/highlight-7.8.3.tgz", - "integrity": "sha512-PX4y5xQUvy0fnEVHrYOarRPXVWafSjTW9T0Hab8gVIawpl2Sj0ORyrygANq+KjcNlSSTw0YCLSNA8OyZ1I4yEg==", - "requires": { - "chalk": "^2.0.0", - "esutils": "^2.0.2", - "js-tokens": "^4.0.0" - } - }, - "@babel/parser": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/parser/-/parser-7.8.3.tgz", - "integrity": "sha512-/V72F4Yp/qmHaTALizEm9Gf2eQHV3QyTL3K0cNfijwnMnb1L+LDlAubb/ZnSdGAVzVSWakujHYs1I26x66sMeQ==" - }, - "@babel/template": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/template/-/template-7.8.3.tgz", - "integrity": "sha512-04m87AcQgAFdvuoyiQ2kgELr2tV8B4fP/xJAVUL3Yb3bkNdMedD3d0rlSQr3PegP0cms3eHjl1F7PWlvWbU8FQ==", - "requires": { - "@babel/code-frame": "^7.8.3", - "@babel/parser": "^7.8.3", - "@babel/types": "^7.8.3" - } - }, - "@babel/types": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/types/-/types-7.8.3.tgz", - "integrity": "sha512-jBD+G8+LWpMBBWvVcdr4QysjUE4mU/syrhN17o1u3gx0/WzJB1kwiVZAXRtWbsIPOwW8pF/YJV5+nmetPzepXg==", - "requires": { - "esutils": "^2.0.2", - "lodash": "^4.17.13", - "to-fast-properties": "^2.0.0" - } - }, - "chalk": { - "version": "2.4.2", - "resolved": "https://registry.npmjs.org/chalk/-/chalk-2.4.2.tgz", - "integrity": "sha512-Mti+f9lpJNcwF4tWV8/OrTTtF1gZi+f8FqlyAdouralcFWFQWF2+NgCHShjkCb+IFBLq9buZwE1xckQU4peSuQ==", - "requires": { - "ansi-styles": "^3.2.1", - "escape-string-regexp": "^1.0.5", - "supports-color": "^5.3.0" - } - } } }, "@babel/plugin-transform-modules-umd": { @@ -1468,104 +775,6 @@ "requires": { "@babel/helper-module-transforms": "^7.8.3", "@babel/helper-plugin-utils": "^7.8.3" - }, - "dependencies": { - "@babel/code-frame": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/code-frame/-/code-frame-7.8.3.tgz", - "integrity": "sha512-a9gxpmdXtZEInkCSHUJDLHZVBgb1QS0jhss4cPP93EW7s+uC5bikET2twEF3KV+7rDblJcmNvTR7VJejqd2C2g==", - "requires": { - "@babel/highlight": "^7.8.3" - } - }, - "@babel/helper-module-imports": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-module-imports/-/helper-module-imports-7.8.3.tgz", - "integrity": "sha512-R0Bx3jippsbAEtzkpZ/6FIiuzOURPcMjHp+Z6xPe6DtApDJx+w7UYyOLanZqO8+wKR9G10s/FmHXvxaMd9s6Kg==", - "requires": { - "@babel/types": "^7.8.3" - } - }, - "@babel/helper-module-transforms": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-module-transforms/-/helper-module-transforms-7.8.3.tgz", - "integrity": "sha512-C7NG6B7vfBa/pwCOshpMbOYUmrYQDfCpVL/JCRu0ek8B5p8kue1+BCXpg2vOYs7w5ACB9GTOBYQ5U6NwrMg+3Q==", - "requires": { - "@babel/helper-module-imports": "^7.8.3", - "@babel/helper-simple-access": "^7.8.3", - "@babel/helper-split-export-declaration": "^7.8.3", - "@babel/template": "^7.8.3", - "@babel/types": "^7.8.3", - "lodash": "^4.17.13" - } - }, - "@babel/helper-plugin-utils": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-plugin-utils/-/helper-plugin-utils-7.8.3.tgz", - "integrity": "sha512-j+fq49Xds2smCUNYmEHF9kGNkhbet6yVIBp4e6oeQpH1RUs/Ir06xUKzDjDkGcaaokPiTNs2JBWHjaE4csUkZQ==" - }, - "@babel/helper-simple-access": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-simple-access/-/helper-simple-access-7.8.3.tgz", - "integrity": "sha512-VNGUDjx5cCWg4vvCTR8qQ7YJYZ+HBjxOgXEl7ounz+4Sn7+LMD3CFrCTEU6/qXKbA2nKg21CwhhBzO0RpRbdCw==", - "requires": { - "@babel/template": "^7.8.3", - "@babel/types": "^7.8.3" - } - }, - "@babel/helper-split-export-declaration": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-split-export-declaration/-/helper-split-export-declaration-7.8.3.tgz", - "integrity": "sha512-3x3yOeyBhW851hroze7ElzdkeRXQYQbFIb7gLK1WQYsw2GWDay5gAJNw1sWJ0VFP6z5J1whqeXH/WCdCjZv6dA==", - "requires": { - "@babel/types": "^7.8.3" - } - }, - "@babel/highlight": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/highlight/-/highlight-7.8.3.tgz", - "integrity": "sha512-PX4y5xQUvy0fnEVHrYOarRPXVWafSjTW9T0Hab8gVIawpl2Sj0ORyrygANq+KjcNlSSTw0YCLSNA8OyZ1I4yEg==", - "requires": { - "chalk": "^2.0.0", - "esutils": "^2.0.2", - "js-tokens": "^4.0.0" - } - }, - "@babel/parser": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/parser/-/parser-7.8.3.tgz", - "integrity": "sha512-/V72F4Yp/qmHaTALizEm9Gf2eQHV3QyTL3K0cNfijwnMnb1L+LDlAubb/ZnSdGAVzVSWakujHYs1I26x66sMeQ==" - }, - "@babel/template": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/template/-/template-7.8.3.tgz", - "integrity": "sha512-04m87AcQgAFdvuoyiQ2kgELr2tV8B4fP/xJAVUL3Yb3bkNdMedD3d0rlSQr3PegP0cms3eHjl1F7PWlvWbU8FQ==", - "requires": { - "@babel/code-frame": "^7.8.3", - "@babel/parser": "^7.8.3", - "@babel/types": "^7.8.3" - } - }, - "@babel/types": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/types/-/types-7.8.3.tgz", - "integrity": "sha512-jBD+G8+LWpMBBWvVcdr4QysjUE4mU/syrhN17o1u3gx0/WzJB1kwiVZAXRtWbsIPOwW8pF/YJV5+nmetPzepXg==", - "requires": { - "esutils": "^2.0.2", - "lodash": "^4.17.13", - "to-fast-properties": "^2.0.0" - } - }, - "chalk": { - "version": "2.4.2", - "resolved": "https://registry.npmjs.org/chalk/-/chalk-2.4.2.tgz", - "integrity": "sha512-Mti+f9lpJNcwF4tWV8/OrTTtF1gZi+f8FqlyAdouralcFWFQWF2+NgCHShjkCb+IFBLq9buZwE1xckQU4peSuQ==", - "requires": { - "ansi-styles": "^3.2.1", - "escape-string-regexp": "^1.0.5", - "supports-color": "^5.3.0" - } - } } }, "@babel/plugin-transform-named-capturing-groups-regex": { @@ -1582,58 +791,51 @@ "integrity": "sha512-QuSGysibQpyxexRyui2vca+Cmbljo8bcRckgzYV4kRIsHpVeyeC3JDO63pY+xFZ6bWOBn7pfKZTqV4o/ix9sFw==", "requires": { "@babel/helper-plugin-utils": "^7.8.3" - }, - "dependencies": { - "@babel/helper-plugin-utils": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-plugin-utils/-/helper-plugin-utils-7.8.3.tgz", - "integrity": "sha512-j+fq49Xds2smCUNYmEHF9kGNkhbet6yVIBp4e6oeQpH1RUs/Ir06xUKzDjDkGcaaokPiTNs2JBWHjaE4csUkZQ==" - } } }, "@babel/plugin-transform-object-super": { - "version": "7.7.4", - "resolved": "https://registry.npmjs.org/@babel/plugin-transform-object-super/-/plugin-transform-object-super-7.7.4.tgz", - "integrity": "sha512-ho+dAEhC2aRnff2JCA0SAK7V2R62zJd/7dmtoe7MHcso4C2mS+vZjn1Pb1pCVZvJs1mgsvv5+7sT+m3Bysb6eg==", + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/plugin-transform-object-super/-/plugin-transform-object-super-7.8.3.tgz", + "integrity": "sha512-57FXk+gItG/GejofIyLIgBKTas4+pEU47IXKDBWFTxdPd7F80H8zybyAY7UoblVfBhBGs2EKM+bJUu2+iUYPDQ==", "requires": { - "@babel/helper-plugin-utils": "^7.0.0", - "@babel/helper-replace-supers": "^7.7.4" + "@babel/helper-plugin-utils": "^7.8.3", + "@babel/helper-replace-supers": "^7.8.3" } }, "@babel/plugin-transform-parameters": { - "version": "7.7.4", - "resolved": "https://registry.npmjs.org/@babel/plugin-transform-parameters/-/plugin-transform-parameters-7.7.4.tgz", - "integrity": "sha512-VJwhVePWPa0DqE9vcfptaJSzNDKrWU/4FbYCjZERtmqEs05g3UMXnYMZoXja7JAJ7Y7sPZipwm/pGApZt7wHlw==", + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/plugin-transform-parameters/-/plugin-transform-parameters-7.8.3.tgz", + "integrity": "sha512-/pqngtGb54JwMBZ6S/D3XYylQDFtGjWrnoCF4gXZOUpFV/ujbxnoNGNvDGu6doFWRPBveE72qTx/RRU44j5I/Q==", "requires": { - "@babel/helper-call-delegate": "^7.7.4", - "@babel/helper-get-function-arity": "^7.7.4", - "@babel/helper-plugin-utils": "^7.0.0" + "@babel/helper-call-delegate": "^7.8.3", + "@babel/helper-get-function-arity": "^7.8.3", + "@babel/helper-plugin-utils": "^7.8.3" } }, "@babel/plugin-transform-property-literals": { - "version": "7.7.4", - "resolved": "https://registry.npmjs.org/@babel/plugin-transform-property-literals/-/plugin-transform-property-literals-7.7.4.tgz", - "integrity": "sha512-MatJhlC4iHsIskWYyawl53KuHrt+kALSADLQQ/HkhTjX954fkxIEh4q5slL4oRAnsm/eDoZ4q0CIZpcqBuxhJQ==", + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/plugin-transform-property-literals/-/plugin-transform-property-literals-7.8.3.tgz", + "integrity": "sha512-uGiiXAZMqEoQhRWMK17VospMZh5sXWg+dlh2soffpkAl96KAm+WZuJfa6lcELotSRmooLqg0MWdH6UUq85nmmg==", "requires": { - "@babel/helper-plugin-utils": "^7.0.0" + "@babel/helper-plugin-utils": "^7.8.3" } }, "@babel/plugin-transform-react-display-name": { - "version": "7.7.4", - "resolved": "https://registry.npmjs.org/@babel/plugin-transform-react-display-name/-/plugin-transform-react-display-name-7.7.4.tgz", - "integrity": "sha512-sBbIvqYkthai0X0vkD2xsAwluBp+LtNHH+/V4a5ydifmTtb8KOVOlrMIk/MYmIc4uTYDnjZUHQildYNo36SRJw==", + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/plugin-transform-react-display-name/-/plugin-transform-react-display-name-7.8.3.tgz", + "integrity": "sha512-3Jy/PCw8Fe6uBKtEgz3M82ljt+lTg+xJaM4og+eyu83qLT87ZUSckn0wy7r31jflURWLO83TW6Ylf7lyXj3m5A==", "requires": { - "@babel/helper-plugin-utils": "^7.0.0" + "@babel/helper-plugin-utils": "^7.8.3" } }, "@babel/plugin-transform-react-jsx": { - "version": "7.7.4", - "resolved": "https://registry.npmjs.org/@babel/plugin-transform-react-jsx/-/plugin-transform-react-jsx-7.7.4.tgz", - "integrity": "sha512-LixU4BS95ZTEAZdPaIuyg/k8FiiqN9laQ0dMHB4MlpydHY53uQdWCUrwjLr5o6ilS6fAgZey4Q14XBjl5tL6xw==", + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/plugin-transform-react-jsx/-/plugin-transform-react-jsx-7.8.3.tgz", + "integrity": "sha512-r0h+mUiyL595ikykci+fbwm9YzmuOrUBi0b+FDIKmi3fPQyFokWVEMJnRWHJPPQEjyFJyna9WZC6Viv6UHSv1g==", "requires": { - "@babel/helper-builder-react-jsx": "^7.7.4", - "@babel/helper-plugin-utils": "^7.0.0", - "@babel/plugin-syntax-jsx": "^7.7.4" + "@babel/helper-builder-react-jsx": "^7.8.3", + "@babel/helper-plugin-utils": "^7.8.3", + "@babel/plugin-syntax-jsx": "^7.8.3" } }, "@babel/plugin-transform-react-jsx-self": { @@ -1643,21 +845,6 @@ "requires": { "@babel/helper-plugin-utils": "^7.8.3", "@babel/plugin-syntax-jsx": "^7.8.3" - }, - "dependencies": { - "@babel/helper-plugin-utils": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-plugin-utils/-/helper-plugin-utils-7.8.3.tgz", - "integrity": "sha512-j+fq49Xds2smCUNYmEHF9kGNkhbet6yVIBp4e6oeQpH1RUs/Ir06xUKzDjDkGcaaokPiTNs2JBWHjaE4csUkZQ==" - }, - "@babel/plugin-syntax-jsx": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/plugin-syntax-jsx/-/plugin-syntax-jsx-7.8.3.tgz", - "integrity": "sha512-WxdW9xyLgBdefoo0Ynn3MRSkhe5tFVxxKNVdnZSh318WrG2e2jH+E9wd/++JsqcLJZPfz87njQJ8j2Upjm0M0A==", - "requires": { - "@babel/helper-plugin-utils": "^7.8.3" - } - } } }, "@babel/plugin-transform-react-jsx-source": { @@ -1667,21 +854,6 @@ "requires": { "@babel/helper-plugin-utils": "^7.8.3", "@babel/plugin-syntax-jsx": "^7.8.3" - }, - "dependencies": { - "@babel/helper-plugin-utils": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-plugin-utils/-/helper-plugin-utils-7.8.3.tgz", - "integrity": "sha512-j+fq49Xds2smCUNYmEHF9kGNkhbet6yVIBp4e6oeQpH1RUs/Ir06xUKzDjDkGcaaokPiTNs2JBWHjaE4csUkZQ==" - }, - "@babel/plugin-syntax-jsx": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/plugin-syntax-jsx/-/plugin-syntax-jsx-7.8.3.tgz", - "integrity": "sha512-WxdW9xyLgBdefoo0Ynn3MRSkhe5tFVxxKNVdnZSh318WrG2e2jH+E9wd/++JsqcLJZPfz87njQJ8j2Upjm0M0A==", - "requires": { - "@babel/helper-plugin-utils": "^7.8.3" - } - } } }, "@babel/plugin-transform-regenerator": { @@ -1698,13 +870,6 @@ "integrity": "sha512-mwMxcycN3omKFDjDQUl+8zyMsBfjRFr0Zn/64I41pmjv4NJuqcYlEtezwYtw9TFd9WR1vN5kiM+O0gMZzO6L0A==", "requires": { "@babel/helper-plugin-utils": "^7.8.3" - }, - "dependencies": { - "@babel/helper-plugin-utils": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-plugin-utils/-/helper-plugin-utils-7.8.3.tgz", - "integrity": "sha512-j+fq49Xds2smCUNYmEHF9kGNkhbet6yVIBp4e6oeQpH1RUs/Ir06xUKzDjDkGcaaokPiTNs2JBWHjaE4csUkZQ==" - } } }, "@babel/plugin-transform-runtime": { @@ -1719,19 +884,19 @@ } }, "@babel/plugin-transform-shorthand-properties": { - "version": "7.7.4", - "resolved": "https://registry.npmjs.org/@babel/plugin-transform-shorthand-properties/-/plugin-transform-shorthand-properties-7.7.4.tgz", - "integrity": "sha512-q+suddWRfIcnyG5YiDP58sT65AJDZSUhXQDZE3r04AuqD6d/XLaQPPXSBzP2zGerkgBivqtQm9XKGLuHqBID6Q==", + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/plugin-transform-shorthand-properties/-/plugin-transform-shorthand-properties-7.8.3.tgz", + "integrity": "sha512-I9DI6Odg0JJwxCHzbzW08ggMdCezoWcuQRz3ptdudgwaHxTjxw5HgdFJmZIkIMlRymL6YiZcped4TTCB0JcC8w==", "requires": { - "@babel/helper-plugin-utils": "^7.0.0" + "@babel/helper-plugin-utils": "^7.8.3" } }, "@babel/plugin-transform-spread": { - "version": "7.7.4", - "resolved": "https://registry.npmjs.org/@babel/plugin-transform-spread/-/plugin-transform-spread-7.7.4.tgz", - "integrity": "sha512-8OSs0FLe5/80cndziPlg4R0K6HcWSM0zyNhHhLsmw/Nc5MaA49cAsnoJ/t/YZf8qkG7fD+UjTRaApVDB526d7Q==", + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/plugin-transform-spread/-/plugin-transform-spread-7.8.3.tgz", + "integrity": "sha512-CkuTU9mbmAoFOI1tklFWYYbzX5qCIZVXPVy0jpXgGwkplCndQAa58s2jr66fTeQnA64bDox0HL4U56CFYoyC7g==", "requires": { - "@babel/helper-plugin-utils": "^7.0.0" + "@babel/helper-plugin-utils": "^7.8.3" } }, "@babel/plugin-transform-sticky-regex": { @@ -1741,22 +906,15 @@ "requires": { "@babel/helper-plugin-utils": "^7.8.3", "@babel/helper-regex": "^7.8.3" - }, - "dependencies": { - "@babel/helper-plugin-utils": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-plugin-utils/-/helper-plugin-utils-7.8.3.tgz", - "integrity": "sha512-j+fq49Xds2smCUNYmEHF9kGNkhbet6yVIBp4e6oeQpH1RUs/Ir06xUKzDjDkGcaaokPiTNs2JBWHjaE4csUkZQ==" - } } }, "@babel/plugin-transform-template-literals": { - "version": "7.7.4", - "resolved": "https://registry.npmjs.org/@babel/plugin-transform-template-literals/-/plugin-transform-template-literals-7.7.4.tgz", - "integrity": "sha512-sA+KxLwF3QwGj5abMHkHgshp9+rRz+oY9uoRil4CyLtgEuE/88dpkeWgNk5qKVsJE9iSfly3nvHapdRiIS2wnQ==", + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/plugin-transform-template-literals/-/plugin-transform-template-literals-7.8.3.tgz", + "integrity": "sha512-820QBtykIQOLFT8NZOcTRJ1UNuztIELe4p9DCgvj4NK+PwluSJ49we7s9FB1HIGNIYT7wFUJ0ar2QpCDj0escQ==", "requires": { - "@babel/helper-annotate-as-pure": "^7.7.4", - "@babel/helper-plugin-utils": "^7.0.0" + "@babel/helper-annotate-as-pure": "^7.8.3", + "@babel/helper-plugin-utils": "^7.8.3" } }, "@babel/plugin-transform-typeof-symbol": { @@ -1765,13 +923,6 @@ "integrity": "sha512-3TrkKd4LPqm4jHs6nPtSDI/SV9Cm5PRJkHLUgTcqRQQTMAZ44ZaAdDZJtvWFSaRcvT0a1rTmJ5ZA5tDKjleF3g==", "requires": { "@babel/helper-plugin-utils": "^7.8.3" - }, - "dependencies": { - "@babel/helper-plugin-utils": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-plugin-utils/-/helper-plugin-utils-7.8.3.tgz", - "integrity": "sha512-j+fq49Xds2smCUNYmEHF9kGNkhbet6yVIBp4e6oeQpH1RUs/Ir06xUKzDjDkGcaaokPiTNs2JBWHjaE4csUkZQ==" - } } }, "@babel/plugin-transform-typescript": { @@ -1782,159 +933,6 @@ "@babel/helper-create-class-features-plugin": "^7.8.3", "@babel/helper-plugin-utils": "^7.8.3", "@babel/plugin-syntax-typescript": "^7.8.3" - }, - "dependencies": { - "@babel/code-frame": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/code-frame/-/code-frame-7.8.3.tgz", - "integrity": "sha512-a9gxpmdXtZEInkCSHUJDLHZVBgb1QS0jhss4cPP93EW7s+uC5bikET2twEF3KV+7rDblJcmNvTR7VJejqd2C2g==", - "requires": { - "@babel/highlight": "^7.8.3" - } - }, - "@babel/generator": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/generator/-/generator-7.8.3.tgz", - "integrity": "sha512-WjoPk8hRpDRqqzRpvaR8/gDUPkrnOOeuT2m8cNICJtZH6mwaCo3v0OKMI7Y6SM1pBtyijnLtAL0HDi41pf41ug==", - "requires": { - "@babel/types": "^7.8.3", - "jsesc": "^2.5.1", - "lodash": "^4.17.13", - "source-map": "^0.5.0" - } - }, - "@babel/helper-create-class-features-plugin": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-create-class-features-plugin/-/helper-create-class-features-plugin-7.8.3.tgz", - "integrity": "sha512-qmp4pD7zeTxsv0JNecSBsEmG1ei2MqwJq4YQcK3ZWm/0t07QstWfvuV/vm3Qt5xNMFETn2SZqpMx2MQzbtq+KA==", - "requires": { - "@babel/helper-function-name": "^7.8.3", - "@babel/helper-member-expression-to-functions": "^7.8.3", - "@babel/helper-optimise-call-expression": "^7.8.3", - "@babel/helper-plugin-utils": "^7.8.3", - "@babel/helper-replace-supers": "^7.8.3", - "@babel/helper-split-export-declaration": "^7.8.3" - } - }, - "@babel/helper-function-name": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-function-name/-/helper-function-name-7.8.3.tgz", - "integrity": "sha512-BCxgX1BC2hD/oBlIFUgOCQDOPV8nSINxCwM3o93xP4P9Fq6aV5sgv2cOOITDMtCfQ+3PvHp3l689XZvAM9QyOA==", - "requires": { - "@babel/helper-get-function-arity": "^7.8.3", - "@babel/template": "^7.8.3", - "@babel/types": "^7.8.3" - } - }, - "@babel/helper-get-function-arity": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-get-function-arity/-/helper-get-function-arity-7.8.3.tgz", - "integrity": "sha512-FVDR+Gd9iLjUMY1fzE2SR0IuaJToR4RkCDARVfsBBPSP53GEqSFjD8gNyxg246VUyc/ALRxFaAK8rVG7UT7xRA==", - "requires": { - "@babel/types": "^7.8.3" - } - }, - "@babel/helper-member-expression-to-functions": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-member-expression-to-functions/-/helper-member-expression-to-functions-7.8.3.tgz", - "integrity": "sha512-fO4Egq88utkQFjbPrSHGmGLFqmrshs11d46WI+WZDESt7Wu7wN2G2Iu+NMMZJFDOVRHAMIkB5SNh30NtwCA7RA==", - "requires": { - "@babel/types": "^7.8.3" - } - }, - "@babel/helper-optimise-call-expression": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-optimise-call-expression/-/helper-optimise-call-expression-7.8.3.tgz", - "integrity": "sha512-Kag20n86cbO2AvHca6EJsvqAd82gc6VMGule4HwebwMlwkpXuVqrNRj6CkCV2sKxgi9MyAUnZVnZ6lJ1/vKhHQ==", - "requires": { - "@babel/types": "^7.8.3" - } - }, - "@babel/helper-plugin-utils": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-plugin-utils/-/helper-plugin-utils-7.8.3.tgz", - "integrity": "sha512-j+fq49Xds2smCUNYmEHF9kGNkhbet6yVIBp4e6oeQpH1RUs/Ir06xUKzDjDkGcaaokPiTNs2JBWHjaE4csUkZQ==" - }, - "@babel/helper-replace-supers": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-replace-supers/-/helper-replace-supers-7.8.3.tgz", - "integrity": "sha512-xOUssL6ho41U81etpLoT2RTdvdus4VfHamCuAm4AHxGr+0it5fnwoVdwUJ7GFEqCsQYzJUhcbsN9wB9apcYKFA==", - "requires": { - "@babel/helper-member-expression-to-functions": "^7.8.3", - "@babel/helper-optimise-call-expression": "^7.8.3", - "@babel/traverse": "^7.8.3", - "@babel/types": "^7.8.3" - } - }, - "@babel/helper-split-export-declaration": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-split-export-declaration/-/helper-split-export-declaration-7.8.3.tgz", - "integrity": "sha512-3x3yOeyBhW851hroze7ElzdkeRXQYQbFIb7gLK1WQYsw2GWDay5gAJNw1sWJ0VFP6z5J1whqeXH/WCdCjZv6dA==", - "requires": { - "@babel/types": "^7.8.3" - } - }, - "@babel/highlight": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/highlight/-/highlight-7.8.3.tgz", - "integrity": "sha512-PX4y5xQUvy0fnEVHrYOarRPXVWafSjTW9T0Hab8gVIawpl2Sj0ORyrygANq+KjcNlSSTw0YCLSNA8OyZ1I4yEg==", - "requires": { - "chalk": "^2.0.0", - "esutils": "^2.0.2", - "js-tokens": "^4.0.0" - } - }, - "@babel/parser": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/parser/-/parser-7.8.3.tgz", - "integrity": "sha512-/V72F4Yp/qmHaTALizEm9Gf2eQHV3QyTL3K0cNfijwnMnb1L+LDlAubb/ZnSdGAVzVSWakujHYs1I26x66sMeQ==" - }, - "@babel/template": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/template/-/template-7.8.3.tgz", - "integrity": "sha512-04m87AcQgAFdvuoyiQ2kgELr2tV8B4fP/xJAVUL3Yb3bkNdMedD3d0rlSQr3PegP0cms3eHjl1F7PWlvWbU8FQ==", - "requires": { - "@babel/code-frame": "^7.8.3", - "@babel/parser": "^7.8.3", - "@babel/types": "^7.8.3" - } - }, - "@babel/traverse": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/traverse/-/traverse-7.8.3.tgz", - "integrity": "sha512-we+a2lti+eEImHmEXp7bM9cTxGzxPmBiVJlLVD+FuuQMeeO7RaDbutbgeheDkw+Xe3mCfJHnGOWLswT74m2IPg==", - "requires": { - "@babel/code-frame": "^7.8.3", - "@babel/generator": "^7.8.3", - "@babel/helper-function-name": "^7.8.3", - "@babel/helper-split-export-declaration": "^7.8.3", - "@babel/parser": "^7.8.3", - "@babel/types": "^7.8.3", - "debug": "^4.1.0", - "globals": "^11.1.0", - "lodash": "^4.17.13" - } - }, - "@babel/types": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/types/-/types-7.8.3.tgz", - "integrity": "sha512-jBD+G8+LWpMBBWvVcdr4QysjUE4mU/syrhN17o1u3gx0/WzJB1kwiVZAXRtWbsIPOwW8pF/YJV5+nmetPzepXg==", - "requires": { - "esutils": "^2.0.2", - "lodash": "^4.17.13", - "to-fast-properties": "^2.0.0" - } - }, - "chalk": { - "version": "2.4.2", - "resolved": "https://registry.npmjs.org/chalk/-/chalk-2.4.2.tgz", - "integrity": "sha512-Mti+f9lpJNcwF4tWV8/OrTTtF1gZi+f8FqlyAdouralcFWFQWF2+NgCHShjkCb+IFBLq9buZwE1xckQU4peSuQ==", - "requires": { - "ansi-styles": "^3.2.1", - "escape-string-regexp": "^1.0.5", - "supports-color": "^5.3.0" - } - } } }, "@babel/plugin-transform-unicode-regex": { @@ -1944,13 +942,6 @@ "requires": { "@babel/helper-create-regexp-features-plugin": "^7.8.3", "@babel/helper-plugin-utils": "^7.8.3" - }, - "dependencies": { - "@babel/helper-plugin-utils": { - "version": "7.8.3", - "resolved": "https://registry.npmjs.org/@babel/helper-plugin-utils/-/helper-plugin-utils-7.8.3.tgz", - "integrity": "sha512-j+fq49Xds2smCUNYmEHF9kGNkhbet6yVIBp4e6oeQpH1RUs/Ir06xUKzDjDkGcaaokPiTNs2JBWHjaE4csUkZQ==" - } } }, "@babel/preset-env": { @@ -2045,9 +1036,9 @@ } }, "@babel/runtime": { - "version": "7.7.7", - "resolved": "https://registry.npmjs.org/@babel/runtime/-/runtime-7.7.7.tgz", - "integrity": "sha512-uCnC2JEVAu8AKB5do1WRIsvrdJ0flYx/A/9f/6chdacnEZ7LmavjdsDXr5ksYBegxtuTPR5Va9/+13QF/kFkCA==", + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/runtime/-/runtime-7.8.3.tgz", + "integrity": "sha512-fVHx1rzEmwB130VTkLnxR+HmxcTjGzH12LYQcFFoBwakMd3aOMD4OsRN7tGG/UOYE2ektgFrS8uACAoRk1CY0w==", "requires": { "regenerator-runtime": "^0.13.2" } @@ -2062,44 +1053,44 @@ } }, "@babel/runtime-corejs3": { - "version": "7.7.7", - "resolved": "https://registry.npmjs.org/@babel/runtime-corejs3/-/runtime-corejs3-7.7.7.tgz", - "integrity": "sha512-kr3W3Fw8mB/CTru2M5zIRQZZgC/9zOxNSoJ/tVCzjPt3H1/p5uuGbz6WwmaQy/TLQcW31rUhUUWKY28sXFRelA==", + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/runtime-corejs3/-/runtime-corejs3-7.8.3.tgz", + "integrity": "sha512-lrIU4aVbmlM/wQPzhEvzvNJskKyYptuXb0fGC0lTQTupTOYtR2Vqbu6/jf8vTr4M8Wt1nIzxVrSvPI5qESa/xA==", "requires": { "core-js-pure": "^3.0.0", "regenerator-runtime": "^0.13.2" } }, "@babel/template": { - "version": "7.7.4", - "resolved": "https://registry.npmjs.org/@babel/template/-/template-7.7.4.tgz", - "integrity": "sha512-qUzihgVPguAzXCK7WXw8pqs6cEwi54s3E+HrejlkuWO6ivMKx9hZl3Y2fSXp9i5HgyWmj7RKP+ulaYnKM4yYxw==", + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/template/-/template-7.8.3.tgz", + "integrity": "sha512-04m87AcQgAFdvuoyiQ2kgELr2tV8B4fP/xJAVUL3Yb3bkNdMedD3d0rlSQr3PegP0cms3eHjl1F7PWlvWbU8FQ==", "requires": { - "@babel/code-frame": "^7.0.0", - "@babel/parser": "^7.7.4", - "@babel/types": "^7.7.4" + "@babel/code-frame": "^7.8.3", + "@babel/parser": "^7.8.3", + "@babel/types": "^7.8.3" } }, "@babel/traverse": { - "version": "7.7.4", - "resolved": "https://registry.npmjs.org/@babel/traverse/-/traverse-7.7.4.tgz", - "integrity": "sha512-P1L58hQyupn8+ezVA2z5KBm4/Zr4lCC8dwKCMYzsa5jFMDMQAzaBNy9W5VjB+KAmBjb40U7a/H6ao+Xo+9saIw==", + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/traverse/-/traverse-7.8.3.tgz", + "integrity": "sha512-we+a2lti+eEImHmEXp7bM9cTxGzxPmBiVJlLVD+FuuQMeeO7RaDbutbgeheDkw+Xe3mCfJHnGOWLswT74m2IPg==", "requires": { - "@babel/code-frame": "^7.5.5", - "@babel/generator": "^7.7.4", - "@babel/helper-function-name": "^7.7.4", - "@babel/helper-split-export-declaration": "^7.7.4", - "@babel/parser": "^7.7.4", - "@babel/types": "^7.7.4", + "@babel/code-frame": "^7.8.3", + "@babel/generator": "^7.8.3", + "@babel/helper-function-name": "^7.8.3", + "@babel/helper-split-export-declaration": "^7.8.3", + "@babel/parser": "^7.8.3", + "@babel/types": "^7.8.3", "debug": "^4.1.0", "globals": "^11.1.0", "lodash": "^4.17.13" } }, "@babel/types": { - "version": "7.7.4", - "resolved": "https://registry.npmjs.org/@babel/types/-/types-7.7.4.tgz", - "integrity": "sha512-cz5Ji23KCi4T+YIE/BolWosrJuSmoZeN1EFnRtBwF+KKLi8GG/Z2c2hOJJeCXPk4mwk4QFvTmwIodJowXgttRA==", + "version": "7.8.3", + "resolved": "https://registry.npmjs.org/@babel/types/-/types-7.8.3.tgz", + "integrity": "sha512-jBD+G8+LWpMBBWvVcdr4QysjUE4mU/syrhN17o1u3gx0/WzJB1kwiVZAXRtWbsIPOwW8pF/YJV5+nmetPzepXg==", "requires": { "esutils": "^2.0.2", "lodash": "^4.17.13", @@ -2148,57 +1139,58 @@ "integrity": "sha512-ij4wRiunFfaJxjB0BdrYHIH8FxBJpOwNPhhAcunlmPdXudL1WQV1qoP9un6JsEBAgQH+7UXyyjh0g7jTxXK6tg==" }, "@graphql-codegen/core": { - "version": "1.10.0", - "resolved": "https://registry.npmjs.org/@graphql-codegen/core/-/core-1.10.0.tgz", - "integrity": "sha512-yKFqTO+OdsJ4MhHgN5D38Nc1EoLgBP0MQJeKYxyvYwKdYrxoyPGVNe15Tmn/HG/WrPyzg0bu9Je6CaNg8O+EQg==", + "version": "1.11.2", + "resolved": "https://registry.npmjs.org/@graphql-codegen/core/-/core-1.11.2.tgz", + "integrity": "sha512-ZEHbCtivUQXXPkTd+vrb6sSmCss45Z7YjeyC1mf0kStcEeAKygs6XM2k7F5a9wUQn3mxnyJRAnqfqNIdoagoUg==", "requires": { - "@graphql-codegen/plugin-helpers": "1.10.0", - "@graphql-toolkit/common": "0.8.1", - "@graphql-toolkit/schema-merging": "0.8.1", + "@graphql-codegen/plugin-helpers": "1.11.2", + "@graphql-toolkit/common": "0.9.0", + "@graphql-toolkit/schema-merging": "0.9.0", "tslib": "1.10.0" } }, "@graphql-codegen/fragment-matcher": { - "version": "1.10.0", - "resolved": "https://registry.npmjs.org/@graphql-codegen/fragment-matcher/-/fragment-matcher-1.10.0.tgz", - "integrity": "sha512-6jl/Jyd2SC+ttOaDeNqdvDoYvdOdElZdVpbvyV8QrauLQKhhts72kMroymBcNnyi1ETo/TUUCqHHmeWCKEIgWg==", + "version": "1.11.2", + "resolved": "https://registry.npmjs.org/@graphql-codegen/fragment-matcher/-/fragment-matcher-1.11.2.tgz", + "integrity": "sha512-pLXTwf1dN+CmeZb+5fIjVq41ygPFgQ4rnj6S5N/efHY8AYuGROS58+YXFjU4Nx0eMFj18ymsrrTBWEr2Xug7ZQ==", "requires": { - "@graphql-codegen/plugin-helpers": "1.10.0" + "@graphql-codegen/plugin-helpers": "1.11.2" } }, "@graphql-codegen/plugin-helpers": { - "version": "1.10.0", - "resolved": "https://registry.npmjs.org/@graphql-codegen/plugin-helpers/-/plugin-helpers-1.10.0.tgz", - "integrity": "sha512-+cJjd8x0eqzOEGNn4fsubSG0i4hTzAdAw3fm2/01PJajWWg/z6yImR0FvSqjrKcuWI1tcbEB0+LX3GoxzW1EGg==", + "version": "1.11.2", + "resolved": "https://registry.npmjs.org/@graphql-codegen/plugin-helpers/-/plugin-helpers-1.11.2.tgz", + "integrity": "sha512-jggDX2ykLU8EOdP8bpArkMtPTvJ72XYWa44f0GFIdhfSfZtK8PO/gMaSY8iPbV5DqD4HnYvMc3mXCoJTAPT8VQ==", "requires": { - "@graphql-toolkit/common": "0.8.1", + "@graphql-toolkit/common": "0.9.0", "camel-case": "4.1.1", "common-tags": "1.8.0", "constant-case": "3.0.3", "import-from": "3.0.0", "lower-case": "2.0.1", + "param-case": "3.0.3", "pascal-case": "3.1.1", "tslib": "1.10.0", "upper-case": "2.0.1" } }, "@graphql-codegen/typescript": { - "version": "1.10.0", - "resolved": "https://registry.npmjs.org/@graphql-codegen/typescript/-/typescript-1.10.0.tgz", - "integrity": "sha512-5hWU7+YNpW+xy7nGYh9No4STrZAvuIL9DFVbPqToJupfTLOZlmrOCw3Q60zUesdjOSk56EWk7M+5lfy128pv5A==", + "version": "1.11.2", + "resolved": "https://registry.npmjs.org/@graphql-codegen/typescript/-/typescript-1.11.2.tgz", + "integrity": "sha512-kOEVCqFnoHnMzjlHfquy8J226nUw9u7zS0ugTIJaYcmfOLuCGN4tysZgwGgp8HXh1kNb9ARTxewQV4VfZr6uBA==", "requires": { - "@graphql-codegen/plugin-helpers": "1.10.0", - "@graphql-codegen/visitor-plugin-common": "1.10.0", + "@graphql-codegen/plugin-helpers": "1.11.2", + "@graphql-codegen/visitor-plugin-common": "1.11.2", "auto-bind": "4.0.0", "tslib": "1.10.0" } }, "@graphql-codegen/visitor-plugin-common": { - "version": "1.10.0", - "resolved": "https://registry.npmjs.org/@graphql-codegen/visitor-plugin-common/-/visitor-plugin-common-1.10.0.tgz", - "integrity": "sha512-V+ChfifppuiBax9Mt2weC/ba6GLSZPdCVaoL3Q3g72mzsbkZm+l5CIcjQy84X98z8jIaeHEaQironfhIrYC09A==", + "version": "1.11.2", + "resolved": "https://registry.npmjs.org/@graphql-codegen/visitor-plugin-common/-/visitor-plugin-common-1.11.2.tgz", + "integrity": "sha512-pKakwkX1eLUExCIv1CUYtJtDVqyr0LGe6HKoILylsPupYSVc1GKF8YwPArMEhwkNdvNdtv+PtYeqnyuhfMcyzw==", "requires": { - "@graphql-codegen/plugin-helpers": "1.10.0", + "@graphql-codegen/plugin-helpers": "1.11.2", "auto-bind": "4.0.0", "dependency-graph": "0.8.1", "graphql-tag": "2.10.1", @@ -2230,9 +1222,9 @@ } }, "@graphql-toolkit/common": { - "version": "0.8.1", - "resolved": "https://registry.npmjs.org/@graphql-toolkit/common/-/common-0.8.1.tgz", - "integrity": "sha512-07ZMQnvsBkzR0XBHghPq9RUkpPSs6vifocV6vyhyW423QtjpJASNn1bTj5yxJy05p71hHr/iWtYHS1ClLuigvQ==", + "version": "0.9.0", + "resolved": "https://registry.npmjs.org/@graphql-toolkit/common/-/common-0.9.0.tgz", + "integrity": "sha512-bLuyt4yV/XIHUS+gP4aF5xjnb5M2K+uuB35Hojw0er+tkNhWiOuWQzRMWPovds/4WN2C9PuknQby/+ntgBOm/g==", "requires": { "@kamilkisiela/graphql-tools": "4.0.6", "aggregate-error": "3.0.1", @@ -2339,6 +1331,32 @@ "version": "7.7.7", "resolved": "https://registry.npmjs.org/@babel/parser/-/parser-7.7.7.tgz", "integrity": "sha512-WtTZMZAZLbeymhkd/sEaPD8IQyGAhmuTuvTzLiCFM7iXiVdY0gc0IaI+cW0fh1BnSMbJSzXX6/fHllgHKwHhXw==" + }, + "@babel/traverse": { + "version": "7.7.4", + "resolved": "https://registry.npmjs.org/@babel/traverse/-/traverse-7.7.4.tgz", + "integrity": "sha512-P1L58hQyupn8+ezVA2z5KBm4/Zr4lCC8dwKCMYzsa5jFMDMQAzaBNy9W5VjB+KAmBjb40U7a/H6ao+Xo+9saIw==", + "requires": { + "@babel/code-frame": "^7.5.5", + "@babel/generator": "^7.7.4", + "@babel/helper-function-name": "^7.7.4", + "@babel/helper-split-export-declaration": "^7.7.4", + "@babel/parser": "^7.7.4", + "@babel/types": "^7.7.4", + "debug": "^4.1.0", + "globals": "^11.1.0", + "lodash": "^4.17.13" + } + }, + "@babel/types": { + "version": "7.7.4", + "resolved": "https://registry.npmjs.org/@babel/types/-/types-7.7.4.tgz", + "integrity": "sha512-cz5Ji23KCi4T+YIE/BolWosrJuSmoZeN1EFnRtBwF+KKLi8GG/Z2c2hOJJeCXPk4mwk4QFvTmwIodJowXgttRA==", + "requires": { + "esutils": "^2.0.2", + "lodash": "^4.17.13", + "to-fast-properties": "^2.0.0" + } } } }, @@ -2365,11 +1383,11 @@ } }, "@graphql-toolkit/schema-merging": { - "version": "0.8.1", - "resolved": "https://registry.npmjs.org/@graphql-toolkit/schema-merging/-/schema-merging-0.8.1.tgz", - "integrity": "sha512-t7MALXHgru2YkCALsGe2HeTQCkm7sKg9sLO1GveJ41k3up9iW968nCENRyq+TmgIn7+OKAzfaHMUnB6hG+a+wQ==", + "version": "0.9.0", + "resolved": "https://registry.npmjs.org/@graphql-toolkit/schema-merging/-/schema-merging-0.9.0.tgz", + "integrity": "sha512-vrzkqkFXxZ4dXQrHeNGDDWONbOAVDeJmGPwK0cRu2aVszftvkYVJXBrmkMYzZJHwk+tGVkNywf1r00GR6prpOw==", "requires": { - "@graphql-toolkit/common": "0.8.1", + "@graphql-toolkit/common": "0.9.0", "@kamilkisiela/graphql-tools": "4.0.6", "deepmerge": "4.2.2", "tslib": "1.10.0" @@ -2510,45 +1528,11 @@ "typewriter": "^7.0.0" }, "dependencies": { - "cross-spawn": { - "version": "6.0.5", - "resolved": "https://registry.npmjs.org/cross-spawn/-/cross-spawn-6.0.5.tgz", - "integrity": "sha512-eTVLrBSt7fjbDygz805pMnstIs2VTBNkRm0qxZd+M7A5XDdxVRWO5MxGBXZhjY4cqLYLdtrGqRf8mBPmzwSpWQ==", - "requires": { - "nice-try": "^1.0.4", - "path-key": "^2.0.1", - "semver": "^5.5.0", - "shebang-command": "^1.2.0", - "which": "^1.2.9" - } - }, - "execa": { - "version": "1.0.0", - "resolved": "https://registry.npmjs.org/execa/-/execa-1.0.0.tgz", - "integrity": "sha512-adbxcyWV46qiHyvSp50TKt05tB4tK3HcmF7/nxfAdhnox83seTDbwnaqKO4sXRy7roHAIFqJP/Rw/AuEbX61LA==", - "requires": { - "cross-spawn": "^6.0.0", - "get-stream": "^4.0.0", - "is-stream": "^1.1.0", - "npm-run-path": "^2.0.0", - "p-finally": "^1.0.0", - "signal-exit": "^3.0.0", - "strip-eof": "^1.0.0" - } - }, "get-stdin": { "version": "7.0.0", "resolved": "https://registry.npmjs.org/get-stdin/-/get-stdin-7.0.0.tgz", "integrity": "sha512-zRKcywvrXlXsA0v0i9Io4KDRaAw7+a1ZpjRwl9Wox8PFlVCCHra7E9c4kqXCoCM9nR5tBkaTTZRBoCm60bFqTQ==" }, - "get-stream": { - "version": "4.1.0", - "resolved": "https://registry.npmjs.org/get-stream/-/get-stream-4.1.0.tgz", - "integrity": "sha512-GMat4EJ5161kIy2HevLlr4luNjBgvmj413KaQA7jt4V8B4RDsfpHk7WQ9GVqfYyyx8OS/L66Kox+rJRNklLK7w==", - "requires": { - "pump": "^3.0.0" - } - }, "husky": { "version": "3.1.0", "resolved": "https://registry.npmjs.org/husky/-/husky-3.1.0.tgz", @@ -2578,33 +1562,6 @@ } } } - }, - "parse-json": { - "version": "5.0.0", - "resolved": "https://registry.npmjs.org/parse-json/-/parse-json-5.0.0.tgz", - "integrity": "sha512-OOY5b7PAEFV0E2Fir1KOkxchnZNCdowAJgQ5NuxjpBKTRP3pQhwkrkxqQjeoKJ+fO7bCpmIZaogI4eZGDMEGOw==", - "requires": { - "@babel/code-frame": "^7.0.0", - "error-ex": "^1.3.1", - "json-parse-better-errors": "^1.0.1", - "lines-and-columns": "^1.1.6" - } - }, - "read-pkg": { - "version": "5.2.0", - "resolved": "https://registry.npmjs.org/read-pkg/-/read-pkg-5.2.0.tgz", - "integrity": "sha512-Ug69mNOpfvKDAc2Q8DRpMjjzdtrnv9HcSMX+4VsZxD1aZ6ZzrIE7rlzXBtWTyhULSMKg076AW6WR5iZpD0JiOg==", - "requires": { - "@types/normalize-package-data": "^2.4.0", - "normalize-package-data": "^2.5.0", - "parse-json": "^5.0.0", - "type-fest": "^0.6.0" - } - }, - "type-fest": { - "version": "0.6.0", - "resolved": "https://registry.npmjs.org/type-fest/-/type-fest-0.6.0.tgz", - "integrity": "sha512-q+MB8nYR1KDLrgr4G5yemftpMC7/QLqVndBmEEdqzmNj5dcFOO4Oo8qlwZE3ULT3+Zim1F8Kq4cBnikNhlCMlg==" } } }, @@ -2630,17 +1587,6 @@ "@hashicorp/react-button": "^2.1.2", "@hashicorp/react-image": "^2.0.1", "marked": "^0.7.0" - }, - "dependencies": { - "@hashicorp/react-button": { - "version": "2.1.2", - "resolved": "https://registry.npmjs.org/@hashicorp/react-button/-/react-button-2.1.2.tgz", - "integrity": "sha512-kLLr8FAbrIavSa4z4OyCFxgVx44quLa/d5c5eHif3lxerRUYRIbK4XhCkHTaqQ2y+S14cajjqIK+32+H/hyKdQ==", - "requires": { - "@hashicorp/react-global-styles": "^4.0.7", - "@hashicorp/react-inline-svg": "^1.0.0" - } - } } }, "@hashicorp/react-checkbox-input": { @@ -2671,17 +1617,6 @@ "js-cookie": "^2.2.0", "object-assign": "^4.1.1", "unfetch": "^4.1.0" - }, - "dependencies": { - "@hashicorp/react-button": { - "version": "2.1.2", - "resolved": "https://registry.npmjs.org/@hashicorp/react-button/-/react-button-2.1.2.tgz", - "integrity": "sha512-kLLr8FAbrIavSa4z4OyCFxgVx44quLa/d5c5eHif3lxerRUYRIbK4XhCkHTaqQ2y+S14cajjqIK+32+H/hyKdQ==", - "requires": { - "@hashicorp/react-global-styles": "^4.0.7", - "@hashicorp/react-inline-svg": "^1.0.0" - } - } } }, "@hashicorp/react-content": { @@ -2763,17 +1698,6 @@ "@hashicorp/react-button": "^2.1.2", "@hashicorp/react-image": "^2.0.1", "@tippy.js/react": "^2.1.2" - }, - "dependencies": { - "@hashicorp/react-button": { - "version": "2.1.2", - "resolved": "https://registry.npmjs.org/@hashicorp/react-button/-/react-button-2.1.2.tgz", - "integrity": "sha512-kLLr8FAbrIavSa4z4OyCFxgVx44quLa/d5c5eHif3lxerRUYRIbK4XhCkHTaqQ2y+S14cajjqIK+32+H/hyKdQ==", - "requires": { - "@hashicorp/react-global-styles": "^4.0.7", - "@hashicorp/react-inline-svg": "^1.0.0" - } - } } }, "@hashicorp/react-mega-nav": { @@ -2831,17 +1755,6 @@ "@hashicorp/react-image": "^2.0.1", "@hashicorp/react-logo-grid": "^2.0.5", "marked": "^0.7.0" - }, - "dependencies": { - "@hashicorp/react-button": { - "version": "2.1.2", - "resolved": "https://registry.npmjs.org/@hashicorp/react-button/-/react-button-2.1.2.tgz", - "integrity": "sha512-kLLr8FAbrIavSa4z4OyCFxgVx44quLa/d5c5eHif3lxerRUYRIbK4XhCkHTaqQ2y+S14cajjqIK+32+H/hyKdQ==", - "requires": { - "@hashicorp/react-global-styles": "^4.0.7", - "@hashicorp/react-inline-svg": "^1.0.0" - } - } } }, "@hashicorp/react-text-input": { @@ -2904,32 +1817,32 @@ } }, "@mdx-js/loader": { - "version": "1.5.3", - "resolved": "https://registry.npmjs.org/@mdx-js/loader/-/loader-1.5.3.tgz", - "integrity": "sha512-m3bT9b9xY8wU1sQwHhSuFiIwFm0LP7onDpm2rb3xikHzXNY7yfL1/lV9XF4iecSmd86/4I1L6RKE61Dq1jLqjA==", + "version": "1.5.5", + "resolved": "https://registry.npmjs.org/@mdx-js/loader/-/loader-1.5.5.tgz", + "integrity": "sha512-2/2WX73qj79Kv2cYk14kQsN/aypAH3RPzuNMx1gxwZjj77G0N6tzhM9WFkEDM/SXjasWep03ZmSRb9d//b2D8w==", "requires": { - "@mdx-js/mdx": "^1.5.3", - "@mdx-js/react": "^1.5.3", + "@mdx-js/mdx": "^1.5.5", + "@mdx-js/react": "^1.5.5", "loader-utils": "1.2.3" } }, "@mdx-js/mdx": { - "version": "1.5.3", - "resolved": "https://registry.npmjs.org/@mdx-js/mdx/-/mdx-1.5.3.tgz", - "integrity": "sha512-XxnOvyCQKri52tgaCXbV5NWnZGqgRsRifa/yJrxwWa6QG3vdFiEi/xokBHBf/62RCKRK4+QmbM4dSl0fgWIRNA==", + "version": "1.5.5", + "resolved": "https://registry.npmjs.org/@mdx-js/mdx/-/mdx-1.5.5.tgz", + "integrity": "sha512-Xv1lJ+VWt8giWQrqf4GdIBxl08SfepfIWAnuuIzuR+wA59SaXDvkW6XFIvl8u495OQEB1eugMvq8l2XR8ZGr1A==", "requires": { - "@babel/core": "7.7.4", - "@babel/plugin-syntax-jsx": "7.7.4", - "@babel/plugin-syntax-object-rest-spread": "7.7.4", - "@mdx-js/util": "^1.5.3", - "babel-plugin-apply-mdx-type-prop": "^1.5.3", - "babel-plugin-extract-import-names": "^1.5.3", + "@babel/core": "7.8.0", + "@babel/plugin-syntax-jsx": "7.8.0", + "@babel/plugin-syntax-object-rest-spread": "7.8.0", + "@mdx-js/util": "^1.5.5", + "babel-plugin-apply-mdx-type-prop": "^1.5.5", + "babel-plugin-extract-import-names": "^1.5.5", "camelcase-css": "2.0.1", "detab": "2.0.2", "hast-util-raw": "5.0.1", "lodash.uniq": "4.5.0", "mdast-util-to-hast": "6.0.2", - "remark-mdx": "^1.5.3", + "remark-mdx": "^1.5.5", "remark-parse": "7.0.2", "remark-squeeze-paragraphs": "3.0.4", "style-to-object": "0.3.0", @@ -2939,37 +1852,54 @@ }, "dependencies": { "@babel/core": { - "version": "7.7.4", - "resolved": "https://registry.npmjs.org/@babel/core/-/core-7.7.4.tgz", - "integrity": "sha512-+bYbx56j4nYBmpsWtnPUsKW3NdnYxbqyfrP2w9wILBuHzdfIKz9prieZK0DFPyIzkjYVUe4QkusGL07r5pXznQ==", + "version": "7.8.0", + "resolved": "https://registry.npmjs.org/@babel/core/-/core-7.8.0.tgz", + "integrity": "sha512-3rqPi/bv/Xfu2YzHvBz4XqMI1fKVwnhntPA1/fjoECrSjrhbOCxlTrbVu5gUtr8zkxW+RpkDOa/HCW93gzS2Dw==", "requires": { - "@babel/code-frame": "^7.5.5", - "@babel/generator": "^7.7.4", - "@babel/helpers": "^7.7.4", - "@babel/parser": "^7.7.4", - "@babel/template": "^7.7.4", - "@babel/traverse": "^7.7.4", - "@babel/types": "^7.7.4", + "@babel/code-frame": "^7.8.0", + "@babel/generator": "^7.8.0", + "@babel/helpers": "^7.8.0", + "@babel/parser": "^7.8.0", + "@babel/template": "^7.8.0", + "@babel/traverse": "^7.8.0", + "@babel/types": "^7.8.0", "convert-source-map": "^1.7.0", "debug": "^4.1.0", + "gensync": "^1.0.0-beta.1", "json5": "^2.1.0", "lodash": "^4.17.13", "resolve": "^1.3.2", "semver": "^5.4.1", "source-map": "^0.5.0" } + }, + "@babel/plugin-syntax-jsx": { + "version": "7.8.0", + "resolved": "https://registry.npmjs.org/@babel/plugin-syntax-jsx/-/plugin-syntax-jsx-7.8.0.tgz", + "integrity": "sha512-zLDUckAuKeOtxJhfNE0TlR7iEApb2u7EYRlh5cxKzq6A5VzUbYEdyJGJlug41jDbjRbHTtsLKZUnUcy/8V3xZw==", + "requires": { + "@babel/helper-plugin-utils": "^7.8.0" + } + }, + "@babel/plugin-syntax-object-rest-spread": { + "version": "7.8.0", + "resolved": "https://registry.npmjs.org/@babel/plugin-syntax-object-rest-spread/-/plugin-syntax-object-rest-spread-7.8.0.tgz", + "integrity": "sha512-dt89fDlkfkTrQcy5KavMQPyF2A6tR0kYp8HAnIoQv5hO34iAUffHghP/hMGd7Gf/+uYTmLQO0ar7peX1SUWyIA==", + "requires": { + "@babel/helper-plugin-utils": "^7.8.0" + } } } }, "@mdx-js/react": { - "version": "1.5.3", - "resolved": "https://registry.npmjs.org/@mdx-js/react/-/react-1.5.3.tgz", - "integrity": "sha512-5bVLUsZybjmeYL8l4Uh/ysE8vMn0Vb0GKzki/LicaDHJvXr/N4Tjj0gT4tk1OzhcC5nGQAQGIyQMW5pvIjp9XQ==" + "version": "1.5.5", + "resolved": "https://registry.npmjs.org/@mdx-js/react/-/react-1.5.5.tgz", + "integrity": "sha512-Qwvri4zyU9ZbhhXsH0wfSZ/J9b8mARRTB6GSCTnyKRffO2CaQXl9oLsvRAeQSLRei/onEARc+RexH+jMeNS1rw==" }, "@mdx-js/util": { - "version": "1.5.3", - "resolved": "https://registry.npmjs.org/@mdx-js/util/-/util-1.5.3.tgz", - "integrity": "sha512-OXeOtHO+eN50QlIkm4Vj4vqNGtowv4FH9L21WvcbEM0eeZrb7aANiFTN70lBQEXcucxCMRkd/6IA9LxhotZEQw==" + "version": "1.5.5", + "resolved": "https://registry.npmjs.org/@mdx-js/util/-/util-1.5.5.tgz", + "integrity": "sha512-IudQkyZuM8T1CrSX9r0ShPXCABjtEtyrV4lxQqhKAwFqw1aYpy/5LOZhitMLoJTybZPVdPotuh+zjqYy9ZOSbA==" }, "@mrmlnc/readdir-enhanced": { "version": "2.2.1", @@ -2981,9 +1911,9 @@ } }, "@next/bundle-analyzer": { - "version": "9.1.7", - "resolved": "https://registry.npmjs.org/@next/bundle-analyzer/-/bundle-analyzer-9.1.7.tgz", - "integrity": "sha512-UUMrZ2I3Ol9aPwEhzTu/tcINIZ8qMMhd9zkNmxyf7FPQOTsduJlbOfaTd4O4aM4aoolQ52Fb3UAJ0GxzlpG8Kg==", + "version": "9.2.0", + "resolved": "https://registry.npmjs.org/@next/bundle-analyzer/-/bundle-analyzer-9.2.0.tgz", + "integrity": "sha512-Epmvx+E7goV/vfWoTz/y3SPt0ui2IEkFKCgDVC7Fo4+wPVwfFLr5Hx5RHH788o6NPRh7kJv0LMgLjCBtBcKy7w==", "requires": { "webpack-bundle-analyzer": "3.3.2" } @@ -3101,9 +2031,9 @@ "integrity": "sha512-tHq6qdbT9U1IRSGf14CL0pUlULksvY9OZ+5eEgl1N7t+OA3tGvNpxJCzuKQlsNgCVwbAs670L1vcVQi8j9HjnA==" }, "@types/node": { - "version": "13.1.4", - "resolved": "https://registry.npmjs.org/@types/node/-/node-13.1.4.tgz", - "integrity": "sha512-Lue/mlp2egZJoHXZr4LndxDAd7i/7SQYhV0EjWfb/a4/OZ6tuVwMCVPiwkU5nsEipxEf7hmkSU7Em5VQ8P5NGA==" + "version": "13.1.8", + "resolved": "https://registry.npmjs.org/@types/node/-/node-13.1.8.tgz", + "integrity": "sha512-6XzyyNM9EKQW4HKuzbo/CkOIjn/evtCmsU+MUM1xDfJ+3/rNjBttM1NgN7AOQvN6tP1Sl1D1PIKMreTArnxM9A==" }, "@types/normalize-package-data": { "version": "2.4.0", @@ -3132,11 +2062,11 @@ "integrity": "sha512-te5lMAWii1uEJ4FwLjzdlbw3+n0FZNOvFXHxQDKeT0dilh7HOzdMzV2TrJVUzq8ep7J4Na8OUYPRLSQkJHAlrg==" }, "@typescript-eslint/eslint-plugin": { - "version": "2.15.0", - "resolved": "https://registry.npmjs.org/@typescript-eslint/eslint-plugin/-/eslint-plugin-2.15.0.tgz", - "integrity": "sha512-XRJFznI5v4K1WvIrWmjFjBAdQWaUTz4xJEdqR7+wAFsv6Q9dP3mOlE6BMNT3pdlp9eF1+bC5m5LZTmLMqffCVw==", + "version": "2.17.0", + "resolved": "https://registry.npmjs.org/@typescript-eslint/eslint-plugin/-/eslint-plugin-2.17.0.tgz", + "integrity": "sha512-tg/OMOtPeXlvk0ES8mZzEZ4gd1ruSE03nsKcK+teJhxYv5CPCXK6Mb/OK6NpB4+CqGTHs4MVeoSZXNFqpT1PyQ==", "requires": { - "@typescript-eslint/experimental-utils": "2.15.0", + "@typescript-eslint/experimental-utils": "2.17.0", "eslint-utils": "^1.4.3", "functional-red-black-tree": "^1.0.1", "regexpp": "^3.0.0", @@ -3144,36 +2074,36 @@ } }, "@typescript-eslint/experimental-utils": { - "version": "2.15.0", - "resolved": "https://registry.npmjs.org/@typescript-eslint/experimental-utils/-/experimental-utils-2.15.0.tgz", - "integrity": "sha512-Qkxu5zndY5hqlcQkmA88gfLvqQulMpX/TN91XC7OuXsRf4XG5xLGie0sbpX97o/oeccjeZYRMipIsjKk/tjDHA==", + "version": "2.17.0", + "resolved": "https://registry.npmjs.org/@typescript-eslint/experimental-utils/-/experimental-utils-2.17.0.tgz", + "integrity": "sha512-2bNf+mZ/3mj5/3CP56v+ldRK3vFy9jOvmCPs/Gr2DeSJh+asPZrhFniv4QmQsHWQFPJFWhFHgkGgJeRmK4m8iQ==", "requires": { "@types/json-schema": "^7.0.3", - "@typescript-eslint/typescript-estree": "2.15.0", + "@typescript-eslint/typescript-estree": "2.17.0", "eslint-scope": "^5.0.0" } }, "@typescript-eslint/parser": { - "version": "2.15.0", - "resolved": "https://registry.npmjs.org/@typescript-eslint/parser/-/parser-2.15.0.tgz", - "integrity": "sha512-6iSgQsqAYTaHw59t0tdjzZJluRAjswdGltzKEdLtcJOxR2UVTPHYvZRqkAVGCkaMVb6Fpa60NnuozNCvsSpA9g==", + "version": "2.17.0", + "resolved": "https://registry.npmjs.org/@typescript-eslint/parser/-/parser-2.17.0.tgz", + "integrity": "sha512-k1g3gRQ4fwfJoIfgUpz78AovicSWKFANmvTfkAHP24MgJHjWfZI6ya7tsQZt1sLczvP4G9BE5G5MgADHdmJB/w==", "requires": { "@types/eslint-visitor-keys": "^1.0.0", - "@typescript-eslint/experimental-utils": "2.15.0", - "@typescript-eslint/typescript-estree": "2.15.0", + "@typescript-eslint/experimental-utils": "2.17.0", + "@typescript-eslint/typescript-estree": "2.17.0", "eslint-visitor-keys": "^1.1.0" } }, "@typescript-eslint/typescript-estree": { - "version": "2.15.0", - "resolved": "https://registry.npmjs.org/@typescript-eslint/typescript-estree/-/typescript-estree-2.15.0.tgz", - "integrity": "sha512-L6Pog+w3VZzXkAdyqA0VlwybF8WcwZX+mufso86CMxSdWmcizJ38lgBdpqTbc9bo92iyi0rOvmATKiwl+amjxg==", + "version": "2.17.0", + "resolved": "https://registry.npmjs.org/@typescript-eslint/typescript-estree/-/typescript-estree-2.17.0.tgz", + "integrity": "sha512-g0eVRULGnEEUakxRfJO0s0Hr1LLQqsI6OrkiCLpdHtdJJek+wyd8mb00vedqAoWldeDcOcP8plqw8/jx9Gr3Lw==", "requires": { "debug": "^4.1.1", "eslint-visitor-keys": "^1.1.0", "glob": "^7.1.6", "is-glob": "^4.0.1", - "lodash.unescape": "4.0.1", + "lodash": "^4.17.15", "semver": "^6.3.0", "tsutils": "^3.17.1" }, @@ -3381,6 +2311,46 @@ "ignore-loader": "0.1.2", "mini-css-extract-plugin": "0.4.3", "postcss-loader": "3.0.0" + }, + "dependencies": { + "find-up": { + "version": "2.1.0", + "resolved": "https://registry.npmjs.org/find-up/-/find-up-2.1.0.tgz", + "integrity": "sha1-RdG35QbHF93UgndaK3eSCjwMV6c=", + "requires": { + "locate-path": "^2.0.0" + } + }, + "locate-path": { + "version": "2.0.0", + "resolved": "https://registry.npmjs.org/locate-path/-/locate-path-2.0.0.tgz", + "integrity": "sha1-K1aLJl7slExtnA3pw9u7ygNUzY4=", + "requires": { + "p-locate": "^2.0.0", + "path-exists": "^3.0.0" + } + }, + "p-limit": { + "version": "1.3.0", + "resolved": "https://registry.npmjs.org/p-limit/-/p-limit-1.3.0.tgz", + "integrity": "sha512-vvcXsLAJ9Dr5rQOPk7toZQZJApBl2K4J6dANSsEuh6QI41JYcsS/qhTGa9ErIUUgK3WNQoJYvylxvjqmiqEA9Q==", + "requires": { + "p-try": "^1.0.0" + } + }, + "p-locate": { + "version": "2.0.0", + "resolved": "https://registry.npmjs.org/p-locate/-/p-locate-2.0.0.tgz", + "integrity": "sha1-IKAQOyIqcMj9OcwuWAaA893l7EM=", + "requires": { + "p-limit": "^1.1.0" + } + }, + "p-try": { + "version": "1.0.0", + "resolved": "https://registry.npmjs.org/p-try/-/p-try-1.0.0.tgz", + "integrity": "sha1-y8ec26+P1CKOE/Yh8rGiN8GyB7M=" + } } }, "accepts": { @@ -3417,11 +2387,11 @@ } }, "ajv": { - "version": "6.10.2", - "resolved": "https://registry.npmjs.org/ajv/-/ajv-6.10.2.tgz", - "integrity": "sha512-TXtUUEYHuaTEbLZWIKUr5pmBuhDLy+8KYtPYdcV8qC+pOZL+NKqYwvWSRrVXHn+ZmRRAu8vJTAznH7Oag6RVRw==", + "version": "6.11.0", + "resolved": "https://registry.npmjs.org/ajv/-/ajv-6.11.0.tgz", + "integrity": "sha512-nCprB/0syFYy9fVYU1ox1l2KN8S9I+tziH8D4zdZuLT3N6RMlGSGt5FSTpAiHB/Whv8Qs1cWHma1aMKZyaHRKA==", "requires": { - "fast-deep-equal": "^2.0.1", + "fast-deep-equal": "^3.1.1", "fast-json-stable-stringify": "^2.0.0", "json-schema-traverse": "^0.4.1", "uri-js": "^4.2.2" @@ -3499,9 +2469,9 @@ "integrity": "sha1-gTWEAhliqenm/QOflA0S9WynhZ4=" }, "ansi-regex": { - "version": "2.1.1", - "resolved": "https://registry.npmjs.org/ansi-regex/-/ansi-regex-2.1.1.tgz", - "integrity": "sha1-w7M6te42DYbg5ijwRorn7yfWVN8=" + "version": "4.1.0", + "resolved": "https://registry.npmjs.org/ansi-regex/-/ansi-regex-4.1.0.tgz", + "integrity": "sha512-1apePfXM1UOSqw0o9IiFAovVz9M5S1Dg+4TrDwfMewQ6p/rmMueb7tWZjQ1rx4Loy1ArBggoqGpfqqdI4rondg==" }, "ansi-styles": { "version": "3.2.1", @@ -3698,57 +2668,6 @@ "define-properties": "^1.1.3", "es-abstract": "^1.17.0", "is-string": "^1.0.5" - }, - "dependencies": { - "es-abstract": { - "version": "1.17.0", - "resolved": "https://registry.npmjs.org/es-abstract/-/es-abstract-1.17.0.tgz", - "integrity": "sha512-yYkE07YF+6SIBmg1MsJ9dlub5L48Ek7X0qz+c/CPCHS9EBXfESorzng4cJQjJW5/pB6vDF41u7F8vUhLVDqIug==", - "requires": { - "es-to-primitive": "^1.2.1", - "function-bind": "^1.1.1", - "has": "^1.0.3", - "has-symbols": "^1.0.1", - "is-callable": "^1.1.5", - "is-regex": "^1.0.5", - "object-inspect": "^1.7.0", - "object-keys": "^1.1.1", - "object.assign": "^4.1.0", - "string.prototype.trimleft": "^2.1.1", - "string.prototype.trimright": "^2.1.1" - } - }, - "is-callable": { - "version": "1.1.5", - "resolved": "https://registry.npmjs.org/is-callable/-/is-callable-1.1.5.tgz", - "integrity": "sha512-ESKv5sMCJB2jnHTWZ3O5itG+O128Hsus4K4Qh1h2/cgn2vbgnLSVqfV46AeJA9D5EeeLa9w81KUXMtn34zhX+Q==" - }, - "is-regex": { - "version": "1.0.5", - "resolved": "https://registry.npmjs.org/is-regex/-/is-regex-1.0.5.tgz", - "integrity": "sha512-vlKW17SNq44owv5AQR3Cq0bQPEb8+kF3UKZ2fiZNOWtztYE5i0CzCZxFDwO58qAOWtxdBRVO/V5Qin1wjCqFYQ==", - "requires": { - "has": "^1.0.3" - } - }, - "string.prototype.trimleft": { - "version": "2.1.1", - "resolved": "https://registry.npmjs.org/string.prototype.trimleft/-/string.prototype.trimleft-2.1.1.tgz", - "integrity": "sha512-iu2AGd3PuP5Rp7x2kEZCrB2Nf41ehzh+goo8TV7z8/XDBbsvc6HQIlUl9RjkZ4oyrW1XM5UwlGl1oVEaDjg6Ag==", - "requires": { - "define-properties": "^1.1.3", - "function-bind": "^1.1.1" - } - }, - "string.prototype.trimright": { - "version": "2.1.1", - "resolved": "https://registry.npmjs.org/string.prototype.trimright/-/string.prototype.trimright-2.1.1.tgz", - "integrity": "sha512-qFvWL3/+QIgZXVmJBfpHmxLB7xsUXz6HsUmP8+5dRaC3Q7oKUv9Vo6aMCRZC1smrtyECFsIT30PqBJ1gTjAs+g==", - "requires": { - "define-properties": "^1.1.3", - "function-bind": "^1.1.1" - } - } } }, "array-union": { @@ -3920,29 +2839,80 @@ "resolved": "https://registry.npmjs.org/is-path-cwd/-/is-path-cwd-1.0.0.tgz", "integrity": "sha1-0iXsIxMuie3Tj9p2dHLmLmXxEG0=" }, + "load-json-file": { + "version": "2.0.0", + "resolved": "https://registry.npmjs.org/load-json-file/-/load-json-file-2.0.0.tgz", + "integrity": "sha1-eUfkIUmvgNaWy/eXvKq8/h/inKg=", + "requires": { + "graceful-fs": "^4.1.2", + "parse-json": "^2.2.0", + "pify": "^2.0.0", + "strip-bom": "^3.0.0" + }, + "dependencies": { + "pify": { + "version": "2.3.0", + "resolved": "https://registry.npmjs.org/pify/-/pify-2.3.0.tgz", + "integrity": "sha1-7RQaasBDqEnqWISY59yosVMw6Qw=" + } + } + }, "p-map": { "version": "1.2.0", "resolved": "https://registry.npmjs.org/p-map/-/p-map-1.2.0.tgz", "integrity": "sha512-r6zKACMNhjPJMTl8KcFH4li//gkrXWfbD6feV8l6doRHlzljFWGJ2AP6iKaCJXyZmAUMOPtvbW7EXkbWO/pLEA==" }, + "parse-json": { + "version": "2.2.0", + "resolved": "https://registry.npmjs.org/parse-json/-/parse-json-2.2.0.tgz", + "integrity": "sha1-9ID0BDTvgHQfhGkJn43qGPVaTck=", + "requires": { + "error-ex": "^1.2.0" + } + }, + "path-type": { + "version": "2.0.0", + "resolved": "https://registry.npmjs.org/path-type/-/path-type-2.0.0.tgz", + "integrity": "sha1-8BLMuEFbcJb8LaoQVMPXI4lZTHM=", + "requires": { + "pify": "^2.0.0" + }, + "dependencies": { + "pify": { + "version": "2.3.0", + "resolved": "https://registry.npmjs.org/pify/-/pify-2.3.0.tgz", + "integrity": "sha1-7RQaasBDqEnqWISY59yosVMw6Qw=" + } + } + }, "pify": { "version": "3.0.0", "resolved": "https://registry.npmjs.org/pify/-/pify-3.0.0.tgz", "integrity": "sha1-5aSs0sEB/fPZpNB/DbxNtJ3SgXY=" + }, + "read-pkg": { + "version": "2.0.0", + "resolved": "https://registry.npmjs.org/read-pkg/-/read-pkg-2.0.0.tgz", + "integrity": "sha1-jvHAYjxqbbDcZxPEv6xGMysjaPg=", + "requires": { + "load-json-file": "^2.0.0", + "normalize-package-data": "^2.3.2", + "path-type": "^2.0.0" + } } } }, "autoprefixer": { - "version": "9.7.3", - "resolved": "https://registry.npmjs.org/autoprefixer/-/autoprefixer-9.7.3.tgz", - "integrity": "sha512-8T5Y1C5Iyj6PgkPSFd0ODvK9DIleuPKUPYniNxybS47g2k2wFgLZ46lGQHlBuGKIAEV8fbCDfKCCRS1tvOgc3Q==", + "version": "9.7.4", + "resolved": "https://registry.npmjs.org/autoprefixer/-/autoprefixer-9.7.4.tgz", + "integrity": "sha512-g0Ya30YrMBAEZk60lp+qfX5YQllG+S5W3GYCFvyHTvhOki0AEQJLPEcIuGRsqVwLi8FvXPVtwTGhfr38hVpm0g==", "requires": { - "browserslist": "^4.8.0", - "caniuse-lite": "^1.0.30001012", + "browserslist": "^4.8.3", + "caniuse-lite": "^1.0.30001020", "chalk": "^2.4.2", "normalize-range": "^0.1.2", "num2fraction": "^1.2.2", - "postcss": "^7.0.23", + "postcss": "^7.0.26", "postcss-value-parser": "^4.0.2" }, "dependencies": { @@ -3957,9 +2927,9 @@ } }, "postcss": { - "version": "7.0.24", - "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.24.tgz", - "integrity": "sha512-Xl0XvdNWg+CblAXzNvbSOUvgJXwSjmbAKORqyw9V2AlHrm1js2gFw9y3jibBAhpKZi8b5JzJCVh/FyzPsTtgTA==", + "version": "7.0.26", + "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz", + "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==", "requires": { "chalk": "^2.4.2", "source-map": "^0.6.1", @@ -4031,6 +3001,11 @@ "js-tokens": "^3.0.2" }, "dependencies": { + "ansi-regex": { + "version": "2.1.1", + "resolved": "https://registry.npmjs.org/ansi-regex/-/ansi-regex-2.1.1.tgz", + "integrity": "sha1-w7M6te42DYbg5ijwRorn7yfWVN8=" + }, "ansi-styles": { "version": "2.2.1", "resolved": "https://registry.npmjs.org/ansi-styles/-/ansi-styles-2.2.1.tgz", @@ -4053,6 +3028,14 @@ "resolved": "https://registry.npmjs.org/js-tokens/-/js-tokens-3.0.2.tgz", "integrity": "sha1-mGbfOVECEw449/mWvOtlRDIJwls=" }, + "strip-ansi": { + "version": "3.0.1", + "resolved": "https://registry.npmjs.org/strip-ansi/-/strip-ansi-3.0.1.tgz", + "integrity": "sha1-ajhfuIU9lS1f8F0Oiq+UJ43GPc8=", + "requires": { + "ansi-regex": "^2.0.0" + } + }, "supports-color": { "version": "2.0.0", "resolved": "https://registry.npmjs.org/supports-color/-/supports-color-2.0.0.tgz", @@ -4099,23 +3082,6 @@ "pkg-dir": "^3.0.0" } }, - "find-up": { - "version": "3.0.0", - "resolved": "https://registry.npmjs.org/find-up/-/find-up-3.0.0.tgz", - "integrity": "sha512-1yD6RmLI1XBfxugvORwlck6f75tYL+iR0jqwsOrOxMZyGYqUuDhJ0l4AXdO1iX/FTs9cBAMEk1gWSEx1kSbylg==", - "requires": { - "locate-path": "^3.0.0" - } - }, - "locate-path": { - "version": "3.0.0", - "resolved": "https://registry.npmjs.org/locate-path/-/locate-path-3.0.0.tgz", - "integrity": "sha512-7AO748wWnIhNqAuaty2ZWHkQHRSNfPVIsPIfwEOWO22AmaoVrWavlOcMR5nzTLNYvp36X220/maaRsrec1G65A==", - "requires": { - "p-locate": "^3.0.0", - "path-exists": "^3.0.0" - } - }, "make-dir": { "version": "2.1.0", "resolved": "https://registry.npmjs.org/make-dir/-/make-dir-2.1.0.tgz", @@ -4125,32 +3091,6 @@ "semver": "^5.6.0" } }, - "p-limit": { - "version": "2.2.2", - "resolved": "https://registry.npmjs.org/p-limit/-/p-limit-2.2.2.tgz", - "integrity": "sha512-WGR+xHecKTr7EbUEhyLSh5Dube9JtdiG78ufaeLxTgpudf/20KqyMioIUZJAezlTIi6evxuoUs9YXc11cU+yzQ==", - "requires": { - "p-try": "^2.0.0" - } - }, - "p-locate": { - "version": "3.0.0", - "resolved": "https://registry.npmjs.org/p-locate/-/p-locate-3.0.0.tgz", - "integrity": "sha512-x+12w/To+4GFfgJhBEpiDcLozRJGegY+Ei7/z0tSLkMmxGZNybVMSfWj9aJn8Z5Fc7dBUNJOOVgPv2H7IwulSQ==", - "requires": { - "p-limit": "^2.0.0" - } - }, - "p-try": { - "version": "2.2.0", - "resolved": "https://registry.npmjs.org/p-try/-/p-try-2.2.0.tgz", - "integrity": "sha512-R4nPAVTAU0B9D35/Gk3uJf/7XYbQcyohSKdvAxIRSNghFl4e71hVoGnBNQz9cWaXxO2I10KTC+3jMdvvoKw6dQ==" - }, - "pify": { - "version": "4.0.1", - "resolved": "https://registry.npmjs.org/pify/-/pify-4.0.1.tgz", - "integrity": "sha512-uB80kBFb/tfd68bVleG9T5GGsGPjJrLAUpR5PZIrhBnIaRTQRjqdJSsIKkOP6OAIFbj7GOrcudc5pNjZ+geV2g==" - }, "pkg-dir": { "version": "3.0.0", "resolved": "https://registry.npmjs.org/pkg-dir/-/pkg-dir-3.0.0.tgz", @@ -4162,12 +3102,19 @@ } }, "babel-plugin-apply-mdx-type-prop": { - "version": "1.5.3", - "resolved": "https://registry.npmjs.org/babel-plugin-apply-mdx-type-prop/-/babel-plugin-apply-mdx-type-prop-1.5.3.tgz", - "integrity": "sha512-9G+V0R8Jx56nHdEnWvRmSN//rFXMDiBZynu9JPuu3KVUhZhaJMgx5CTiXcdR2P//c85Q/IuwPbH0vIGrjdSq8A==", + "version": "1.5.5", + "resolved": "https://registry.npmjs.org/babel-plugin-apply-mdx-type-prop/-/babel-plugin-apply-mdx-type-prop-1.5.5.tgz", + "integrity": "sha512-yaklz3xE5vFtZpPpYC9lDbTqlC6hq0CjgheiLw3i40lY8vG0DINh+HJ7rq1Gi1g0q/iihwetJ+YFGpUM4YXAGA==", "requires": { - "@babel/helper-plugin-utils": "7.0.0", - "@mdx-js/util": "^1.5.3" + "@babel/helper-plugin-utils": "7.8.0", + "@mdx-js/util": "^1.5.5" + }, + "dependencies": { + "@babel/helper-plugin-utils": { + "version": "7.8.0", + "resolved": "https://registry.npmjs.org/@babel/helper-plugin-utils/-/helper-plugin-utils-7.8.0.tgz", + "integrity": "sha512-+hAlRGdf8fHQAyNnDBqTHQhwdLURLdrCROoWaEQYiQhk2sV9Rhs+GoFZZfMJExTq9HG8o2NX3uN2G90bFtmFdA==" + } } }, "babel-plugin-dynamic-import-node": { @@ -4179,11 +3126,18 @@ } }, "babel-plugin-extract-import-names": { - "version": "1.5.3", - "resolved": "https://registry.npmjs.org/babel-plugin-extract-import-names/-/babel-plugin-extract-import-names-1.5.3.tgz", - "integrity": "sha512-UPgDHjNb4hr2xYRWO8C8JPX7GO+q3gluKd3pkcmVcd1gn9bdO7/yE5FKnYe1UkCPY7PhEUOpEzHCSuIy3GMpsQ==", + "version": "1.5.5", + "resolved": "https://registry.npmjs.org/babel-plugin-extract-import-names/-/babel-plugin-extract-import-names-1.5.5.tgz", + "integrity": "sha512-F9paxnUtO3vddyOX+vbRa8KrkuovJIFB8KmB/dEICqTUm2331LcGbjCKzZApOri4Igbk9MnYybm2fDsuPJC3vA==", "requires": { - "@babel/helper-plugin-utils": "7.0.0" + "@babel/helper-plugin-utils": "7.8.0" + }, + "dependencies": { + "@babel/helper-plugin-utils": { + "version": "7.8.0", + "resolved": "https://registry.npmjs.org/@babel/helper-plugin-utils/-/helper-plugin-utils-7.8.0.tgz", + "integrity": "sha512-+hAlRGdf8fHQAyNnDBqTHQhwdLURLdrCROoWaEQYiQhk2sV9Rhs+GoFZZfMJExTq9HG8o2NX3uN2G90bFtmFdA==" + } } }, "babel-plugin-import-glob-array": { @@ -4378,6 +3332,37 @@ "execa": "^0.7.0", "p-map-series": "^1.0.0", "tempfile": "^2.0.0" + }, + "dependencies": { + "cross-spawn": { + "version": "5.1.0", + "resolved": "https://registry.npmjs.org/cross-spawn/-/cross-spawn-5.1.0.tgz", + "integrity": "sha1-6L0O/uWPz/b4+UUQoKVUu/ojVEk=", + "requires": { + "lru-cache": "^4.0.1", + "shebang-command": "^1.2.0", + "which": "^1.2.9" + } + }, + "execa": { + "version": "0.7.0", + "resolved": "https://registry.npmjs.org/execa/-/execa-0.7.0.tgz", + "integrity": "sha1-lEvs00zEHuMqY6n68nrVpl/Fl3c=", + "requires": { + "cross-spawn": "^5.0.1", + "get-stream": "^3.0.0", + "is-stream": "^1.1.0", + "npm-run-path": "^2.0.0", + "p-finally": "^1.0.0", + "signal-exit": "^3.0.0", + "strip-eof": "^1.0.0" + } + }, + "get-stream": { + "version": "3.0.0", + "resolved": "https://registry.npmjs.org/get-stream/-/get-stream-3.0.0.tgz", + "integrity": "sha1-jpQ9E1jcN1VQVOy+LtsFqhdO3hQ=" + } } }, "bin-check": { @@ -4387,6 +3372,37 @@ "requires": { "execa": "^0.7.0", "executable": "^4.1.0" + }, + "dependencies": { + "cross-spawn": { + "version": "5.1.0", + "resolved": "https://registry.npmjs.org/cross-spawn/-/cross-spawn-5.1.0.tgz", + "integrity": "sha1-6L0O/uWPz/b4+UUQoKVUu/ojVEk=", + "requires": { + "lru-cache": "^4.0.1", + "shebang-command": "^1.2.0", + "which": "^1.2.9" + } + }, + "execa": { + "version": "0.7.0", + "resolved": "https://registry.npmjs.org/execa/-/execa-0.7.0.tgz", + "integrity": "sha1-lEvs00zEHuMqY6n68nrVpl/Fl3c=", + "requires": { + "cross-spawn": "^5.0.1", + "get-stream": "^3.0.0", + "is-stream": "^1.1.0", + "npm-run-path": "^2.0.0", + "p-finally": "^1.0.0", + "signal-exit": "^3.0.0", + "strip-eof": "^1.0.0" + } + }, + "get-stream": { + "version": "3.0.0", + "resolved": "https://registry.npmjs.org/get-stream/-/get-stream-3.0.0.tgz", + "integrity": "sha1-jpQ9E1jcN1VQVOy+LtsFqhdO3hQ=" + } } }, "bin-version": { @@ -4396,42 +3412,6 @@ "requires": { "execa": "^1.0.0", "find-versions": "^3.0.0" - }, - "dependencies": { - "cross-spawn": { - "version": "6.0.5", - "resolved": "https://registry.npmjs.org/cross-spawn/-/cross-spawn-6.0.5.tgz", - "integrity": "sha512-eTVLrBSt7fjbDygz805pMnstIs2VTBNkRm0qxZd+M7A5XDdxVRWO5MxGBXZhjY4cqLYLdtrGqRf8mBPmzwSpWQ==", - "requires": { - "nice-try": "^1.0.4", - "path-key": "^2.0.1", - "semver": "^5.5.0", - "shebang-command": "^1.2.0", - "which": "^1.2.9" - } - }, - "execa": { - "version": "1.0.0", - "resolved": "https://registry.npmjs.org/execa/-/execa-1.0.0.tgz", - "integrity": "sha512-adbxcyWV46qiHyvSp50TKt05tB4tK3HcmF7/nxfAdhnox83seTDbwnaqKO4sXRy7roHAIFqJP/Rw/AuEbX61LA==", - "requires": { - "cross-spawn": "^6.0.0", - "get-stream": "^4.0.0", - "is-stream": "^1.1.0", - "npm-run-path": "^2.0.0", - "p-finally": "^1.0.0", - "signal-exit": "^3.0.0", - "strip-eof": "^1.0.0" - } - }, - "get-stream": { - "version": "4.1.0", - "resolved": "https://registry.npmjs.org/get-stream/-/get-stream-4.1.0.tgz", - "integrity": "sha512-GMat4EJ5161kIy2HevLlr4luNjBgvmj413KaQA7jt4V8B4RDsfpHk7WQ9GVqfYyyx8OS/L66Kox+rJRNklLK7w==", - "requires": { - "pump": "^3.0.0" - } - } } }, "bin-version-check": { @@ -4514,6 +3494,11 @@ "resolved": "https://registry.npmjs.org/file-type/-/file-type-8.1.0.tgz", "integrity": "sha512-qyQ0pzAy78gVoJsmYeNgl8uH8yKhr1lVhW7JbzJmnlRi0I4R2eEDEJZVKG8agpDnLpacwNbDhLNG/LMdxHD2YQ==" }, + "get-stream": { + "version": "3.0.0", + "resolved": "https://registry.npmjs.org/get-stream/-/get-stream-3.0.0.tgz", + "integrity": "sha1-jpQ9E1jcN1VQVOy+LtsFqhdO3hQ=" + }, "got": { "version": "8.3.2", "resolved": "https://registry.npmjs.org/got/-/got-8.3.2.tgz", @@ -4594,11 +3579,6 @@ "p-finally": "^1.0.0" } }, - "pify": { - "version": "4.0.1", - "resolved": "https://registry.npmjs.org/pify/-/pify-4.0.1.tgz", - "integrity": "sha512-uB80kBFb/tfd68bVleG9T5GGsGPjJrLAUpR5PZIrhBnIaRTQRjqdJSsIKkOP6OAIFbj7GOrcudc5pNjZ+geV2g==" - }, "sort-keys": { "version": "2.0.0", "resolved": "https://registry.npmjs.org/sort-keys/-/sort-keys-2.0.0.tgz", @@ -4786,13 +3766,13 @@ } }, "browserslist": { - "version": "4.8.2", - "resolved": "https://registry.npmjs.org/browserslist/-/browserslist-4.8.2.tgz", - "integrity": "sha512-+M4oeaTplPm/f1pXDw84YohEv7B1i/2Aisei8s4s6k3QsoSHa7i5sz8u/cGQkkatCPxMASKxPualR4wwYgVboA==", + "version": "4.8.4", + "resolved": "https://registry.npmjs.org/browserslist/-/browserslist-4.8.4.tgz", + "integrity": "sha512-3qv/Ar3nRnRTpwGD+LZc7F4YHDBb3NAEIn+DesNa8TcBhyxf8eDqYwTOa70kiWXwvFjQQz+abbykJcyOlfBfNg==", "requires": { - "caniuse-lite": "^1.0.30001015", - "electron-to-chromium": "^1.3.322", - "node-releases": "^1.1.42" + "caniuse-lite": "^1.0.30001021", + "electron-to-chromium": "^1.3.338", + "node-releases": "^1.1.46" } }, "bser": { @@ -5057,9 +4037,9 @@ } }, "caniuse-lite": { - "version": "1.0.30001015", - "resolved": "https://registry.npmjs.org/caniuse-lite/-/caniuse-lite-1.0.30001015.tgz", - "integrity": "sha512-/xL2AbW/XWHNu1gnIrO8UitBGoFthcsDgU9VLK1/dpsoxbaD5LscHozKze05R6WLsBvLhqv78dAPozMFQBYLbQ==" + "version": "1.0.30001022", + "resolved": "https://registry.npmjs.org/caniuse-lite/-/caniuse-lite-1.0.30001022.tgz", + "integrity": "sha512-FjwPPtt/I07KyLPkBQ0g7/XuZg6oUkYBVnPHNj3VHJbOjmmJ/GdSo/GUY6MwINEQvjhP6WZVbX8Tvms8xh0D5A==" }, "caw": { "version": "2.0.1", @@ -5287,6 +4267,11 @@ "string-width": "^1.0.1" }, "dependencies": { + "ansi-regex": { + "version": "2.1.1", + "resolved": "https://registry.npmjs.org/ansi-regex/-/ansi-regex-2.1.1.tgz", + "integrity": "sha1-w7M6te42DYbg5ijwRorn7yfWVN8=" + }, "is-fullwidth-code-point": { "version": "1.0.0", "resolved": "https://registry.npmjs.org/is-fullwidth-code-point/-/is-fullwidth-code-point-1.0.0.tgz", @@ -5309,6 +4294,14 @@ "is-fullwidth-code-point": "^1.0.0", "strip-ansi": "^3.0.0" } + }, + "strip-ansi": { + "version": "3.0.1", + "resolved": "https://registry.npmjs.org/strip-ansi/-/strip-ansi-3.0.1.tgz", + "integrity": "sha1-ajhfuIU9lS1f8F0Oiq+UJ43GPc8=", + "requires": { + "ansi-regex": "^2.0.0" + } } } }, @@ -5325,21 +4318,6 @@ "string-width": "^3.1.0", "strip-ansi": "^5.2.0", "wrap-ansi": "^5.1.0" - }, - "dependencies": { - "ansi-regex": { - "version": "4.1.0", - "resolved": "https://registry.npmjs.org/ansi-regex/-/ansi-regex-4.1.0.tgz", - "integrity": "sha512-1apePfXM1UOSqw0o9IiFAovVz9M5S1Dg+4TrDwfMewQ6p/rmMueb7tWZjQ1rx4Loy1ArBggoqGpfqqdI4rondg==" - }, - "strip-ansi": { - "version": "5.2.0", - "resolved": "https://registry.npmjs.org/strip-ansi/-/strip-ansi-5.2.0.tgz", - "integrity": "sha512-DuRs1gKbBqsMKIZlrffwlug8MHkcnpjs5VPmL1PAh+mA30U0DTotfDZ0d2UUsXpPmPmMMJ6W773MaA3J+lbiWA==", - "requires": { - "ansi-regex": "^4.1.0" - } - } } }, "clone": { @@ -5450,13 +4428,6 @@ "integrity": "sha512-AF3r7P5dWxL8MxyITRMlORQNaOA2IkAFaTr4k7BUumjPtRpGDTZpl0Pb1XCO6JeDCBdp126Cgs9sMxqSjgYyRg==", "requires": { "mime-db": ">= 1.43.0 < 2" - }, - "dependencies": { - "mime-db": { - "version": "1.43.0", - "resolved": "https://registry.npmjs.org/mime-db/-/mime-db-1.43.0.tgz", - "integrity": "sha512-+5dsGEEovYbT8UY9yD7eE4XTc4UwJ1jBYlgaQQF38ENsKR3wj/8q8RFZrF9WIZpB2V1ArTVFUva8sAul1NzRzQ==" - } } }, "compression": { @@ -5635,36 +4606,6 @@ "semver": "7.0.0" }, "dependencies": { - "browserslist": { - "version": "4.8.3", - "resolved": "https://registry.npmjs.org/browserslist/-/browserslist-4.8.3.tgz", - "integrity": "sha512-iU43cMMknxG1ClEZ2MDKeonKE1CCrFVkQK2AqO2YWFmvIrx4JWrvQ4w4hQez6EpVI8rHTtqh/ruHHDHSOKxvUg==", - "requires": { - "caniuse-lite": "^1.0.30001017", - "electron-to-chromium": "^1.3.322", - "node-releases": "^1.1.44" - } - }, - "caniuse-lite": { - "version": "1.0.30001021", - "resolved": "https://registry.npmjs.org/caniuse-lite/-/caniuse-lite-1.0.30001021.tgz", - "integrity": "sha512-wuMhT7/hwkgd8gldgp2jcrUjOU9RXJ4XxGumQeOsUr91l3WwmM68Cpa/ymCnWEDqakwFXhuDQbaKNHXBPgeE9g==" - }, - "node-releases": { - "version": "1.1.45", - "resolved": "https://registry.npmjs.org/node-releases/-/node-releases-1.1.45.tgz", - "integrity": "sha512-cXvGSfhITKI8qsV116u2FTzH5EWZJfgG7d4cpqwF8I8+1tWpD6AsvvGRKq2onR0DNj1jfqsjkXZsm14JMS7Cyg==", - "requires": { - "semver": "^6.3.0" - }, - "dependencies": { - "semver": { - "version": "6.3.0", - "resolved": "https://registry.npmjs.org/semver/-/semver-6.3.0.tgz", - "integrity": "sha512-b39TBaTSfV6yBrapU89p5fKekE2m/NwnDocOVruQFS1/veMgdzuPcnOM34M6CwxW8jH/lxEa5rBoDeUwu5HHTw==" - } - } - }, "semver": { "version": "7.0.0", "resolved": "https://registry.npmjs.org/semver/-/semver-7.0.0.tgz", @@ -5673,9 +4614,9 @@ } }, "core-js-pure": { - "version": "3.6.2", - "resolved": "https://registry.npmjs.org/core-js-pure/-/core-js-pure-3.6.2.tgz", - "integrity": "sha512-PRasaCPjjCB65au2dMBPtxuIR6LM8MVNdbIbN57KxcDV1FAYQWlF0pqje/HC2sM6nm/s9KqSTkMTU75pozaghA==" + "version": "3.6.4", + "resolved": "https://registry.npmjs.org/core-js-pure/-/core-js-pure-3.6.4.tgz", + "integrity": "sha512-epIhRLkXdgv32xIUFaaAry2wdxZYBi6bgM7cB136dzzXXa+dFyRLTZeLUJxnd8ShrmyVXBub63n2NHo2JAt8Cw==" }, "core-util-is": { "version": "1.0.2", @@ -5691,17 +4632,6 @@ "is-directory": "^0.3.1", "js-yaml": "^3.13.1", "parse-json": "^4.0.0" - }, - "dependencies": { - "parse-json": { - "version": "4.0.0", - "resolved": "https://registry.npmjs.org/parse-json/-/parse-json-4.0.0.tgz", - "integrity": "sha1-vjX1Qlvh9/bHRxhPmKeIy5lHfuA=", - "requires": { - "error-ex": "^1.3.1", - "json-parse-better-errors": "^1.0.1" - } - } } }, "create-ecdh": { @@ -5790,11 +4720,13 @@ } }, "cross-spawn": { - "version": "5.1.0", - "resolved": "https://registry.npmjs.org/cross-spawn/-/cross-spawn-5.1.0.tgz", - "integrity": "sha1-6L0O/uWPz/b4+UUQoKVUu/ojVEk=", + "version": "6.0.5", + "resolved": "https://registry.npmjs.org/cross-spawn/-/cross-spawn-6.0.5.tgz", + "integrity": "sha512-eTVLrBSt7fjbDygz805pMnstIs2VTBNkRm0qxZd+M7A5XDdxVRWO5MxGBXZhjY4cqLYLdtrGqRf8mBPmzwSpWQ==", "requires": { - "lru-cache": "^4.0.1", + "nice-try": "^1.0.4", + "path-key": "^2.0.1", + "semver": "^5.5.0", "shebang-command": "^1.2.0", "which": "^1.2.9" } @@ -5869,9 +4801,9 @@ } }, "postcss": { - "version": "7.0.24", - "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.24.tgz", - "integrity": "sha512-Xl0XvdNWg+CblAXzNvbSOUvgJXwSjmbAKORqyw9V2AlHrm1js2gFw9y3jibBAhpKZi8b5JzJCVh/FyzPsTtgTA==", + "version": "7.0.26", + "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz", + "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==", "requires": { "chalk": "^2.4.2", "source-map": "^0.6.1", @@ -5923,9 +4855,9 @@ } }, "postcss": { - "version": "7.0.24", - "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.24.tgz", - "integrity": "sha512-Xl0XvdNWg+CblAXzNvbSOUvgJXwSjmbAKORqyw9V2AlHrm1js2gFw9y3jibBAhpKZi8b5JzJCVh/FyzPsTtgTA==", + "version": "7.0.26", + "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz", + "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==", "requires": { "chalk": "^2.4.2", "source-map": "^0.6.1", @@ -5995,9 +4927,9 @@ } }, "postcss": { - "version": "7.0.24", - "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.24.tgz", - "integrity": "sha512-Xl0XvdNWg+CblAXzNvbSOUvgJXwSjmbAKORqyw9V2AlHrm1js2gFw9y3jibBAhpKZi8b5JzJCVh/FyzPsTtgTA==", + "version": "7.0.26", + "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz", + "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==", "requires": { "chalk": "^2.4.2", "source-map": "^0.6.1", @@ -6251,6 +5183,13 @@ "make-dir": "^1.0.0", "pify": "^2.3.0", "strip-dirs": "^2.0.0" + }, + "dependencies": { + "pify": { + "version": "2.3.0", + "resolved": "https://registry.npmjs.org/pify/-/pify-2.3.0.tgz", + "integrity": "sha1-7RQaasBDqEnqWISY59yosVMw6Qw=" + } } }, "decompress-response": { @@ -6338,6 +5277,11 @@ "object-assign": "^4.0.1", "pinkie-promise": "^2.0.0" } + }, + "pify": { + "version": "2.3.0", + "resolved": "https://registry.npmjs.org/pify/-/pify-2.3.0.tgz", + "integrity": "sha1-7RQaasBDqEnqWISY59yosVMw6Qw=" } } }, @@ -6502,13 +5446,6 @@ "integrity": "sha512-WkrWp9GR4KXfKGYzOLmTuGVi1UWFfws377n9cc55/tb6DuqyF6pcQ5AbiHEshaDpY9v6oaSr2XCDidGmMwdzIA==", "requires": { "path-type": "^4.0.0" - }, - "dependencies": { - "path-type": { - "version": "4.0.0", - "resolved": "https://registry.npmjs.org/path-type/-/path-type-4.0.0.tgz", - "integrity": "sha512-gDKb8aZMDeD/tZWs9P6+q0J9Mwkdl6xMV8TjnGP3qJVJ06bdMgkbBlLU8IdfOsIsFz2BW1rNVT3XuNEl8zPAvw==" - } } }, "doctrine": { @@ -6554,6 +5491,15 @@ "domelementtype": "1" } }, + "dot-case": { + "version": "3.0.3", + "resolved": "https://registry.npmjs.org/dot-case/-/dot-case-3.0.3.tgz", + "integrity": "sha512-7hwEmg6RiSQfm/GwPL4AAWXKy3YNNZA3oFv2Pdiey0mwkRCPZ9x6SZbkLcn8Ma5PYeVokzoD4Twv2n7LKp5WeA==", + "requires": { + "no-case": "^3.0.3", + "tslib": "^1.10.0" + } + }, "dot-prop": { "version": "5.2.0", "resolved": "https://registry.npmjs.org/dot-prop/-/dot-prop-5.2.0.tgz", @@ -6592,6 +5538,11 @@ "resolved": "https://registry.npmjs.org/file-type/-/file-type-5.2.0.tgz", "integrity": "sha1-LdvqfHP/42No365J3DOMBYwritY=" }, + "get-stream": { + "version": "3.0.0", + "resolved": "https://registry.npmjs.org/get-stream/-/get-stream-3.0.0.tgz", + "integrity": "sha1-jpQ9E1jcN1VQVOy+LtsFqhdO3hQ=" + }, "got": { "version": "7.1.0", "resolved": "https://registry.npmjs.org/got/-/got-7.1.0.tgz", @@ -6675,9 +5626,9 @@ "integrity": "sha512-7vmuyh5+kuUyJKePhQfRQBhXV5Ce+RnaeeQArKu1EAMpL3WbgMt5WG6uQZpEVvYSSsxMXRKOewtDk9RaTKXRlA==" }, "electron-to-chromium": { - "version": "1.3.322", - "resolved": "https://registry.npmjs.org/electron-to-chromium/-/electron-to-chromium-1.3.322.tgz", - "integrity": "sha512-Tc8JQEfGQ1MzfSzI/bTlSr7btJv/FFO7Yh6tanqVmIWOuNCu6/D1MilIEgLtmWqIrsv+o4IjpLAhgMBr/ncNAA==" + "version": "1.3.338", + "resolved": "https://registry.npmjs.org/electron-to-chromium/-/electron-to-chromium-1.3.338.tgz", + "integrity": "sha512-wlmfixuHEc9CkfOKgcqdtzBmRW4NStM9ptl5oPILY2UDyHuSXb3Yit+yLVyLObTgGuMMU36hhnfs2GDJId7ctA==" }, "elegant-spinner": { "version": "1.0.1", @@ -6777,28 +5728,29 @@ } }, "error-stack-parser": { - "version": "2.0.4", - "resolved": "https://registry.npmjs.org/error-stack-parser/-/error-stack-parser-2.0.4.tgz", - "integrity": "sha512-fZ0KkoxSjLFmhW5lHbUT3tLwy3nX1qEzMYo8koY1vrsAco53CMT1djnBSeC/wUjTEZRhZl9iRw7PaMaxfJ4wzQ==", + "version": "2.0.6", + "resolved": "https://registry.npmjs.org/error-stack-parser/-/error-stack-parser-2.0.6.tgz", + "integrity": "sha512-d51brTeqC+BHlwF0BhPtcYgF5nlzf9ZZ0ZIUQNZpc9ZB9qw5IJ2diTrBY9jlCJkTLITYPjmiX6OWCwH+fuyNgQ==", "requires": { - "stackframe": "^1.1.0" + "stackframe": "^1.1.1" } }, "es-abstract": { - "version": "1.16.3", - "resolved": "https://registry.npmjs.org/es-abstract/-/es-abstract-1.16.3.tgz", - "integrity": "sha512-WtY7Fx5LiOnSYgF5eg/1T+GONaGmpvpPdCpSnYij+U2gDTL0UPfWrhDw7b2IYb+9NQJsYpCA0wOQvZfsd6YwRw==", + "version": "1.17.4", + "resolved": "https://registry.npmjs.org/es-abstract/-/es-abstract-1.17.4.tgz", + "integrity": "sha512-Ae3um/gb8F0mui/jPL+QiqmglkUsaQf7FwBEHYIFkztkneosu9imhqHpBzQ3h1vit8t5iQ74t6PEVvphBZiuiQ==", "requires": { "es-to-primitive": "^1.2.1", "function-bind": "^1.1.1", "has": "^1.0.3", "has-symbols": "^1.0.1", - "is-callable": "^1.1.4", - "is-regex": "^1.0.4", + "is-callable": "^1.1.5", + "is-regex": "^1.0.5", "object-inspect": "^1.7.0", "object-keys": "^1.1.1", - "string.prototype.trimleft": "^2.1.0", - "string.prototype.trimright": "^2.1.0" + "object.assign": "^4.1.0", + "string.prototype.trimleft": "^2.1.1", + "string.prototype.trimright": "^2.1.1" } }, "es-to-primitive": { @@ -6865,11 +5817,6 @@ "v8-compile-cache": "^2.0.3" }, "dependencies": { - "ansi-regex": { - "version": "4.1.0", - "resolved": "https://registry.npmjs.org/ansi-regex/-/ansi-regex-4.1.0.tgz", - "integrity": "sha512-1apePfXM1UOSqw0o9IiFAovVz9M5S1Dg+4TrDwfMewQ6p/rmMueb7tWZjQ1rx4Loy1ArBggoqGpfqqdI4rondg==" - }, "chalk": { "version": "2.4.2", "resolved": "https://registry.npmjs.org/chalk/-/chalk-2.4.2.tgz", @@ -6880,25 +5827,6 @@ "supports-color": "^5.3.0" } }, - "cross-spawn": { - "version": "6.0.5", - "resolved": "https://registry.npmjs.org/cross-spawn/-/cross-spawn-6.0.5.tgz", - "integrity": "sha512-eTVLrBSt7fjbDygz805pMnstIs2VTBNkRm0qxZd+M7A5XDdxVRWO5MxGBXZhjY4cqLYLdtrGqRf8mBPmzwSpWQ==", - "requires": { - "nice-try": "^1.0.4", - "path-key": "^2.0.1", - "semver": "^5.5.0", - "shebang-command": "^1.2.0", - "which": "^1.2.9" - }, - "dependencies": { - "semver": { - "version": "5.7.1", - "resolved": "https://registry.npmjs.org/semver/-/semver-5.7.1.tgz", - "integrity": "sha512-sauaDf/PZdVgrLTNYHRtpXa1iRiKcaebiKQ1BJdpQlWH2lCvexQdX55snPFyK7QzpudqbCI0qXFfOasHdyNDGQ==" - } - } - }, "glob-parent": { "version": "5.1.0", "resolved": "https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.0.tgz", @@ -6938,14 +5866,6 @@ "version": "6.3.0", "resolved": "https://registry.npmjs.org/semver/-/semver-6.3.0.tgz", "integrity": "sha512-b39TBaTSfV6yBrapU89p5fKekE2m/NwnDocOVruQFS1/veMgdzuPcnOM34M6CwxW8jH/lxEa5rBoDeUwu5HHTw==" - }, - "strip-ansi": { - "version": "5.2.0", - "resolved": "https://registry.npmjs.org/strip-ansi/-/strip-ansi-5.2.0.tgz", - "integrity": "sha512-DuRs1gKbBqsMKIZlrffwlug8MHkcnpjs5VPmL1PAh+mA30U0DTotfDZ0d2UUsXpPmPmMMJ6W773MaA3J+lbiWA==", - "requires": { - "ansi-regex": "^4.1.0" - } } } }, @@ -6957,11 +5877,6 @@ "get-stdin": "^6.0.0" } }, - "eslint-plugin-eslint-plugin": { - "version": "2.1.0", - "resolved": "https://registry.npmjs.org/eslint-plugin-eslint-plugin/-/eslint-plugin-eslint-plugin-2.1.0.tgz", - "integrity": "sha512-kT3A/ZJftt28gbl/Cv04qezb/NQ1dwYIbi8lyf806XMxkus7DvOVCLIfTXMrorp322Pnoez7+zabXH29tADIDg==" - }, "eslint-plugin-jsx-a11y": { "version": "6.2.3", "resolved": "https://registry.npmjs.org/eslint-plugin-jsx-a11y/-/eslint-plugin-jsx-a11y-6.2.3.tgz", @@ -6979,20 +5894,19 @@ } }, "eslint-plugin-react": { - "version": "7.17.0", - "resolved": "https://registry.npmjs.org/eslint-plugin-react/-/eslint-plugin-react-7.17.0.tgz", - "integrity": "sha512-ODB7yg6lxhBVMeiH1c7E95FLD4E/TwmFjltiU+ethv7KPdCwgiFuOZg9zNRHyufStTDLl/dEFqI2Q1VPmCd78A==", + "version": "7.18.0", + "resolved": "https://registry.npmjs.org/eslint-plugin-react/-/eslint-plugin-react-7.18.0.tgz", + "integrity": "sha512-p+PGoGeV4SaZRDsXqdj9OWcOrOpZn8gXoGPcIQTzo2IDMbAKhNDnME9myZWqO3Ic4R3YmwAZ1lDjWl2R2hMUVQ==", "requires": { - "array-includes": "^3.0.3", + "array-includes": "^3.1.1", "doctrine": "^2.1.0", - "eslint-plugin-eslint-plugin": "^2.1.0", "has": "^1.0.3", "jsx-ast-utils": "^2.2.3", - "object.entries": "^1.1.0", - "object.fromentries": "^2.0.1", - "object.values": "^1.1.0", + "object.entries": "^1.1.1", + "object.fromentries": "^2.0.2", + "object.values": "^1.1.1", "prop-types": "^15.7.2", - "resolve": "^1.13.1" + "resolve": "^1.14.2" }, "dependencies": { "doctrine": { @@ -7106,6 +6020,35 @@ "tempfile": "^2.0.0" }, "dependencies": { + "cross-spawn": { + "version": "5.1.0", + "resolved": "https://registry.npmjs.org/cross-spawn/-/cross-spawn-5.1.0.tgz", + "integrity": "sha1-6L0O/uWPz/b4+UUQoKVUu/ojVEk=", + "requires": { + "lru-cache": "^4.0.1", + "shebang-command": "^1.2.0", + "which": "^1.2.9" + } + }, + "execa": { + "version": "0.7.0", + "resolved": "https://registry.npmjs.org/execa/-/execa-0.7.0.tgz", + "integrity": "sha1-lEvs00zEHuMqY6n68nrVpl/Fl3c=", + "requires": { + "cross-spawn": "^5.0.1", + "get-stream": "^3.0.0", + "is-stream": "^1.1.0", + "npm-run-path": "^2.0.0", + "p-finally": "^1.0.0", + "signal-exit": "^3.0.0", + "strip-eof": "^1.0.0" + } + }, + "get-stream": { + "version": "3.0.0", + "resolved": "https://registry.npmjs.org/get-stream/-/get-stream-3.0.0.tgz", + "integrity": "sha1-jpQ9E1jcN1VQVOy+LtsFqhdO3hQ=" + }, "pify": { "version": "3.0.0", "resolved": "https://registry.npmjs.org/pify/-/pify-3.0.0.tgz", @@ -7114,12 +6057,12 @@ } }, "execa": { - "version": "0.7.0", - "resolved": "https://registry.npmjs.org/execa/-/execa-0.7.0.tgz", - "integrity": "sha1-lEvs00zEHuMqY6n68nrVpl/Fl3c=", + "version": "1.0.0", + "resolved": "https://registry.npmjs.org/execa/-/execa-1.0.0.tgz", + "integrity": "sha512-adbxcyWV46qiHyvSp50TKt05tB4tK3HcmF7/nxfAdhnox83seTDbwnaqKO4sXRy7roHAIFqJP/Rw/AuEbX61LA==", "requires": { - "cross-spawn": "^5.0.1", - "get-stream": "^3.0.0", + "cross-spawn": "^6.0.0", + "get-stream": "^4.0.0", "is-stream": "^1.1.0", "npm-run-path": "^2.0.0", "p-finally": "^1.0.0", @@ -7133,6 +6076,13 @@ "integrity": "sha512-8iA79xD3uAch729dUG8xaaBBFGaEa0wdD2VkYLFHwlqosEj/jT66AzcreRDSgV7ehnNLBW2WR5jIXwGKjVdTLg==", "requires": { "pify": "^2.2.0" + }, + "dependencies": { + "pify": { + "version": "2.3.0", + "resolved": "https://registry.npmjs.org/pify/-/pify-2.3.0.tgz", + "integrity": "sha1-7RQaasBDqEnqWISY59yosVMw6Qw=" + } } }, "expand-brackets": { @@ -7348,9 +6298,9 @@ "integrity": "sha512-G8A0hT/WCWIjesZm7BwbWdST5dQ08GNnCpTrJT/k/FYzuiJwlV1gyWjnuoizOzAR4jpEYXG2J++JyEKN/EB26Q==" }, "fast-deep-equal": { - "version": "2.0.1", - "resolved": "https://registry.npmjs.org/fast-deep-equal/-/fast-deep-equal-2.0.1.tgz", - "integrity": "sha1-ewUhjd+WZ79/Nwv3/bLLFf3Qqkk=" + "version": "3.1.1", + "resolved": "https://registry.npmjs.org/fast-deep-equal/-/fast-deep-equal-3.1.1.tgz", + "integrity": "sha512-8UEa58QDLauDNfpbrX55Q9jrGHThw2ZMdOky5Gl1CDtVeJDPVrG4Jxx1N8jw2gkWaff5UUuX1KJd+9zGe2B+ZA==" }, "fast-glob": { "version": "2.2.7", @@ -7366,9 +6316,9 @@ } }, "fast-json-stable-stringify": { - "version": "2.0.0", - "resolved": "https://registry.npmjs.org/fast-json-stable-stringify/-/fast-json-stable-stringify-2.0.0.tgz", - "integrity": "sha1-1RQsDK7msRifh9OnYREGT4bIu/I=" + "version": "2.1.0", + "resolved": "https://registry.npmjs.org/fast-json-stable-stringify/-/fast-json-stable-stringify-2.1.0.tgz", + "integrity": "sha512-lhd/wF+Lk98HZoTCtlVraHtfh5XYijIjalXck7saUtuanSDyLMxnHhSXEDJqHxD7msR8D0uCmqlkwjCV8xvwHw==" }, "fast-levenshtein": { "version": "2.0.6", @@ -7553,6 +6503,44 @@ "pkg-dir": "^2.0.0" }, "dependencies": { + "find-up": { + "version": "2.1.0", + "resolved": "https://registry.npmjs.org/find-up/-/find-up-2.1.0.tgz", + "integrity": "sha1-RdG35QbHF93UgndaK3eSCjwMV6c=", + "requires": { + "locate-path": "^2.0.0" + } + }, + "locate-path": { + "version": "2.0.0", + "resolved": "https://registry.npmjs.org/locate-path/-/locate-path-2.0.0.tgz", + "integrity": "sha1-K1aLJl7slExtnA3pw9u7ygNUzY4=", + "requires": { + "p-locate": "^2.0.0", + "path-exists": "^3.0.0" + } + }, + "p-limit": { + "version": "1.3.0", + "resolved": "https://registry.npmjs.org/p-limit/-/p-limit-1.3.0.tgz", + "integrity": "sha512-vvcXsLAJ9Dr5rQOPk7toZQZJApBl2K4J6dANSsEuh6QI41JYcsS/qhTGa9ErIUUgK3WNQoJYvylxvjqmiqEA9Q==", + "requires": { + "p-try": "^1.0.0" + } + }, + "p-locate": { + "version": "2.0.0", + "resolved": "https://registry.npmjs.org/p-locate/-/p-locate-2.0.0.tgz", + "integrity": "sha1-IKAQOyIqcMj9OcwuWAaA893l7EM=", + "requires": { + "p-limit": "^1.1.0" + } + }, + "p-try": { + "version": "1.0.0", + "resolved": "https://registry.npmjs.org/p-try/-/p-try-1.0.0.tgz", + "integrity": "sha1-y8ec26+P1CKOE/Yh8rGiN8GyB7M=" + }, "pkg-dir": { "version": "2.0.0", "resolved": "https://registry.npmjs.org/pkg-dir/-/pkg-dir-2.0.0.tgz", @@ -7564,11 +6552,11 @@ } }, "find-up": { - "version": "2.1.0", - "resolved": "https://registry.npmjs.org/find-up/-/find-up-2.1.0.tgz", - "integrity": "sha1-RdG35QbHF93UgndaK3eSCjwMV6c=", + "version": "3.0.0", + "resolved": "https://registry.npmjs.org/find-up/-/find-up-3.0.0.tgz", + "integrity": "sha512-1yD6RmLI1XBfxugvORwlck6f75tYL+iR0jqwsOrOxMZyGYqUuDhJ0l4AXdO1iX/FTs9cBAMEk1gWSEx1kSbylg==", "requires": { - "locate-path": "^2.0.0" + "locate-path": "^3.0.0" } }, "find-versions": { @@ -7775,6 +6763,11 @@ "resolved": "https://registry.npmjs.org/fuzzysearch/-/fuzzysearch-1.0.3.tgz", "integrity": "sha1-3/yA9tawQiPyImqnndGUIxCW0Ag=" }, + "gensync": { + "version": "1.0.0-beta.1", + "resolved": "https://registry.npmjs.org/gensync/-/gensync-1.0.0-beta.1.tgz", + "integrity": "sha512-r8EC6NO1sngH/zdD9fiRDLdcgnbayXah+mLgManTaIZJqEC1MZstmnox8KpnI2/fxQwrp5OpCOYWLp4rBl4Jcg==" + }, "get-caller-file": { "version": "2.0.5", "resolved": "https://registry.npmjs.org/get-caller-file/-/get-caller-file-2.0.5.tgz", @@ -7799,9 +6792,12 @@ "integrity": "sha512-jp4tHawyV7+fkkSKyvjuLZswblUtz+SQKzSWnBbii16BuZksJlU1wuBYXY75r+duh/llF1ur6oNwi+2ZzjKZ7g==" }, "get-stream": { - "version": "3.0.0", - "resolved": "https://registry.npmjs.org/get-stream/-/get-stream-3.0.0.tgz", - "integrity": "sha1-jpQ9E1jcN1VQVOy+LtsFqhdO3hQ=" + "version": "4.1.0", + "resolved": "https://registry.npmjs.org/get-stream/-/get-stream-4.1.0.tgz", + "integrity": "sha512-GMat4EJ5161kIy2HevLlr4luNjBgvmj413KaQA7jt4V8B4RDsfpHk7WQ9GVqfYyyx8OS/L66Kox+rJRNklLK7w==", + "requires": { + "pump": "^3.0.0" + } }, "get-value": { "version": "2.0.6", @@ -7966,16 +6962,6 @@ "p-cancelable": "^1.0.0", "to-readable-stream": "^1.0.0", "url-parse-lax": "^3.0.0" - }, - "dependencies": { - "get-stream": { - "version": "4.1.0", - "resolved": "https://registry.npmjs.org/get-stream/-/get-stream-4.1.0.tgz", - "integrity": "sha512-GMat4EJ5161kIy2HevLlr4luNjBgvmj413KaQA7jt4V8B4RDsfpHk7WQ9GVqfYyyx8OS/L66Kox+rJRNklLK7w==", - "requires": { - "pump": "^3.0.0" - } - } } }, "graceful-fs": { @@ -8098,13 +7084,6 @@ "requires": { "duplexer": "^0.1.1", "pify": "^4.0.1" - }, - "dependencies": { - "pify": { - "version": "4.0.1", - "resolved": "https://registry.npmjs.org/pify/-/pify-4.0.1.tgz", - "integrity": "sha512-uB80kBFb/tfd68bVleG9T5GGsGPjJrLAUpR5PZIrhBnIaRTQRjqdJSsIKkOP6OAIFbj7GOrcudc5pNjZ+geV2g==" - } } }, "handlebars": { @@ -8139,6 +7118,13 @@ "integrity": "sha1-NPUEnOHs3ysGSa8+8k5F7TVBbZE=", "requires": { "ansi-regex": "^2.0.0" + }, + "dependencies": { + "ansi-regex": { + "version": "2.1.1", + "resolved": "https://registry.npmjs.org/ansi-regex/-/ansi-regex-2.1.1.tgz", + "integrity": "sha1-w7M6te42DYbg5ijwRorn7yfWVN8=" + } } }, "has-flag": { @@ -8316,12 +7302,9 @@ "optional": true }, "highlight.js": { - "version": "9.17.1", - "resolved": "https://registry.npmjs.org/highlight.js/-/highlight.js-9.17.1.tgz", - "integrity": "sha512-TA2/doAur5Ol8+iM3Ov7qy3jYcr/QiJ2eDTdRF4dfbjG7AaaB99J5G+zSl11ljbl6cIcahgPY6SKb3sC3EJ0fw==", - "requires": { - "handlebars": "^4.5.3" - } + "version": "9.18.0", + "resolved": "https://registry.npmjs.org/highlight.js/-/highlight.js-9.18.0.tgz", + "integrity": "sha512-A97kI1KAUzKoAiEoaGcf2O9YPS8nbDTCRFokaaeBhnqjQTvbAuAJrQMm21zw8s8xzaMtCQBtgbyGXLGxdxQyqQ==" }, "hmac-drbg": { "version": "1.0.1", @@ -8446,12 +7429,6 @@ "lines-and-columns": "^1.1.6" } }, - "path-type": { - "version": "4.0.0", - "resolved": "https://registry.npmjs.org/path-type/-/path-type-4.0.0.tgz", - "integrity": "sha512-gDKb8aZMDeD/tZWs9P6+q0J9Mwkdl6xMV8TjnGP3qJVJ06bdMgkbBlLU8IdfOsIsFz2BW1rNVT3XuNEl8zPAvw==", - "dev": true - }, "resolve-from": { "version": "4.0.0", "resolved": "https://registry.npmjs.org/resolve-from/-/resolve-from-4.0.0.tgz", @@ -8572,11 +7549,6 @@ } } }, - "pify": { - "version": "4.0.1", - "resolved": "https://registry.npmjs.org/pify/-/pify-4.0.1.tgz", - "integrity": "sha512-uB80kBFb/tfd68bVleG9T5GGsGPjJrLAUpR5PZIrhBnIaRTQRjqdJSsIKkOP6OAIFbj7GOrcudc5pNjZ+geV2g==" - }, "slash": { "version": "1.0.0", "resolved": "https://registry.npmjs.org/slash/-/slash-1.0.0.tgz", @@ -8592,42 +7564,6 @@ "execa": "^1.0.0", "is-jpg": "^2.0.0", "mozjpeg": "^6.0.0" - }, - "dependencies": { - "cross-spawn": { - "version": "6.0.5", - "resolved": "https://registry.npmjs.org/cross-spawn/-/cross-spawn-6.0.5.tgz", - "integrity": "sha512-eTVLrBSt7fjbDygz805pMnstIs2VTBNkRm0qxZd+M7A5XDdxVRWO5MxGBXZhjY4cqLYLdtrGqRf8mBPmzwSpWQ==", - "requires": { - "nice-try": "^1.0.4", - "path-key": "^2.0.1", - "semver": "^5.5.0", - "shebang-command": "^1.2.0", - "which": "^1.2.9" - } - }, - "execa": { - "version": "1.0.0", - "resolved": "https://registry.npmjs.org/execa/-/execa-1.0.0.tgz", - "integrity": "sha512-adbxcyWV46qiHyvSp50TKt05tB4tK3HcmF7/nxfAdhnox83seTDbwnaqKO4sXRy7roHAIFqJP/Rw/AuEbX61LA==", - "requires": { - "cross-spawn": "^6.0.0", - "get-stream": "^4.0.0", - "is-stream": "^1.1.0", - "npm-run-path": "^2.0.0", - "p-finally": "^1.0.0", - "signal-exit": "^3.0.0", - "strip-eof": "^1.0.0" - } - }, - "get-stream": { - "version": "4.1.0", - "resolved": "https://registry.npmjs.org/get-stream/-/get-stream-4.1.0.tgz", - "integrity": "sha512-GMat4EJ5161kIy2HevLlr4luNjBgvmj413KaQA7jt4V8B4RDsfpHk7WQ9GVqfYyyx8OS/L66Kox+rJRNklLK7w==", - "requires": { - "pump": "^3.0.0" - } - } } }, "imagemin-optipng": { @@ -8928,6 +7864,11 @@ } } }, + "mimic-fn": { + "version": "1.2.0", + "resolved": "https://registry.npmjs.org/mimic-fn/-/mimic-fn-1.2.0.tgz", + "integrity": "sha512-jf84uxzwiuiIVKiOLpfYk7N46TSy8ubTonmneY9vrpHNAnp0QBt2BxWV9dO3/j+BoVAb+a5G6YDPW3M5HOdMWQ==" + }, "onetime": { "version": "2.0.1", "resolved": "https://registry.npmjs.org/onetime/-/onetime-2.0.1.tgz", @@ -9025,10 +7966,11 @@ } }, "ink-text-input": { - "version": "3.2.1", - "resolved": "https://registry.npmjs.org/ink-text-input/-/ink-text-input-3.2.1.tgz", - "integrity": "sha512-gU5Q3+xq0koDsTEkW0U6k3nNXjN4r9g/b6goo/jHlK2g4R5M6d22KnLEO6yFDYHQO1D27aTdSUk4HH+Nz8lQKg==", + "version": "3.2.2", + "resolved": "https://registry.npmjs.org/ink-text-input/-/ink-text-input-3.2.2.tgz", + "integrity": "sha512-h4EEJYOO88uK16U1mhgmJBMYeEy8ZmkrdV6gybyluCbAOQtAyND/WuRQVIKhe7D2dtYd2wwYTC648nuAxwltPQ==", "requires": { + "chalk": "^3.0.0", "prop-types": "^15.5.10" } }, @@ -9101,21 +8043,6 @@ } } } - }, - "strip-ansi": { - "version": "5.2.0", - "resolved": "https://registry.npmjs.org/strip-ansi/-/strip-ansi-5.2.0.tgz", - "integrity": "sha512-DuRs1gKbBqsMKIZlrffwlug8MHkcnpjs5VPmL1PAh+mA30U0DTotfDZ0d2UUsXpPmPmMMJ6W773MaA3J+lbiWA==", - "requires": { - "ansi-regex": "^4.1.0" - }, - "dependencies": { - "ansi-regex": { - "version": "4.1.0", - "resolved": "https://registry.npmjs.org/ansi-regex/-/ansi-regex-4.1.0.tgz", - "integrity": "sha512-1apePfXM1UOSqw0o9IiFAovVz9M5S1Dg+4TrDwfMewQ6p/rmMueb7tWZjQ1rx4Loy1ArBggoqGpfqqdI4rondg==" - } - } } } }, @@ -9202,9 +8129,9 @@ "integrity": "sha512-NcdALwpXkTm5Zvvbk7owOUSvVvBKDgKP5/ewfXEznmQFfs4ZRmanOeKBTjRVjka3QFoN6XJ+9F3USqfHqTaU5w==" }, "is-callable": { - "version": "1.1.4", - "resolved": "https://registry.npmjs.org/is-callable/-/is-callable-1.1.4.tgz", - "integrity": "sha512-r5p9sxJjYnArLjObpjA4xu5EKI3CuKHkJXMhT7kwbpUyIFD1n5PMAsoPvWnvtZiNz7LjkYDRZhd7FlI0eMijEA==" + "version": "1.1.5", + "resolved": "https://registry.npmjs.org/is-callable/-/is-callable-1.1.5.tgz", + "integrity": "sha512-ESKv5sMCJB2jnHTWZ3O5itG+O128Hsus4K4Qh1h2/cgn2vbgnLSVqfV46AeJA9D5EeeLa9w81KUXMtn34zhX+Q==" }, "is-ci": { "version": "2.0.0", @@ -9233,9 +8160,9 @@ } }, "is-date-object": { - "version": "1.0.1", - "resolved": "https://registry.npmjs.org/is-date-object/-/is-date-object-1.0.1.tgz", - "integrity": "sha1-mqIOtq7rv/d/vTPnTKAbM1gdOhY=" + "version": "1.0.2", + "resolved": "https://registry.npmjs.org/is-date-object/-/is-date-object-1.0.2.tgz", + "integrity": "sha512-USlDT524woQ08aoZFzh3/Z6ch9Y/EWXEHQ/AaRN0SkKq4t2Jw2R2339tSXmwuVoY7LLlBCbOIlx2myP/L5zk0g==" }, "is-decimal": { "version": "1.0.3", @@ -9380,9 +8307,9 @@ "integrity": "sha512-/2UGPSgmtqwo1ktx8NDHjuPwZWmHhO+gj0f93EkhLB5RgW9RZevWYYlIkS6zePc6U2WpOdQYIwHe9YC4DWEBVg==" }, "is-plain-obj": { - "version": "2.0.0", - "resolved": "https://registry.npmjs.org/is-plain-obj/-/is-plain-obj-2.0.0.tgz", - "integrity": "sha512-EYisGhpgSCwspmIuRHGjROWTon2Xp8Z7U03Wubk/bTL5TTRC5R1rGVgyjzBrk9+ULdH6cRD06KRcw/xfqhVYKQ==" + "version": "2.1.0", + "resolved": "https://registry.npmjs.org/is-plain-obj/-/is-plain-obj-2.1.0.tgz", + "integrity": "sha512-YWnfyRwxL/+SsrWYfOpUtz5b3YD+nyfkHvjbcanzk8zgyO4ASD67uVMRt8k5bM4lLMDnXfriRhOpemw+NfT1eA==" }, "is-plain-object": { "version": "2.0.4", @@ -9403,11 +8330,11 @@ "integrity": "sha1-eaKp7OfwlugPNtKy87wWwf9L8/o=" }, "is-regex": { - "version": "1.0.4", - "resolved": "https://registry.npmjs.org/is-regex/-/is-regex-1.0.4.tgz", - "integrity": "sha1-VRdIm1RwkbCTDglWVM7SXul+lJE=", + "version": "1.0.5", + "resolved": "https://registry.npmjs.org/is-regex/-/is-regex-1.0.5.tgz", + "integrity": "sha512-vlKW17SNq44owv5AQR3Cq0bQPEb8+kF3UKZ2fiZNOWtztYE5i0CzCZxFDwO58qAOWtxdBRVO/V5Qin1wjCqFYQ==", "requires": { - "has": "^1.0.1" + "has": "^1.0.3" } }, "is-regexp": { @@ -9669,9 +8596,9 @@ } }, "kind-of": { - "version": "6.0.2", - "resolved": "https://registry.npmjs.org/kind-of/-/kind-of-6.0.2.tgz", - "integrity": "sha512-s5kLOcnH0XqDO+FvuaLX8DDjZ18CGFk7VygH40QoKPUQhW4e2rvM0rwUq0t8IQDOwYSeLK01U90OjzBTme2QqA==" + "version": "6.0.3", + "resolved": "https://registry.npmjs.org/kind-of/-/kind-of-6.0.3.tgz", + "integrity": "sha512-dcS1ul+9tmeD95T+x28/ehLgd9mENa3LsvDTtzm3vyBEO7RPptvAD+t44WVXaUjTBRcrpFeFlC8WCruUR456hw==" }, "latest-version": { "version": "5.1.0", @@ -9908,6 +8835,11 @@ "strip-ansi": "^3.0.1" }, "dependencies": { + "ansi-regex": { + "version": "2.1.1", + "resolved": "https://registry.npmjs.org/ansi-regex/-/ansi-regex-2.1.1.tgz", + "integrity": "sha1-w7M6te42DYbg5ijwRorn7yfWVN8=" + }, "ansi-styles": { "version": "2.2.1", "resolved": "https://registry.npmjs.org/ansi-styles/-/ansi-styles-2.2.1.tgz", @@ -9947,6 +8879,14 @@ "chalk": "^1.0.0" } }, + "strip-ansi": { + "version": "3.0.1", + "resolved": "https://registry.npmjs.org/strip-ansi/-/strip-ansi-3.0.1.tgz", + "integrity": "sha1-ajhfuIU9lS1f8F0Oiq+UJ43GPc8=", + "requires": { + "ansi-regex": "^2.0.0" + } + }, "supports-color": { "version": "2.0.0", "resolved": "https://registry.npmjs.org/supports-color/-/supports-color-2.0.0.tgz", @@ -9991,6 +8931,11 @@ "escape-string-regexp": "^1.0.5" } }, + "mimic-fn": { + "version": "1.2.0", + "resolved": "https://registry.npmjs.org/mimic-fn/-/mimic-fn-1.2.0.tgz", + "integrity": "sha512-jf84uxzwiuiIVKiOLpfYk7N46TSy8ubTonmneY9vrpHNAnp0QBt2BxWV9dO3/j+BoVAb+a5G6YDPW3M5HOdMWQ==" + }, "onetime": { "version": "2.0.1", "resolved": "https://registry.npmjs.org/onetime/-/onetime-2.0.1.tgz", @@ -10011,14 +8956,21 @@ } }, "load-json-file": { - "version": "2.0.0", - "resolved": "https://registry.npmjs.org/load-json-file/-/load-json-file-2.0.0.tgz", - "integrity": "sha1-eUfkIUmvgNaWy/eXvKq8/h/inKg=", + "version": "4.0.0", + "resolved": "https://registry.npmjs.org/load-json-file/-/load-json-file-4.0.0.tgz", + "integrity": "sha1-L19Fq5HjMhYjT9U62rZo607AmTs=", "requires": { "graceful-fs": "^4.1.2", - "parse-json": "^2.2.0", - "pify": "^2.0.0", + "parse-json": "^4.0.0", + "pify": "^3.0.0", "strip-bom": "^3.0.0" + }, + "dependencies": { + "pify": { + "version": "3.0.0", + "resolved": "https://registry.npmjs.org/pify/-/pify-3.0.0.tgz", + "integrity": "sha1-5aSs0sEB/fPZpNB/DbxNtJ3SgXY=" + } } }, "loader-runner": { @@ -10047,11 +8999,11 @@ } }, "locate-path": { - "version": "2.0.0", - "resolved": "https://registry.npmjs.org/locate-path/-/locate-path-2.0.0.tgz", - "integrity": "sha1-K1aLJl7slExtnA3pw9u7ygNUzY4=", + "version": "3.0.0", + "resolved": "https://registry.npmjs.org/locate-path/-/locate-path-3.0.0.tgz", + "integrity": "sha512-7AO748wWnIhNqAuaty2ZWHkQHRSNfPVIsPIfwEOWO22AmaoVrWavlOcMR5nzTLNYvp36X220/maaRsrec1G65A==", "requires": { - "p-locate": "^2.0.0", + "p-locate": "^3.0.0", "path-exists": "^3.0.0" } }, @@ -10112,11 +9064,6 @@ "resolved": "https://registry.npmjs.org/lodash.throttle/-/lodash.throttle-4.1.1.tgz", "integrity": "sha1-wj6RtxAkKscMN/HhzaknTMOb8vQ=" }, - "lodash.unescape": { - "version": "4.0.1", - "resolved": "https://registry.npmjs.org/lodash.unescape/-/lodash.unescape-4.0.1.tgz", - "integrity": "sha1-vyJJiGzlFM2hEvrpIYzcBlIR/Jw=" - }, "lodash.uniq": { "version": "4.5.0", "resolved": "https://registry.npmjs.org/lodash.uniq/-/lodash.uniq-4.5.0.tgz", @@ -10170,6 +9117,11 @@ "restore-cursor": "^2.0.0" } }, + "mimic-fn": { + "version": "1.2.0", + "resolved": "https://registry.npmjs.org/mimic-fn/-/mimic-fn-1.2.0.tgz", + "integrity": "sha512-jf84uxzwiuiIVKiOLpfYk7N46TSy8ubTonmneY9vrpHNAnp0QBt2BxWV9dO3/j+BoVAb+a5G6YDPW3M5HOdMWQ==" + }, "onetime": { "version": "2.0.1", "resolved": "https://registry.npmjs.org/onetime/-/onetime-2.0.1.tgz", @@ -10515,74 +9467,6 @@ "read-pkg-up": "^1.0.1", "redent": "^1.0.0", "trim-newlines": "^1.0.0" - }, - "dependencies": { - "find-up": { - "version": "1.1.2", - "resolved": "https://registry.npmjs.org/find-up/-/find-up-1.1.2.tgz", - "integrity": "sha1-ay6YIrGizgpgq2TWEOzK1TyyTQ8=", - "requires": { - "path-exists": "^2.0.0", - "pinkie-promise": "^2.0.0" - } - }, - "load-json-file": { - "version": "1.1.0", - "resolved": "https://registry.npmjs.org/load-json-file/-/load-json-file-1.1.0.tgz", - "integrity": "sha1-lWkFcI1YtLq0wiYbBPWfMcmTdMA=", - "requires": { - "graceful-fs": "^4.1.2", - "parse-json": "^2.2.0", - "pify": "^2.0.0", - "pinkie-promise": "^2.0.0", - "strip-bom": "^2.0.0" - } - }, - "path-exists": { - "version": "2.1.0", - "resolved": "https://registry.npmjs.org/path-exists/-/path-exists-2.1.0.tgz", - "integrity": "sha1-D+tsZPD8UY2adU3V77YscCJ2H0s=", - "requires": { - "pinkie-promise": "^2.0.0" - } - }, - "path-type": { - "version": "1.1.0", - "resolved": "https://registry.npmjs.org/path-type/-/path-type-1.1.0.tgz", - "integrity": "sha1-WcRPfuSR2nBNpBXaWkBwuk+P5EE=", - "requires": { - "graceful-fs": "^4.1.2", - "pify": "^2.0.0", - "pinkie-promise": "^2.0.0" - } - }, - "read-pkg": { - "version": "1.1.0", - "resolved": "https://registry.npmjs.org/read-pkg/-/read-pkg-1.1.0.tgz", - "integrity": "sha1-9f+qXs0pyzHAR0vKfXVra7KePyg=", - "requires": { - "load-json-file": "^1.0.0", - "normalize-package-data": "^2.3.2", - "path-type": "^1.0.0" - } - }, - "read-pkg-up": { - "version": "1.0.1", - "resolved": "https://registry.npmjs.org/read-pkg-up/-/read-pkg-up-1.0.1.tgz", - "integrity": "sha1-nWPBMnbAZZGNV/ACpX9AobZD+wI=", - "requires": { - "find-up": "^1.0.0", - "read-pkg": "^1.0.0" - } - }, - "strip-bom": { - "version": "2.0.0", - "resolved": "https://registry.npmjs.org/strip-bom/-/strip-bom-2.0.0.tgz", - "integrity": "sha1-YhmoVhZSBJHzV4i9vxRHqZx+aw4=", - "requires": { - "is-utf8": "^0.2.0" - } - } } }, "merge-descriptors": { @@ -10645,22 +9529,22 @@ "integrity": "sha512-x0Vn8spI+wuJ1O6S7gnbaQg8Pxh4NNHb7KSINmEWKiPE4RKOplvijn+NkmYmmRgP68mc70j2EbeTFRsrswaQeg==" }, "mime-db": { - "version": "1.42.0", - "resolved": "https://registry.npmjs.org/mime-db/-/mime-db-1.42.0.tgz", - "integrity": "sha512-UbfJCR4UAVRNgMpfImz05smAXK7+c+ZntjaA26ANtkXLlOe947Aag5zdIcKQULAiF9Cq4WxBi9jUs5zkA84bYQ==" + "version": "1.43.0", + "resolved": "https://registry.npmjs.org/mime-db/-/mime-db-1.43.0.tgz", + "integrity": "sha512-+5dsGEEovYbT8UY9yD7eE4XTc4UwJ1jBYlgaQQF38ENsKR3wj/8q8RFZrF9WIZpB2V1ArTVFUva8sAul1NzRzQ==" }, "mime-types": { - "version": "2.1.25", - "resolved": "https://registry.npmjs.org/mime-types/-/mime-types-2.1.25.tgz", - "integrity": "sha512-5KhStqB5xpTAeGqKBAMgwaYMnQik7teQN4IAzC7npDv6kzeU6prfkR67bc87J1kWMPGkoaZSq1npmexMgkmEVg==", + "version": "2.1.26", + "resolved": "https://registry.npmjs.org/mime-types/-/mime-types-2.1.26.tgz", + "integrity": "sha512-01paPWYgLrkqAyrlDorC1uDwl2p3qZT7yl806vW7DvDoxwXi46jsjFbg+WdwotBIk6/MbEhO/dh5aZ5sNj/dWQ==", "requires": { - "mime-db": "1.42.0" + "mime-db": "1.43.0" } }, "mimic-fn": { - "version": "1.2.0", - "resolved": "https://registry.npmjs.org/mimic-fn/-/mimic-fn-1.2.0.tgz", - "integrity": "sha512-jf84uxzwiuiIVKiOLpfYk7N46TSy8ubTonmneY9vrpHNAnp0QBt2BxWV9dO3/j+BoVAb+a5G6YDPW3M5HOdMWQ==" + "version": "2.1.0", + "resolved": "https://registry.npmjs.org/mimic-fn/-/mimic-fn-2.1.0.tgz", + "integrity": "sha512-OqbOk5oEQeAZ8WXWydlu9HJjz9WVdEIvamMCcXmuqUYjTknH/sqsWvhQ3vgwKFRR1HpjvNBKQ37nbJgYzGqGcg==" }, "mimic-response": { "version": "1.0.1", @@ -11011,11 +9895,6 @@ "regenerator-runtime": "^0.13.2" } }, - "ansi-regex": { - "version": "4.1.0", - "resolved": "https://registry.npmjs.org/ansi-regex/-/ansi-regex-4.1.0.tgz", - "integrity": "sha512-1apePfXM1UOSqw0o9IiFAovVz9M5S1Dg+4TrDwfMewQ6p/rmMueb7tWZjQ1rx4Loy1ArBggoqGpfqqdI4rondg==" - }, "browserslist": { "version": "4.8.3", "resolved": "https://registry.npmjs.org/browserslist/-/browserslist-4.8.3.tgz", @@ -11026,11 +9905,6 @@ "node-releases": "^1.1.44" } }, - "caniuse-lite": { - "version": "1.0.30001021", - "resolved": "https://registry.npmjs.org/caniuse-lite/-/caniuse-lite-1.0.30001021.tgz", - "integrity": "sha512-wuMhT7/hwkgd8gldgp2jcrUjOU9RXJ4XxGumQeOsUr91l3WwmM68Cpa/ymCnWEDqakwFXhuDQbaKNHXBPgeE9g==" - }, "chalk": { "version": "2.4.2", "resolved": "https://registry.npmjs.org/chalk/-/chalk-2.4.2.tgz", @@ -11134,21 +10008,6 @@ } } }, - "node-releases": { - "version": "1.1.45", - "resolved": "https://registry.npmjs.org/node-releases/-/node-releases-1.1.45.tgz", - "integrity": "sha512-cXvGSfhITKI8qsV116u2FTzH5EWZJfgG7d4cpqwF8I8+1tWpD6AsvvGRKq2onR0DNj1jfqsjkXZsm14JMS7Cyg==", - "requires": { - "semver": "^6.3.0" - }, - "dependencies": { - "semver": { - "version": "6.3.0", - "resolved": "https://registry.npmjs.org/semver/-/semver-6.3.0.tgz", - "integrity": "sha512-b39TBaTSfV6yBrapU89p5fKekE2m/NwnDocOVruQFS1/veMgdzuPcnOM34M6CwxW8jH/lxEa5rBoDeUwu5HHTw==" - } - } - }, "normalize-url": { "version": "1.9.1", "resolved": "https://registry.npmjs.org/normalize-url/-/normalize-url-1.9.1.tgz", @@ -11160,14 +10019,6 @@ "sort-keys": "^1.0.0" } }, - "p-limit": { - "version": "2.2.2", - "resolved": "https://registry.npmjs.org/p-limit/-/p-limit-2.2.2.tgz", - "integrity": "sha512-WGR+xHecKTr7EbUEhyLSh5Dube9JtdiG78ufaeLxTgpudf/20KqyMioIUZJAezlTIi6evxuoUs9YXc11cU+yzQ==", - "requires": { - "p-try": "^2.0.0" - } - }, "p-locate": { "version": "4.1.0", "resolved": "https://registry.npmjs.org/p-locate/-/p-locate-4.1.0.tgz", @@ -11176,11 +10027,6 @@ "p-limit": "^2.2.0" } }, - "p-try": { - "version": "2.2.0", - "resolved": "https://registry.npmjs.org/p-try/-/p-try-2.2.0.tgz", - "integrity": "sha512-R4nPAVTAU0B9D35/Gk3uJf/7XYbQcyohSKdvAxIRSNghFl4e71hVoGnBNQz9cWaXxO2I10KTC+3jMdvvoKw6dQ==" - }, "path-to-regexp": { "version": "6.1.0", "resolved": "https://registry.npmjs.org/path-to-regexp/-/path-to-regexp-6.1.0.tgz", @@ -11299,14 +10145,6 @@ "resolved": "https://registry.npmjs.org/source-map/-/source-map-0.6.1.tgz", "integrity": "sha512-UjgapumWlbMhkBgzT7Ykc5YXUT46F0iKu8SGXq0bcwP5dz/h0Plj6enJqjz1Zbq2l5WaqYnrVbwWOWMyF3F47g==" }, - "strip-ansi": { - "version": "5.2.0", - "resolved": "https://registry.npmjs.org/strip-ansi/-/strip-ansi-5.2.0.tgz", - "integrity": "sha512-DuRs1gKbBqsMKIZlrffwlug8MHkcnpjs5VPmL1PAh+mA30U0DTotfDZ0d2UUsXpPmPmMMJ6W773MaA3J+lbiWA==", - "requires": { - "ansi-regex": "^4.1.0" - } - }, "yallist": { "version": "3.1.1", "resolved": "https://registry.npmjs.org/yallist/-/yallist-3.1.1.tgz", @@ -11315,9 +10153,9 @@ } }, "next-mdx-enhanced": { - "version": "2.3.0", - "resolved": "https://registry.npmjs.org/next-mdx-enhanced/-/next-mdx-enhanced-2.3.0.tgz", - "integrity": "sha512-KnM7qyJ2QKig4lD+Ob1m7q/w/m//XjNg+hIOnDOmQKxro9Ip/g9oynPWuI9KpUFQjzAQRfsoiI72xcOHOq6ypA==", + "version": "2.4.0", + "resolved": "https://registry.npmjs.org/next-mdx-enhanced/-/next-mdx-enhanced-2.4.0.tgz", + "integrity": "sha512-rmm85LP5SYMtrtqGj9rrgK/3Jrqq8YrE+mL7R/RI8vakd1zZTrkfnG/ZRt9V6kakAXK+A3oOJbz8Kg33xVnZ6A==", "requires": { "@mdx-js/loader": "^1.5.1", "debug": "^4.1.1", @@ -11460,9 +10298,9 @@ "integrity": "sha512-QNABxbrPa3qEIfrE6GOJ7BYIuignnJw7iQ2YPbc3Nla1HzRJjXzZOiikfF8m7eAMfichLt3M4VgLOetqgDmgGQ==" }, "node-releases": { - "version": "1.1.42", - "resolved": "https://registry.npmjs.org/node-releases/-/node-releases-1.1.42.tgz", - "integrity": "sha512-OQ/ESmUqGawI2PRX+XIRao44qWYBBfN54ImQYdWVTQqUckuejOg76ysSqDBK8NG3zwySRVnX36JwDQ6x+9GxzA==", + "version": "1.1.46", + "resolved": "https://registry.npmjs.org/node-releases/-/node-releases-1.1.46.tgz", + "integrity": "sha512-YOjdx+Uoh9FbRO7yVYbnbt1puRWPQMemR3SutLeyv2XfxKs1ihpe0OLAUwBPEP2ImNH/PZC7SEiC6j32dwRZ7g==", "requires": { "semver": "^6.3.0" }, @@ -11623,57 +10461,6 @@ "es-abstract": "^1.17.0-next.1", "function-bind": "^1.1.1", "has": "^1.0.3" - }, - "dependencies": { - "es-abstract": { - "version": "1.17.0", - "resolved": "https://registry.npmjs.org/es-abstract/-/es-abstract-1.17.0.tgz", - "integrity": "sha512-yYkE07YF+6SIBmg1MsJ9dlub5L48Ek7X0qz+c/CPCHS9EBXfESorzng4cJQjJW5/pB6vDF41u7F8vUhLVDqIug==", - "requires": { - "es-to-primitive": "^1.2.1", - "function-bind": "^1.1.1", - "has": "^1.0.3", - "has-symbols": "^1.0.1", - "is-callable": "^1.1.5", - "is-regex": "^1.0.5", - "object-inspect": "^1.7.0", - "object-keys": "^1.1.1", - "object.assign": "^4.1.0", - "string.prototype.trimleft": "^2.1.1", - "string.prototype.trimright": "^2.1.1" - } - }, - "is-callable": { - "version": "1.1.5", - "resolved": "https://registry.npmjs.org/is-callable/-/is-callable-1.1.5.tgz", - "integrity": "sha512-ESKv5sMCJB2jnHTWZ3O5itG+O128Hsus4K4Qh1h2/cgn2vbgnLSVqfV46AeJA9D5EeeLa9w81KUXMtn34zhX+Q==" - }, - "is-regex": { - "version": "1.0.5", - "resolved": "https://registry.npmjs.org/is-regex/-/is-regex-1.0.5.tgz", - "integrity": "sha512-vlKW17SNq44owv5AQR3Cq0bQPEb8+kF3UKZ2fiZNOWtztYE5i0CzCZxFDwO58qAOWtxdBRVO/V5Qin1wjCqFYQ==", - "requires": { - "has": "^1.0.3" - } - }, - "string.prototype.trimleft": { - "version": "2.1.1", - "resolved": "https://registry.npmjs.org/string.prototype.trimleft/-/string.prototype.trimleft-2.1.1.tgz", - "integrity": "sha512-iu2AGd3PuP5Rp7x2kEZCrB2Nf41ehzh+goo8TV7z8/XDBbsvc6HQIlUl9RjkZ4oyrW1XM5UwlGl1oVEaDjg6Ag==", - "requires": { - "define-properties": "^1.1.3", - "function-bind": "^1.1.1" - } - }, - "string.prototype.trimright": { - "version": "2.1.1", - "resolved": "https://registry.npmjs.org/string.prototype.trimright/-/string.prototype.trimright-2.1.1.tgz", - "integrity": "sha512-qFvWL3/+QIgZXVmJBfpHmxLB7xsUXz6HsUmP8+5dRaC3Q7oKUv9Vo6aMCRZC1smrtyECFsIT30PqBJ1gTjAs+g==", - "requires": { - "define-properties": "^1.1.3", - "function-bind": "^1.1.1" - } - } } }, "object.fromentries": { @@ -11685,66 +10472,15 @@ "es-abstract": "^1.17.0-next.1", "function-bind": "^1.1.1", "has": "^1.0.3" - }, - "dependencies": { - "es-abstract": { - "version": "1.17.0", - "resolved": "https://registry.npmjs.org/es-abstract/-/es-abstract-1.17.0.tgz", - "integrity": "sha512-yYkE07YF+6SIBmg1MsJ9dlub5L48Ek7X0qz+c/CPCHS9EBXfESorzng4cJQjJW5/pB6vDF41u7F8vUhLVDqIug==", - "requires": { - "es-to-primitive": "^1.2.1", - "function-bind": "^1.1.1", - "has": "^1.0.3", - "has-symbols": "^1.0.1", - "is-callable": "^1.1.5", - "is-regex": "^1.0.5", - "object-inspect": "^1.7.0", - "object-keys": "^1.1.1", - "object.assign": "^4.1.0", - "string.prototype.trimleft": "^2.1.1", - "string.prototype.trimright": "^2.1.1" - } - }, - "is-callable": { - "version": "1.1.5", - "resolved": "https://registry.npmjs.org/is-callable/-/is-callable-1.1.5.tgz", - "integrity": "sha512-ESKv5sMCJB2jnHTWZ3O5itG+O128Hsus4K4Qh1h2/cgn2vbgnLSVqfV46AeJA9D5EeeLa9w81KUXMtn34zhX+Q==" - }, - "is-regex": { - "version": "1.0.5", - "resolved": "https://registry.npmjs.org/is-regex/-/is-regex-1.0.5.tgz", - "integrity": "sha512-vlKW17SNq44owv5AQR3Cq0bQPEb8+kF3UKZ2fiZNOWtztYE5i0CzCZxFDwO58qAOWtxdBRVO/V5Qin1wjCqFYQ==", - "requires": { - "has": "^1.0.3" - } - }, - "string.prototype.trimleft": { - "version": "2.1.1", - "resolved": "https://registry.npmjs.org/string.prototype.trimleft/-/string.prototype.trimleft-2.1.1.tgz", - "integrity": "sha512-iu2AGd3PuP5Rp7x2kEZCrB2Nf41ehzh+goo8TV7z8/XDBbsvc6HQIlUl9RjkZ4oyrW1XM5UwlGl1oVEaDjg6Ag==", - "requires": { - "define-properties": "^1.1.3", - "function-bind": "^1.1.1" - } - }, - "string.prototype.trimright": { - "version": "2.1.1", - "resolved": "https://registry.npmjs.org/string.prototype.trimright/-/string.prototype.trimright-2.1.1.tgz", - "integrity": "sha512-qFvWL3/+QIgZXVmJBfpHmxLB7xsUXz6HsUmP8+5dRaC3Q7oKUv9Vo6aMCRZC1smrtyECFsIT30PqBJ1gTjAs+g==", - "requires": { - "define-properties": "^1.1.3", - "function-bind": "^1.1.1" - } - } } }, "object.getownpropertydescriptors": { - "version": "2.0.3", - "resolved": "https://registry.npmjs.org/object.getownpropertydescriptors/-/object.getownpropertydescriptors-2.0.3.tgz", - "integrity": "sha1-h1jIRvW0B62rDyNuCYbxSwUcqhY=", + "version": "2.1.0", + "resolved": "https://registry.npmjs.org/object.getownpropertydescriptors/-/object.getownpropertydescriptors-2.1.0.tgz", + "integrity": "sha512-Z53Oah9A3TdLoblT7VKJaTDdXdT+lQO+cNpKVnya5JDe9uLvzu1YyY1yFDFrcxrlRgWrEFH0jJtD/IbuwjcEVg==", "requires": { - "define-properties": "^1.1.2", - "es-abstract": "^1.5.1" + "define-properties": "^1.1.3", + "es-abstract": "^1.17.0-next.1" } }, "object.pick": { @@ -11756,12 +10492,12 @@ } }, "object.values": { - "version": "1.1.0", - "resolved": "https://registry.npmjs.org/object.values/-/object.values-1.1.0.tgz", - "integrity": "sha512-8mf0nKLAoFX6VlNVdhGj31SVYpaNFtUnuoOXWyFEstsWRgU837AK+JYM0iAxwkSzGRbwn8cbFmgbyxj1j4VbXg==", + "version": "1.1.1", + "resolved": "https://registry.npmjs.org/object.values/-/object.values-1.1.1.tgz", + "integrity": "sha512-WTa54g2K8iu0kmS/us18jEmdv1a4Wi//BZ/DTVYEcH0XhLM5NYdpDHja3gt57VrZLcNAO2WGA+KpWsDBaHt6eA==", "requires": { "define-properties": "^1.1.3", - "es-abstract": "^1.12.0", + "es-abstract": "^1.17.0-next.1", "function-bind": "^1.1.1", "has": "^1.0.3" } @@ -11793,13 +10529,6 @@ "integrity": "sha512-5NcSkPHhwTVFIQN+TUqXoS5+dlElHXdpAWu9I0HP20YOtIi+aZ0Ct82jdlILDxjLEAWwvm+qj1m6aEtsDVmm6Q==", "requires": { "mimic-fn": "^2.1.0" - }, - "dependencies": { - "mimic-fn": { - "version": "2.1.0", - "resolved": "https://registry.npmjs.org/mimic-fn/-/mimic-fn-2.1.0.tgz", - "integrity": "sha512-OqbOk5oEQeAZ8WXWydlu9HJjz9WVdEIvamMCcXmuqUYjTknH/sqsWvhQ3vgwKFRR1HpjvNBKQ37nbJgYzGqGcg==" - } } }, "open": { @@ -11880,11 +10609,6 @@ "wcwidth": "^1.0.1" }, "dependencies": { - "ansi-regex": { - "version": "4.1.0", - "resolved": "https://registry.npmjs.org/ansi-regex/-/ansi-regex-4.1.0.tgz", - "integrity": "sha512-1apePfXM1UOSqw0o9IiFAovVz9M5S1Dg+4TrDwfMewQ6p/rmMueb7tWZjQ1rx4Loy1ArBggoqGpfqqdI4rondg==" - }, "chalk": { "version": "2.4.2", "resolved": "https://registry.npmjs.org/chalk/-/chalk-2.4.2.tgz", @@ -11916,6 +10640,11 @@ "chalk": "^2.0.1" } }, + "mimic-fn": { + "version": "1.2.0", + "resolved": "https://registry.npmjs.org/mimic-fn/-/mimic-fn-1.2.0.tgz", + "integrity": "sha512-jf84uxzwiuiIVKiOLpfYk7N46TSy8ubTonmneY9vrpHNAnp0QBt2BxWV9dO3/j+BoVAb+a5G6YDPW3M5HOdMWQ==" + }, "onetime": { "version": "2.0.1", "resolved": "https://registry.npmjs.org/onetime/-/onetime-2.0.1.tgz", @@ -11932,14 +10661,6 @@ "onetime": "^2.0.0", "signal-exit": "^3.0.2" } - }, - "strip-ansi": { - "version": "5.2.0", - "resolved": "https://registry.npmjs.org/strip-ansi/-/strip-ansi-5.2.0.tgz", - "integrity": "sha512-DuRs1gKbBqsMKIZlrffwlug8MHkcnpjs5VPmL1PAh+mA30U0DTotfDZ0d2UUsXpPmPmMMJ6W773MaA3J+lbiWA==", - "requires": { - "ansi-regex": "^4.1.0" - } } } }, @@ -11985,19 +10706,19 @@ "integrity": "sha1-nJRWmJ6fZYgBewQ01WCXZ1w9oF4=" }, "p-limit": { - "version": "1.3.0", - "resolved": "https://registry.npmjs.org/p-limit/-/p-limit-1.3.0.tgz", - "integrity": "sha512-vvcXsLAJ9Dr5rQOPk7toZQZJApBl2K4J6dANSsEuh6QI41JYcsS/qhTGa9ErIUUgK3WNQoJYvylxvjqmiqEA9Q==", + "version": "2.2.2", + "resolved": "https://registry.npmjs.org/p-limit/-/p-limit-2.2.2.tgz", + "integrity": "sha512-WGR+xHecKTr7EbUEhyLSh5Dube9JtdiG78ufaeLxTgpudf/20KqyMioIUZJAezlTIi6evxuoUs9YXc11cU+yzQ==", "requires": { - "p-try": "^1.0.0" + "p-try": "^2.0.0" } }, "p-locate": { - "version": "2.0.0", - "resolved": "https://registry.npmjs.org/p-locate/-/p-locate-2.0.0.tgz", - "integrity": "sha1-IKAQOyIqcMj9OcwuWAaA893l7EM=", + "version": "3.0.0", + "resolved": "https://registry.npmjs.org/p-locate/-/p-locate-3.0.0.tgz", + "integrity": "sha512-x+12w/To+4GFfgJhBEpiDcLozRJGegY+Ei7/z0tSLkMmxGZNybVMSfWj9aJn8Z5Fc7dBUNJOOVgPv2H7IwulSQ==", "requires": { - "p-limit": "^1.1.0" + "p-limit": "^2.0.0" } }, "p-map": { @@ -12035,9 +10756,9 @@ } }, "p-try": { - "version": "1.0.0", - "resolved": "https://registry.npmjs.org/p-try/-/p-try-1.0.0.tgz", - "integrity": "sha1-y8ec26+P1CKOE/Yh8rGiN8GyB7M=" + "version": "2.2.0", + "resolved": "https://registry.npmjs.org/p-try/-/p-try-2.2.0.tgz", + "integrity": "sha512-R4nPAVTAU0B9D35/Gk3uJf/7XYbQcyohSKdvAxIRSNghFl4e71hVoGnBNQz9cWaXxO2I10KTC+3jMdvvoKw6dQ==" }, "package-json": { "version": "6.5.0", @@ -12072,6 +10793,15 @@ "readable-stream": "^2.1.5" } }, + "param-case": { + "version": "3.0.3", + "resolved": "https://registry.npmjs.org/param-case/-/param-case-3.0.3.tgz", + "integrity": "sha512-VWBVyimc1+QrzappRs7waeN2YmoZFCGXWASRYX1/rGHtXqEcrGEIDm+jqIwFa2fRXNgQEwrxaYuIrX0WcAguTA==", + "requires": { + "dot-case": "^3.0.3", + "tslib": "^1.10.0" + } + }, "parent-module": { "version": "1.0.1", "resolved": "https://registry.npmjs.org/parent-module/-/parent-module-1.0.1.tgz", @@ -12114,11 +10844,12 @@ } }, "parse-json": { - "version": "2.2.0", - "resolved": "https://registry.npmjs.org/parse-json/-/parse-json-2.2.0.tgz", - "integrity": "sha1-9ID0BDTvgHQfhGkJn43qGPVaTck=", + "version": "4.0.0", + "resolved": "https://registry.npmjs.org/parse-json/-/parse-json-4.0.0.tgz", + "integrity": "sha1-vjX1Qlvh9/bHRxhPmKeIy5lHfuA=", "requires": { - "error-ex": "^1.2.0" + "error-ex": "^1.3.1", + "json-parse-better-errors": "^1.0.1" } }, "parse5": { @@ -12194,12 +10925,9 @@ "integrity": "sha1-32BBeABfUi8V60SQ5yR6G/qmf4w=" }, "path-type": { - "version": "2.0.0", - "resolved": "https://registry.npmjs.org/path-type/-/path-type-2.0.0.tgz", - "integrity": "sha1-8BLMuEFbcJb8LaoQVMPXI4lZTHM=", - "requires": { - "pify": "^2.0.0" - } + "version": "4.0.0", + "resolved": "https://registry.npmjs.org/path-type/-/path-type-4.0.0.tgz", + "integrity": "sha512-gDKb8aZMDeD/tZWs9P6+q0J9Mwkdl6xMV8TjnGP3qJVJ06bdMgkbBlLU8IdfOsIsFz2BW1rNVT3XuNEl8zPAvw==" }, "pbkdf2": { "version": "3.0.17", @@ -12219,14 +10947,14 @@ "integrity": "sha1-elfrVQpng/kRUzH89GY9XI4AelA=" }, "picomatch": { - "version": "2.1.1", - "resolved": "https://registry.npmjs.org/picomatch/-/picomatch-2.1.1.tgz", - "integrity": "sha512-OYMyqkKzK7blWO/+XZYP6w8hH0LDvkBvdvKukti+7kqYFCiEAk+gI3DWnryapc0Dau05ugGTy0foQ6mqn4AHYA==" + "version": "2.2.1", + "resolved": "https://registry.npmjs.org/picomatch/-/picomatch-2.2.1.tgz", + "integrity": "sha512-ISBaA8xQNmwELC7eOjqFKMESB2VIqt4PPDD0nsS95b/9dZXvVKOlz9keMSnoGGKcOHXfTvDD6WMaRoSc9UuhRA==" }, "pify": { - "version": "2.3.0", - "resolved": "https://registry.npmjs.org/pify/-/pify-2.3.0.tgz", - "integrity": "sha1-7RQaasBDqEnqWISY59yosVMw6Qw=" + "version": "4.0.1", + "resolved": "https://registry.npmjs.org/pify/-/pify-4.0.1.tgz", + "integrity": "sha512-uB80kBFb/tfd68bVleG9T5GGsGPjJrLAUpR5PZIrhBnIaRTQRjqdJSsIKkOP6OAIFbj7GOrcudc5pNjZ+geV2g==" }, "pinkie": { "version": "2.0.4", @@ -12250,30 +10978,43 @@ "load-json-file": "^4.0.0" }, "dependencies": { - "load-json-file": { - "version": "4.0.0", - "resolved": "https://registry.npmjs.org/load-json-file/-/load-json-file-4.0.0.tgz", - "integrity": "sha1-L19Fq5HjMhYjT9U62rZo607AmTs=", + "find-up": { + "version": "2.1.0", + "resolved": "https://registry.npmjs.org/find-up/-/find-up-2.1.0.tgz", + "integrity": "sha1-RdG35QbHF93UgndaK3eSCjwMV6c=", "requires": { - "graceful-fs": "^4.1.2", - "parse-json": "^4.0.0", - "pify": "^3.0.0", - "strip-bom": "^3.0.0" + "locate-path": "^2.0.0" } }, - "parse-json": { - "version": "4.0.0", - "resolved": "https://registry.npmjs.org/parse-json/-/parse-json-4.0.0.tgz", - "integrity": "sha1-vjX1Qlvh9/bHRxhPmKeIy5lHfuA=", + "locate-path": { + "version": "2.0.0", + "resolved": "https://registry.npmjs.org/locate-path/-/locate-path-2.0.0.tgz", + "integrity": "sha1-K1aLJl7slExtnA3pw9u7ygNUzY4=", "requires": { - "error-ex": "^1.3.1", - "json-parse-better-errors": "^1.0.1" + "p-locate": "^2.0.0", + "path-exists": "^3.0.0" } }, - "pify": { - "version": "3.0.0", - "resolved": "https://registry.npmjs.org/pify/-/pify-3.0.0.tgz", - "integrity": "sha1-5aSs0sEB/fPZpNB/DbxNtJ3SgXY=" + "p-limit": { + "version": "1.3.0", + "resolved": "https://registry.npmjs.org/p-limit/-/p-limit-1.3.0.tgz", + "integrity": "sha512-vvcXsLAJ9Dr5rQOPk7toZQZJApBl2K4J6dANSsEuh6QI41JYcsS/qhTGa9ErIUUgK3WNQoJYvylxvjqmiqEA9Q==", + "requires": { + "p-try": "^1.0.0" + } + }, + "p-locate": { + "version": "2.0.0", + "resolved": "https://registry.npmjs.org/p-locate/-/p-locate-2.0.0.tgz", + "integrity": "sha1-IKAQOyIqcMj9OcwuWAaA893l7EM=", + "requires": { + "p-limit": "^1.1.0" + } + }, + "p-try": { + "version": "1.0.0", + "resolved": "https://registry.npmjs.org/p-try/-/p-try-1.0.0.tgz", + "integrity": "sha1-y8ec26+P1CKOE/Yh8rGiN8GyB7M=" } } }, @@ -12302,14 +11043,6 @@ "p-locate": "^4.1.0" } }, - "p-limit": { - "version": "2.2.1", - "resolved": "https://registry.npmjs.org/p-limit/-/p-limit-2.2.1.tgz", - "integrity": "sha512-85Tk+90UCVWvbDavCLKPOLC9vvY8OwEX/RtKF+/1OADJMVlFfEHOiMTPVyxg7mk/dKa+ipdHm0OUkTvCpMTuwg==", - "requires": { - "p-try": "^2.0.0" - } - }, "p-locate": { "version": "4.1.0", "resolved": "https://registry.npmjs.org/p-locate/-/p-locate-4.1.0.tgz", @@ -12318,11 +11051,6 @@ "p-limit": "^2.2.0" } }, - "p-try": { - "version": "2.2.0", - "resolved": "https://registry.npmjs.org/p-try/-/p-try-2.2.0.tgz", - "integrity": "sha512-R4nPAVTAU0B9D35/Gk3uJf/7XYbQcyohSKdvAxIRSNghFl4e71hVoGnBNQz9cWaXxO2I10KTC+3jMdvvoKw6dQ==" - }, "path-exists": { "version": "4.0.0", "resolved": "https://registry.npmjs.org/path-exists/-/path-exists-4.0.0.tgz", @@ -12336,46 +11064,6 @@ "integrity": "sha512-nDywThFk1i4BQK4twPQ6TA4RT8bDY96yeuCVBWL3ePARCiEKDRSrNGbFIgUJpLp+XeIR65v8ra7WuJOFUBtkMA==", "requires": { "find-up": "^3.0.0" - }, - "dependencies": { - "find-up": { - "version": "3.0.0", - "resolved": "https://registry.npmjs.org/find-up/-/find-up-3.0.0.tgz", - "integrity": "sha512-1yD6RmLI1XBfxugvORwlck6f75tYL+iR0jqwsOrOxMZyGYqUuDhJ0l4AXdO1iX/FTs9cBAMEk1gWSEx1kSbylg==", - "requires": { - "locate-path": "^3.0.0" - } - }, - "locate-path": { - "version": "3.0.0", - "resolved": "https://registry.npmjs.org/locate-path/-/locate-path-3.0.0.tgz", - "integrity": "sha512-7AO748wWnIhNqAuaty2ZWHkQHRSNfPVIsPIfwEOWO22AmaoVrWavlOcMR5nzTLNYvp36X220/maaRsrec1G65A==", - "requires": { - "p-locate": "^3.0.0", - "path-exists": "^3.0.0" - } - }, - "p-limit": { - "version": "2.2.2", - "resolved": "https://registry.npmjs.org/p-limit/-/p-limit-2.2.2.tgz", - "integrity": "sha512-WGR+xHecKTr7EbUEhyLSh5Dube9JtdiG78ufaeLxTgpudf/20KqyMioIUZJAezlTIi6evxuoUs9YXc11cU+yzQ==", - "requires": { - "p-try": "^2.0.0" - } - }, - "p-locate": { - "version": "3.0.0", - "resolved": "https://registry.npmjs.org/p-locate/-/p-locate-3.0.0.tgz", - "integrity": "sha512-x+12w/To+4GFfgJhBEpiDcLozRJGegY+Ei7/z0tSLkMmxGZNybVMSfWj9aJn8Z5Fc7dBUNJOOVgPv2H7IwulSQ==", - "requires": { - "p-limit": "^2.0.0" - } - }, - "p-try": { - "version": "2.2.0", - "resolved": "https://registry.npmjs.org/p-try/-/p-try-2.2.0.tgz", - "integrity": "sha512-R4nPAVTAU0B9D35/Gk3uJf/7XYbQcyohSKdvAxIRSNghFl4e71hVoGnBNQz9cWaXxO2I10KTC+3jMdvvoKw6dQ==" - } } }, "please-upgrade-node": { @@ -12461,9 +11149,9 @@ } }, "postcss": { - "version": "7.0.24", - "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.24.tgz", - "integrity": "sha512-Xl0XvdNWg+CblAXzNvbSOUvgJXwSjmbAKORqyw9V2AlHrm1js2gFw9y3jibBAhpKZi8b5JzJCVh/FyzPsTtgTA==", + "version": "7.0.26", + "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz", + "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==", "requires": { "chalk": "^2.4.2", "source-map": "^0.6.1", @@ -12568,9 +11256,9 @@ } }, "postcss": { - "version": "7.0.24", - "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.24.tgz", - "integrity": "sha512-Xl0XvdNWg+CblAXzNvbSOUvgJXwSjmbAKORqyw9V2AlHrm1js2gFw9y3jibBAhpKZi8b5JzJCVh/FyzPsTtgTA==", + "version": "7.0.26", + "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz", + "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==", "requires": { "chalk": "^2.4.2", "source-map": "^0.6.1", @@ -12623,9 +11311,9 @@ } }, "postcss": { - "version": "7.0.24", - "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.24.tgz", - "integrity": "sha512-Xl0XvdNWg+CblAXzNvbSOUvgJXwSjmbAKORqyw9V2AlHrm1js2gFw9y3jibBAhpKZi8b5JzJCVh/FyzPsTtgTA==", + "version": "7.0.26", + "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz", + "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==", "requires": { "chalk": "^2.4.2", "source-map": "^0.6.1", @@ -12677,9 +11365,9 @@ } }, "postcss": { - "version": "7.0.24", - "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.24.tgz", - "integrity": "sha512-Xl0XvdNWg+CblAXzNvbSOUvgJXwSjmbAKORqyw9V2AlHrm1js2gFw9y3jibBAhpKZi8b5JzJCVh/FyzPsTtgTA==", + "version": "7.0.26", + "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz", + "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==", "requires": { "chalk": "^2.4.2", "source-map": "^0.6.1", @@ -12732,9 +11420,9 @@ } }, "postcss": { - "version": "7.0.24", - "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.24.tgz", - "integrity": "sha512-Xl0XvdNWg+CblAXzNvbSOUvgJXwSjmbAKORqyw9V2AlHrm1js2gFw9y3jibBAhpKZi8b5JzJCVh/FyzPsTtgTA==", + "version": "7.0.26", + "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz", + "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==", "requires": { "chalk": "^2.4.2", "source-map": "^0.6.1", @@ -12786,9 +11474,9 @@ } }, "postcss": { - "version": "7.0.24", - "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.24.tgz", - "integrity": "sha512-Xl0XvdNWg+CblAXzNvbSOUvgJXwSjmbAKORqyw9V2AlHrm1js2gFw9y3jibBAhpKZi8b5JzJCVh/FyzPsTtgTA==", + "version": "7.0.26", + "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz", + "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==", "requires": { "chalk": "^2.4.2", "source-map": "^0.6.1", @@ -12839,9 +11527,9 @@ } }, "postcss": { - "version": "7.0.24", - "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.24.tgz", - "integrity": "sha512-Xl0XvdNWg+CblAXzNvbSOUvgJXwSjmbAKORqyw9V2AlHrm1js2gFw9y3jibBAhpKZi8b5JzJCVh/FyzPsTtgTA==", + "version": "7.0.26", + "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz", + "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==", "requires": { "chalk": "^2.4.2", "source-map": "^0.6.1", @@ -12893,9 +11581,9 @@ } }, "postcss": { - "version": "7.0.24", - "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.24.tgz", - "integrity": "sha512-Xl0XvdNWg+CblAXzNvbSOUvgJXwSjmbAKORqyw9V2AlHrm1js2gFw9y3jibBAhpKZi8b5JzJCVh/FyzPsTtgTA==", + "version": "7.0.26", + "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz", + "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==", "requires": { "chalk": "^2.4.2", "source-map": "^0.6.1", @@ -12947,9 +11635,9 @@ } }, "postcss": { - "version": "7.0.24", - "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.24.tgz", - "integrity": "sha512-Xl0XvdNWg+CblAXzNvbSOUvgJXwSjmbAKORqyw9V2AlHrm1js2gFw9y3jibBAhpKZi8b5JzJCVh/FyzPsTtgTA==", + "version": "7.0.26", + "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz", + "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==", "requires": { "chalk": "^2.4.2", "source-map": "^0.6.1", @@ -13001,9 +11689,9 @@ } }, "postcss": { - "version": "7.0.24", - "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.24.tgz", - "integrity": "sha512-Xl0XvdNWg+CblAXzNvbSOUvgJXwSjmbAKORqyw9V2AlHrm1js2gFw9y3jibBAhpKZi8b5JzJCVh/FyzPsTtgTA==", + "version": "7.0.26", + "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz", + "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==", "requires": { "chalk": "^2.4.2", "source-map": "^0.6.1", @@ -13055,9 +11743,9 @@ } }, "postcss": { - "version": "7.0.24", - "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.24.tgz", - "integrity": "sha512-Xl0XvdNWg+CblAXzNvbSOUvgJXwSjmbAKORqyw9V2AlHrm1js2gFw9y3jibBAhpKZi8b5JzJCVh/FyzPsTtgTA==", + "version": "7.0.26", + "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz", + "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==", "requires": { "chalk": "^2.4.2", "source-map": "^0.6.1", @@ -13109,9 +11797,9 @@ } }, "postcss": { - "version": "7.0.24", - "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.24.tgz", - "integrity": "sha512-Xl0XvdNWg+CblAXzNvbSOUvgJXwSjmbAKORqyw9V2AlHrm1js2gFw9y3jibBAhpKZi8b5JzJCVh/FyzPsTtgTA==", + "version": "7.0.26", + "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz", + "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==", "requires": { "chalk": "^2.4.2", "source-map": "^0.6.1", @@ -13162,9 +11850,9 @@ } }, "postcss": { - "version": "7.0.24", - "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.24.tgz", - "integrity": "sha512-Xl0XvdNWg+CblAXzNvbSOUvgJXwSjmbAKORqyw9V2AlHrm1js2gFw9y3jibBAhpKZi8b5JzJCVh/FyzPsTtgTA==", + "version": "7.0.26", + "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz", + "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==", "requires": { "chalk": "^2.4.2", "source-map": "^0.6.1", @@ -13215,9 +11903,9 @@ } }, "postcss": { - "version": "7.0.24", - "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.24.tgz", - "integrity": "sha512-Xl0XvdNWg+CblAXzNvbSOUvgJXwSjmbAKORqyw9V2AlHrm1js2gFw9y3jibBAhpKZi8b5JzJCVh/FyzPsTtgTA==", + "version": "7.0.26", + "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz", + "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==", "requires": { "chalk": "^2.4.2", "source-map": "^0.6.1", @@ -13268,9 +11956,9 @@ } }, "postcss": { - "version": "7.0.24", - "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.24.tgz", - "integrity": "sha512-Xl0XvdNWg+CblAXzNvbSOUvgJXwSjmbAKORqyw9V2AlHrm1js2gFw9y3jibBAhpKZi8b5JzJCVh/FyzPsTtgTA==", + "version": "7.0.26", + "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz", + "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==", "requires": { "chalk": "^2.4.2", "source-map": "^0.6.1", @@ -13321,9 +12009,9 @@ } }, "postcss": { - "version": "7.0.24", - "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.24.tgz", - "integrity": "sha512-Xl0XvdNWg+CblAXzNvbSOUvgJXwSjmbAKORqyw9V2AlHrm1js2gFw9y3jibBAhpKZi8b5JzJCVh/FyzPsTtgTA==", + "version": "7.0.26", + "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz", + "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==", "requires": { "chalk": "^2.4.2", "source-map": "^0.6.1", @@ -13374,9 +12062,9 @@ } }, "postcss": { - "version": "7.0.24", - "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.24.tgz", - "integrity": "sha512-Xl0XvdNWg+CblAXzNvbSOUvgJXwSjmbAKORqyw9V2AlHrm1js2gFw9y3jibBAhpKZi8b5JzJCVh/FyzPsTtgTA==", + "version": "7.0.26", + "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz", + "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==", "requires": { "chalk": "^2.4.2", "source-map": "^0.6.1", @@ -13428,9 +12116,9 @@ } }, "postcss": { - "version": "7.0.24", - "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.24.tgz", - "integrity": "sha512-Xl0XvdNWg+CblAXzNvbSOUvgJXwSjmbAKORqyw9V2AlHrm1js2gFw9y3jibBAhpKZi8b5JzJCVh/FyzPsTtgTA==", + "version": "7.0.26", + "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz", + "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==", "requires": { "chalk": "^2.4.2", "source-map": "^0.6.1", @@ -13482,9 +12170,9 @@ } }, "postcss": { - "version": "7.0.24", - "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.24.tgz", - "integrity": "sha512-Xl0XvdNWg+CblAXzNvbSOUvgJXwSjmbAKORqyw9V2AlHrm1js2gFw9y3jibBAhpKZi8b5JzJCVh/FyzPsTtgTA==", + "version": "7.0.26", + "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz", + "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==", "requires": { "chalk": "^2.4.2", "source-map": "^0.6.1", @@ -13537,9 +12225,9 @@ } }, "postcss": { - "version": "7.0.24", - "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.24.tgz", - "integrity": "sha512-Xl0XvdNWg+CblAXzNvbSOUvgJXwSjmbAKORqyw9V2AlHrm1js2gFw9y3jibBAhpKZi8b5JzJCVh/FyzPsTtgTA==", + "version": "7.0.26", + "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz", + "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==", "requires": { "chalk": "^2.4.2", "source-map": "^0.6.1", @@ -13602,9 +12290,9 @@ } }, "postcss": { - "version": "7.0.24", - "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.24.tgz", - "integrity": "sha512-Xl0XvdNWg+CblAXzNvbSOUvgJXwSjmbAKORqyw9V2AlHrm1js2gFw9y3jibBAhpKZi8b5JzJCVh/FyzPsTtgTA==", + "version": "7.0.26", + "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz", + "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==", "requires": { "chalk": "^2.4.2", "source-map": "^0.6.1", @@ -13655,9 +12343,9 @@ } }, "postcss": { - "version": "7.0.24", - "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.24.tgz", - "integrity": "sha512-Xl0XvdNWg+CblAXzNvbSOUvgJXwSjmbAKORqyw9V2AlHrm1js2gFw9y3jibBAhpKZi8b5JzJCVh/FyzPsTtgTA==", + "version": "7.0.26", + "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz", + "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==", "requires": { "chalk": "^2.4.2", "source-map": "^0.6.1", @@ -13708,9 +12396,9 @@ } }, "postcss": { - "version": "7.0.24", - "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.24.tgz", - "integrity": "sha512-Xl0XvdNWg+CblAXzNvbSOUvgJXwSjmbAKORqyw9V2AlHrm1js2gFw9y3jibBAhpKZi8b5JzJCVh/FyzPsTtgTA==", + "version": "7.0.26", + "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz", + "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==", "requires": { "chalk": "^2.4.2", "source-map": "^0.6.1", @@ -13796,9 +12484,9 @@ } }, "postcss": { - "version": "7.0.24", - "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.24.tgz", - "integrity": "sha512-Xl0XvdNWg+CblAXzNvbSOUvgJXwSjmbAKORqyw9V2AlHrm1js2gFw9y3jibBAhpKZi8b5JzJCVh/FyzPsTtgTA==", + "version": "7.0.26", + "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz", + "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==", "requires": { "chalk": "^2.4.2", "source-map": "^0.6.1", @@ -13906,9 +12594,9 @@ } }, "postcss": { - "version": "7.0.24", - "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.24.tgz", - "integrity": "sha512-Xl0XvdNWg+CblAXzNvbSOUvgJXwSjmbAKORqyw9V2AlHrm1js2gFw9y3jibBAhpKZi8b5JzJCVh/FyzPsTtgTA==", + "version": "7.0.26", + "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz", + "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==", "requires": { "chalk": "^2.4.2", "source-map": "^0.6.1", @@ -13959,9 +12647,9 @@ } }, "postcss": { - "version": "7.0.24", - "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.24.tgz", - "integrity": "sha512-Xl0XvdNWg+CblAXzNvbSOUvgJXwSjmbAKORqyw9V2AlHrm1js2gFw9y3jibBAhpKZi8b5JzJCVh/FyzPsTtgTA==", + "version": "7.0.26", + "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz", + "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==", "requires": { "chalk": "^2.4.2", "source-map": "^0.6.1", @@ -14013,9 +12701,9 @@ } }, "postcss": { - "version": "7.0.24", - "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.24.tgz", - "integrity": "sha512-Xl0XvdNWg+CblAXzNvbSOUvgJXwSjmbAKORqyw9V2AlHrm1js2gFw9y3jibBAhpKZi8b5JzJCVh/FyzPsTtgTA==", + "version": "7.0.26", + "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz", + "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==", "requires": { "chalk": "^2.4.2", "source-map": "^0.6.1", @@ -14102,9 +12790,9 @@ } }, "postcss": { - "version": "7.0.24", - "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.24.tgz", - "integrity": "sha512-Xl0XvdNWg+CblAXzNvbSOUvgJXwSjmbAKORqyw9V2AlHrm1js2gFw9y3jibBAhpKZi8b5JzJCVh/FyzPsTtgTA==", + "version": "7.0.26", + "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz", + "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==", "requires": { "chalk": "^2.4.2", "source-map": "^0.6.1", @@ -14156,9 +12844,9 @@ } }, "postcss": { - "version": "7.0.24", - "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.24.tgz", - "integrity": "sha512-Xl0XvdNWg+CblAXzNvbSOUvgJXwSjmbAKORqyw9V2AlHrm1js2gFw9y3jibBAhpKZi8b5JzJCVh/FyzPsTtgTA==", + "version": "7.0.26", + "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz", + "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==", "requires": { "chalk": "^2.4.2", "source-map": "^0.6.1", @@ -14209,9 +12897,9 @@ } }, "postcss": { - "version": "7.0.24", - "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.24.tgz", - "integrity": "sha512-Xl0XvdNWg+CblAXzNvbSOUvgJXwSjmbAKORqyw9V2AlHrm1js2gFw9y3jibBAhpKZi8b5JzJCVh/FyzPsTtgTA==", + "version": "7.0.26", + "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz", + "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==", "requires": { "chalk": "^2.4.2", "source-map": "^0.6.1", @@ -14263,9 +12951,9 @@ } }, "postcss": { - "version": "7.0.24", - "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.24.tgz", - "integrity": "sha512-Xl0XvdNWg+CblAXzNvbSOUvgJXwSjmbAKORqyw9V2AlHrm1js2gFw9y3jibBAhpKZi8b5JzJCVh/FyzPsTtgTA==", + "version": "7.0.26", + "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz", + "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==", "requires": { "chalk": "^2.4.2", "source-map": "^0.6.1", @@ -14317,9 +13005,9 @@ } }, "postcss": { - "version": "7.0.24", - "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.24.tgz", - "integrity": "sha512-Xl0XvdNWg+CblAXzNvbSOUvgJXwSjmbAKORqyw9V2AlHrm1js2gFw9y3jibBAhpKZi8b5JzJCVh/FyzPsTtgTA==", + "version": "7.0.26", + "resolved": "https://registry.npmjs.org/postcss/-/postcss-7.0.26.tgz", + "integrity": "sha512-IY4oRjpXWYshuTDFxMVkJDtWIk2LhsTlu8bZnbEJA4+bYT16Lvpo8Qv6EvDumhYRgzjZl489pmsY3qVgJQ08nA==", "requires": { "chalk": "^2.4.2", "source-map": "^0.6.1", @@ -14495,14 +13183,6 @@ "resolved": "https://registry.npmjs.org/p-finally/-/p-finally-2.0.1.tgz", "integrity": "sha512-vpm09aKwq6H9phqRQzecoDpD8TmVyGw70qmWlyq5onxY7tqyTTFVvxMykxQSQKILBSFlbXpypIw2T1Ml7+DDtw==" }, - "p-limit": { - "version": "2.2.2", - "resolved": "https://registry.npmjs.org/p-limit/-/p-limit-2.2.2.tgz", - "integrity": "sha512-WGR+xHecKTr7EbUEhyLSh5Dube9JtdiG78ufaeLxTgpudf/20KqyMioIUZJAezlTIi6evxuoUs9YXc11cU+yzQ==", - "requires": { - "p-try": "^2.0.0" - } - }, "p-locate": { "version": "4.1.0", "resolved": "https://registry.npmjs.org/p-locate/-/p-locate-4.1.0.tgz", @@ -14511,11 +13191,6 @@ "p-limit": "^2.2.0" } }, - "p-try": { - "version": "2.2.0", - "resolved": "https://registry.npmjs.org/p-try/-/p-try-2.2.0.tgz", - "integrity": "sha512-R4nPAVTAU0B9D35/Gk3uJf/7XYbQcyohSKdvAxIRSNghFl4e71hVoGnBNQz9cWaXxO2I10KTC+3jMdvvoKw6dQ==" - }, "path-exists": { "version": "4.0.0", "resolved": "https://registry.npmjs.org/path-exists/-/path-exists-4.0.0.tgz", @@ -14837,19 +13512,119 @@ } }, "read-pkg": { - "version": "2.0.0", - "resolved": "https://registry.npmjs.org/read-pkg/-/read-pkg-2.0.0.tgz", - "integrity": "sha1-jvHAYjxqbbDcZxPEv6xGMysjaPg=", + "version": "5.2.0", + "resolved": "https://registry.npmjs.org/read-pkg/-/read-pkg-5.2.0.tgz", + "integrity": "sha512-Ug69mNOpfvKDAc2Q8DRpMjjzdtrnv9HcSMX+4VsZxD1aZ6ZzrIE7rlzXBtWTyhULSMKg076AW6WR5iZpD0JiOg==", "requires": { - "load-json-file": "^2.0.0", - "normalize-package-data": "^2.3.2", - "path-type": "^2.0.0" + "@types/normalize-package-data": "^2.4.0", + "normalize-package-data": "^2.5.0", + "parse-json": "^5.0.0", + "type-fest": "^0.6.0" + }, + "dependencies": { + "parse-json": { + "version": "5.0.0", + "resolved": "https://registry.npmjs.org/parse-json/-/parse-json-5.0.0.tgz", + "integrity": "sha512-OOY5b7PAEFV0E2Fir1KOkxchnZNCdowAJgQ5NuxjpBKTRP3pQhwkrkxqQjeoKJ+fO7bCpmIZaogI4eZGDMEGOw==", + "requires": { + "@babel/code-frame": "^7.0.0", + "error-ex": "^1.3.1", + "json-parse-better-errors": "^1.0.1", + "lines-and-columns": "^1.1.6" + } + }, + "type-fest": { + "version": "0.6.0", + "resolved": "https://registry.npmjs.org/type-fest/-/type-fest-0.6.0.tgz", + "integrity": "sha512-q+MB8nYR1KDLrgr4G5yemftpMC7/QLqVndBmEEdqzmNj5dcFOO4Oo8qlwZE3ULT3+Zim1F8Kq4cBnikNhlCMlg==" + } + } + }, + "read-pkg-up": { + "version": "1.0.1", + "resolved": "https://registry.npmjs.org/read-pkg-up/-/read-pkg-up-1.0.1.tgz", + "integrity": "sha1-nWPBMnbAZZGNV/ACpX9AobZD+wI=", + "requires": { + "find-up": "^1.0.0", + "read-pkg": "^1.0.0" + }, + "dependencies": { + "find-up": { + "version": "1.1.2", + "resolved": "https://registry.npmjs.org/find-up/-/find-up-1.1.2.tgz", + "integrity": "sha1-ay6YIrGizgpgq2TWEOzK1TyyTQ8=", + "requires": { + "path-exists": "^2.0.0", + "pinkie-promise": "^2.0.0" + } + }, + "load-json-file": { + "version": "1.1.0", + "resolved": "https://registry.npmjs.org/load-json-file/-/load-json-file-1.1.0.tgz", + "integrity": "sha1-lWkFcI1YtLq0wiYbBPWfMcmTdMA=", + "requires": { + "graceful-fs": "^4.1.2", + "parse-json": "^2.2.0", + "pify": "^2.0.0", + "pinkie-promise": "^2.0.0", + "strip-bom": "^2.0.0" + } + }, + "parse-json": { + "version": "2.2.0", + "resolved": "https://registry.npmjs.org/parse-json/-/parse-json-2.2.0.tgz", + "integrity": "sha1-9ID0BDTvgHQfhGkJn43qGPVaTck=", + "requires": { + "error-ex": "^1.2.0" + } + }, + "path-exists": { + "version": "2.1.0", + "resolved": "https://registry.npmjs.org/path-exists/-/path-exists-2.1.0.tgz", + "integrity": "sha1-D+tsZPD8UY2adU3V77YscCJ2H0s=", + "requires": { + "pinkie-promise": "^2.0.0" + } + }, + "path-type": { + "version": "1.1.0", + "resolved": "https://registry.npmjs.org/path-type/-/path-type-1.1.0.tgz", + "integrity": "sha1-WcRPfuSR2nBNpBXaWkBwuk+P5EE=", + "requires": { + "graceful-fs": "^4.1.2", + "pify": "^2.0.0", + "pinkie-promise": "^2.0.0" + } + }, + "pify": { + "version": "2.3.0", + "resolved": "https://registry.npmjs.org/pify/-/pify-2.3.0.tgz", + "integrity": "sha1-7RQaasBDqEnqWISY59yosVMw6Qw=" + }, + "read-pkg": { + "version": "1.1.0", + "resolved": "https://registry.npmjs.org/read-pkg/-/read-pkg-1.1.0.tgz", + "integrity": "sha1-9f+qXs0pyzHAR0vKfXVra7KePyg=", + "requires": { + "load-json-file": "^1.0.0", + "normalize-package-data": "^2.3.2", + "path-type": "^1.0.0" + } + }, + "strip-bom": { + "version": "2.0.0", + "resolved": "https://registry.npmjs.org/strip-bom/-/strip-bom-2.0.0.tgz", + "integrity": "sha1-YhmoVhZSBJHzV4i9vxRHqZx+aw4=", + "requires": { + "is-utf8": "^0.2.0" + } + } } }, "readable-stream": { - "version": "2.3.6", - "resolved": "https://registry.npmjs.org/readable-stream/-/readable-stream-2.3.6.tgz", - "integrity": "sha512-tQtKA9WIAhBF3+VLAseyMqZeBjW0AHJoxOtYqSUZNJxauErmLbVm2FW1y+J/YA9dUrAC39ITejlZWhVIwawkKw==", + "version": "2.3.7", + "resolved": "https://registry.npmjs.org/readable-stream/-/readable-stream-2.3.7.tgz", + "integrity": "sha512-Ebho8K4jIbHAxnuxi7o42OrZgF/ZTNcsZj6nRKyUmkhLFq8CHItp/fy6hQZuZmP/n3yZ9VBUbp4zz/mX8hmYPw==", "requires": { "core-util-is": "~1.0.0", "inherits": "~2.0.3", @@ -14943,9 +13718,9 @@ } }, "registry-auth-token": { - "version": "4.0.0", - "resolved": "https://registry.npmjs.org/registry-auth-token/-/registry-auth-token-4.0.0.tgz", - "integrity": "sha512-lpQkHxd9UL6tb3k/aHAVfnVtn+Bcs9ob5InuFLLEDqSqeq+AljB8GZW9xY0x7F+xYwEcjKe07nyoxzEYz6yvkw==", + "version": "4.1.0", + "resolved": "https://registry.npmjs.org/registry-auth-token/-/registry-auth-token-4.1.0.tgz", + "integrity": "sha512-7uxS951DeOBOwsv8deX+l7HcjY2VZxaOgHtM6RKzg3HhpE+bJ0O7VbuMJLosC1T5WSFpHm0DuFIbqUl43jHpsA==", "requires": { "rc": "^1.2.8", "safe-buffer": "^5.0.1" @@ -15073,40 +13848,63 @@ } }, "remark-mdx": { - "version": "1.5.3", - "resolved": "https://registry.npmjs.org/remark-mdx/-/remark-mdx-1.5.3.tgz", - "integrity": "sha512-7WqfwdyER3k0gNiikzw9y+AQskAm6PX2qEF97vhuZ9y8/MatVKoWGCPX4VCYAN0qlM1X6ty761rbMWMy5OmgyA==", + "version": "1.5.5", + "resolved": "https://registry.npmjs.org/remark-mdx/-/remark-mdx-1.5.5.tgz", + "integrity": "sha512-w1XW9UzsQ6XAecV59dP8LJWn4tMftaXGwH5LEvUU5uIEJEJvHDE1jkKiPr3ow2IuhjuRfWs3b079Jtnk5qlUgQ==", "requires": { - "@babel/core": "7.7.4", - "@babel/helper-plugin-utils": "7.0.0", - "@babel/plugin-proposal-object-rest-spread": "7.7.4", - "@babel/plugin-syntax-jsx": "7.7.4", - "@mdx-js/util": "^1.5.3", + "@babel/core": "7.8.0", + "@babel/helper-plugin-utils": "7.8.0", + "@babel/plugin-proposal-object-rest-spread": "7.8.0", + "@babel/plugin-syntax-jsx": "7.8.0", + "@mdx-js/util": "^1.5.5", "is-alphabetical": "1.0.3", "remark-parse": "7.0.2", "unified": "8.4.2" }, "dependencies": { "@babel/core": { - "version": "7.7.4", - "resolved": "https://registry.npmjs.org/@babel/core/-/core-7.7.4.tgz", - "integrity": "sha512-+bYbx56j4nYBmpsWtnPUsKW3NdnYxbqyfrP2w9wILBuHzdfIKz9prieZK0DFPyIzkjYVUe4QkusGL07r5pXznQ==", + "version": "7.8.0", + "resolved": "https://registry.npmjs.org/@babel/core/-/core-7.8.0.tgz", + "integrity": "sha512-3rqPi/bv/Xfu2YzHvBz4XqMI1fKVwnhntPA1/fjoECrSjrhbOCxlTrbVu5gUtr8zkxW+RpkDOa/HCW93gzS2Dw==", "requires": { - "@babel/code-frame": "^7.5.5", - "@babel/generator": "^7.7.4", - "@babel/helpers": "^7.7.4", - "@babel/parser": "^7.7.4", - "@babel/template": "^7.7.4", - "@babel/traverse": "^7.7.4", - "@babel/types": "^7.7.4", + "@babel/code-frame": "^7.8.0", + "@babel/generator": "^7.8.0", + "@babel/helpers": "^7.8.0", + "@babel/parser": "^7.8.0", + "@babel/template": "^7.8.0", + "@babel/traverse": "^7.8.0", + "@babel/types": "^7.8.0", "convert-source-map": "^1.7.0", "debug": "^4.1.0", + "gensync": "^1.0.0-beta.1", "json5": "^2.1.0", "lodash": "^4.17.13", "resolve": "^1.3.2", "semver": "^5.4.1", "source-map": "^0.5.0" } + }, + "@babel/helper-plugin-utils": { + "version": "7.8.0", + "resolved": "https://registry.npmjs.org/@babel/helper-plugin-utils/-/helper-plugin-utils-7.8.0.tgz", + "integrity": "sha512-+hAlRGdf8fHQAyNnDBqTHQhwdLURLdrCROoWaEQYiQhk2sV9Rhs+GoFZZfMJExTq9HG8o2NX3uN2G90bFtmFdA==" + }, + "@babel/plugin-proposal-object-rest-spread": { + "version": "7.8.0", + "resolved": "https://registry.npmjs.org/@babel/plugin-proposal-object-rest-spread/-/plugin-proposal-object-rest-spread-7.8.0.tgz", + "integrity": "sha512-SjJ2ZXCylpWC+5DTES0/pbpNmw/FnjU/3dF068xF0DU9aN+oOKah+3MCSFcb4pnZ9IwmxfOy4KnbGJSQR+hAZA==", + "requires": { + "@babel/helper-plugin-utils": "^7.8.0", + "@babel/plugin-syntax-object-rest-spread": "^7.8.0" + } + }, + "@babel/plugin-syntax-jsx": { + "version": "7.8.0", + "resolved": "https://registry.npmjs.org/@babel/plugin-syntax-jsx/-/plugin-syntax-jsx-7.8.0.tgz", + "integrity": "sha512-zLDUckAuKeOtxJhfNE0TlR7iEApb2u7EYRlh5cxKzq6A5VzUbYEdyJGJlug41jDbjRbHTtsLKZUnUcy/8V3xZw==", + "requires": { + "@babel/helper-plugin-utils": "^7.8.0" + } } } }, @@ -15225,9 +14023,9 @@ "integrity": "sha512-NKN5kMDylKuldxYLSUfrbo5Tuzh4hd+2E8NPPX02mZtn1VuREQToYe/ZdlJy+J3uCpfaiGF05e7B8W0iXbQHmg==" }, "resolve": { - "version": "1.13.1", - "resolved": "https://registry.npmjs.org/resolve/-/resolve-1.13.1.tgz", - "integrity": "sha512-CxqObCX8K8YtAhOBRg+lrcdn+LK+WYOS8tSjqSFbjtrI5PnS63QPhZl4+yKfrU9tdsbMu9Anr/amegT87M9Z6w==", + "version": "1.14.2", + "resolved": "https://registry.npmjs.org/resolve/-/resolve-1.14.2.tgz", + "integrity": "sha512-EjlOBLBO1kxsUxsKjLt7TAECyKW6fOh1VRkykQkKGzcBbjjPIxBqGh0jf7GJ3k/f5mxMqW3htMD3WdTUVtW8HQ==", "requires": { "path-parse": "^1.0.6" } @@ -15318,9 +14116,9 @@ } }, "rxjs": { - "version": "6.5.3", - "resolved": "https://registry.npmjs.org/rxjs/-/rxjs-6.5.3.tgz", - "integrity": "sha512-wuYsAYYFdWTAnAaPoKGNhfpWwKZbJW+HgAJ+mImp+Epl7BG8oNWBCTyRM8gba9k4lk8BgWdoYm21Mo/RYhhbgA==", + "version": "6.5.4", + "resolved": "https://registry.npmjs.org/rxjs/-/rxjs-6.5.4.tgz", + "integrity": "sha512-naMQXcgEo3csAEGvw/NydRA0fuS2nDZJiw1YUWFKU7aPPAPGZEsD4Iimit96qwCieH6y614MCLYwdkrWx7z/7Q==", "requires": { "tslib": "^1.9.0" } @@ -15765,11 +14563,11 @@ "integrity": "sha1-igOdLRAh0i0eoUyA2OpGi6LvP8w=" }, "source-map-resolve": { - "version": "0.5.2", - "resolved": "https://registry.npmjs.org/source-map-resolve/-/source-map-resolve-0.5.2.tgz", - "integrity": "sha512-MjqsvNwyz1s0k81Goz/9vRBe9SZdB09Bdw+/zYyO+3CuPk6fouTaxscHkgtE8jKvf01kVfl8riHzERQ/kefaSA==", + "version": "0.5.3", + "resolved": "https://registry.npmjs.org/source-map-resolve/-/source-map-resolve-0.5.3.tgz", + "integrity": "sha512-Htz+RnsXWk5+P2slx5Jh3Q66vhQj1Cllm0zvnaY98+NFx+Dv2CF/f5O/t8x+KaNdrdIAsruNzoh/KpialbqAnw==", "requires": { - "atob": "^2.1.1", + "atob": "^2.1.2", "decode-uri-component": "^0.2.0", "resolve-url": "^0.2.1", "source-map-url": "^0.4.0", @@ -15853,6 +14651,11 @@ "lpad-align": "^1.0.1" }, "dependencies": { + "ansi-regex": { + "version": "2.1.1", + "resolved": "https://registry.npmjs.org/ansi-regex/-/ansi-regex-2.1.1.tgz", + "integrity": "sha1-w7M6te42DYbg5ijwRorn7yfWVN8=" + }, "ansi-styles": { "version": "2.2.1", "resolved": "https://registry.npmjs.org/ansi-styles/-/ansi-styles-2.2.1.tgz", @@ -15870,6 +14673,14 @@ "supports-color": "^2.0.0" } }, + "strip-ansi": { + "version": "3.0.1", + "resolved": "https://registry.npmjs.org/strip-ansi/-/strip-ansi-3.0.1.tgz", + "integrity": "sha1-ajhfuIU9lS1f8F0Oiq+UJ43GPc8=", + "requires": { + "ansi-regex": "^2.0.0" + } + }, "supports-color": { "version": "2.0.0", "resolved": "https://registry.npmjs.org/supports-color/-/supports-color-2.0.0.tgz", @@ -15891,17 +14702,17 @@ "integrity": "sha512-ji9qxRnOVfcuLDySj9qzhGSEFVobyt1kIOSkj1qZzYLzq7Tos/oUUWvotUPQLlrsidqsK6tBH89Bc9kL5zHA6w==" }, "stack-generator": { - "version": "2.0.4", - "resolved": "https://registry.npmjs.org/stack-generator/-/stack-generator-2.0.4.tgz", - "integrity": "sha512-ha1gosTNcgxwzo9uKTQ8zZ49aUp5FIUW58YHFxCqaAHtE0XqBg0chGFYA1MfmW//x1KWq3F4G7Ug7bJh4RiRtg==", + "version": "2.0.5", + "resolved": "https://registry.npmjs.org/stack-generator/-/stack-generator-2.0.5.tgz", + "integrity": "sha512-/t1ebrbHkrLrDuNMdeAcsvynWgoH/i4o8EGGfX7dEYDoTXOYVAkEpFdtshlvabzc6JlJ8Kf9YdFEoz7JkzGN9Q==", "requires": { - "stackframe": "^1.1.0" + "stackframe": "^1.1.1" } }, "stackframe": { - "version": "1.1.0", - "resolved": "https://registry.npmjs.org/stackframe/-/stackframe-1.1.0.tgz", - "integrity": "sha512-Vx6W1Yvy+AM1R/ckVwcHQHV147pTPBKWCRLrXMuPrFVfvBUc3os7PR1QLIWCMhPpRg5eX9ojzbQIMLGBwyLjqg==" + "version": "1.1.1", + "resolved": "https://registry.npmjs.org/stackframe/-/stackframe-1.1.1.tgz", + "integrity": "sha512-0PlYhdKh6AfFxRyK/v+6/k+/mMfyiEBbTM5L94D0ZytQnJ166wuwoTYLHFWGbs2dpA8Rgq763KGWmN1EQEYHRQ==" }, "state-toggle": { "version": "1.0.2", @@ -15989,21 +14800,6 @@ "requires": { "astral-regex": "^1.0.0", "strip-ansi": "^5.2.0" - }, - "dependencies": { - "ansi-regex": { - "version": "4.1.0", - "resolved": "https://registry.npmjs.org/ansi-regex/-/ansi-regex-4.1.0.tgz", - "integrity": "sha512-1apePfXM1UOSqw0o9IiFAovVz9M5S1Dg+4TrDwfMewQ6p/rmMueb7tWZjQ1rx4Loy1ArBggoqGpfqqdI4rondg==" - }, - "strip-ansi": { - "version": "5.2.0", - "resolved": "https://registry.npmjs.org/strip-ansi/-/strip-ansi-5.2.0.tgz", - "integrity": "sha512-DuRs1gKbBqsMKIZlrffwlug8MHkcnpjs5VPmL1PAh+mA30U0DTotfDZ0d2UUsXpPmPmMMJ6W773MaA3J+lbiWA==", - "requires": { - "ansi-regex": "^4.1.0" - } - } } }, "string-width": { @@ -16014,36 +14810,21 @@ "emoji-regex": "^7.0.1", "is-fullwidth-code-point": "^2.0.0", "strip-ansi": "^5.1.0" - }, - "dependencies": { - "ansi-regex": { - "version": "4.1.0", - "resolved": "https://registry.npmjs.org/ansi-regex/-/ansi-regex-4.1.0.tgz", - "integrity": "sha512-1apePfXM1UOSqw0o9IiFAovVz9M5S1Dg+4TrDwfMewQ6p/rmMueb7tWZjQ1rx4Loy1ArBggoqGpfqqdI4rondg==" - }, - "strip-ansi": { - "version": "5.2.0", - "resolved": "https://registry.npmjs.org/strip-ansi/-/strip-ansi-5.2.0.tgz", - "integrity": "sha512-DuRs1gKbBqsMKIZlrffwlug8MHkcnpjs5VPmL1PAh+mA30U0DTotfDZ0d2UUsXpPmPmMMJ6W773MaA3J+lbiWA==", - "requires": { - "ansi-regex": "^4.1.0" - } - } } }, "string.prototype.trimleft": { - "version": "2.1.0", - "resolved": "https://registry.npmjs.org/string.prototype.trimleft/-/string.prototype.trimleft-2.1.0.tgz", - "integrity": "sha512-FJ6b7EgdKxxbDxc79cOlok6Afd++TTs5szo+zJTUyow3ycrRfJVE2pq3vcN53XexvKZu/DJMDfeI/qMiZTrjTw==", + "version": "2.1.1", + "resolved": "https://registry.npmjs.org/string.prototype.trimleft/-/string.prototype.trimleft-2.1.1.tgz", + "integrity": "sha512-iu2AGd3PuP5Rp7x2kEZCrB2Nf41ehzh+goo8TV7z8/XDBbsvc6HQIlUl9RjkZ4oyrW1XM5UwlGl1oVEaDjg6Ag==", "requires": { "define-properties": "^1.1.3", "function-bind": "^1.1.1" } }, "string.prototype.trimright": { - "version": "2.1.0", - "resolved": "https://registry.npmjs.org/string.prototype.trimright/-/string.prototype.trimright-2.1.0.tgz", - "integrity": "sha512-fXZTSV55dNBwv16uw+hh5jkghxSnc5oHq+5K/gXgizHwAvMetdAJlHqqoFC1FSDVPYWLkAKl2cxpUT41sV7nSg==", + "version": "2.1.1", + "resolved": "https://registry.npmjs.org/string.prototype.trimright/-/string.prototype.trimright-2.1.1.tgz", + "integrity": "sha512-qFvWL3/+QIgZXVmJBfpHmxLB7xsUXz6HsUmP8+5dRaC3Q7oKUv9Vo6aMCRZC1smrtyECFsIT30PqBJ1gTjAs+g==", "requires": { "define-properties": "^1.1.3", "function-bind": "^1.1.1" @@ -16080,11 +14861,11 @@ } }, "strip-ansi": { - "version": "3.0.1", - "resolved": "https://registry.npmjs.org/strip-ansi/-/strip-ansi-3.0.1.tgz", - "integrity": "sha1-ajhfuIU9lS1f8F0Oiq+UJ43GPc8=", + "version": "5.2.0", + "resolved": "https://registry.npmjs.org/strip-ansi/-/strip-ansi-5.2.0.tgz", + "integrity": "sha512-DuRs1gKbBqsMKIZlrffwlug8MHkcnpjs5VPmL1PAh+mA30U0DTotfDZ0d2UUsXpPmPmMMJ6W773MaA3J+lbiWA==", "requires": { - "ansi-regex": "^2.0.0" + "ansi-regex": "^4.1.0" } }, "strip-bom": { @@ -16367,28 +15148,11 @@ "pkg-dir": "^3.0.0" } }, - "find-up": { - "version": "3.0.0", - "resolved": "https://registry.npmjs.org/find-up/-/find-up-3.0.0.tgz", - "integrity": "sha512-1yD6RmLI1XBfxugvORwlck6f75tYL+iR0jqwsOrOxMZyGYqUuDhJ0l4AXdO1iX/FTs9cBAMEk1gWSEx1kSbylg==", - "requires": { - "locate-path": "^3.0.0" - } - }, "is-wsl": { "version": "1.1.0", "resolved": "https://registry.npmjs.org/is-wsl/-/is-wsl-1.1.0.tgz", "integrity": "sha1-HxbkqiKwTRM2tmGIpmrzxgDDpm0=" }, - "locate-path": { - "version": "3.0.0", - "resolved": "https://registry.npmjs.org/locate-path/-/locate-path-3.0.0.tgz", - "integrity": "sha512-7AO748wWnIhNqAuaty2ZWHkQHRSNfPVIsPIfwEOWO22AmaoVrWavlOcMR5nzTLNYvp36X220/maaRsrec1G65A==", - "requires": { - "p-locate": "^3.0.0", - "path-exists": "^3.0.0" - } - }, "make-dir": { "version": "2.1.0", "resolved": "https://registry.npmjs.org/make-dir/-/make-dir-2.1.0.tgz", @@ -16398,32 +15162,6 @@ "semver": "^5.6.0" } }, - "p-limit": { - "version": "2.2.2", - "resolved": "https://registry.npmjs.org/p-limit/-/p-limit-2.2.2.tgz", - "integrity": "sha512-WGR+xHecKTr7EbUEhyLSh5Dube9JtdiG78ufaeLxTgpudf/20KqyMioIUZJAezlTIi6evxuoUs9YXc11cU+yzQ==", - "requires": { - "p-try": "^2.0.0" - } - }, - "p-locate": { - "version": "3.0.0", - "resolved": "https://registry.npmjs.org/p-locate/-/p-locate-3.0.0.tgz", - "integrity": "sha512-x+12w/To+4GFfgJhBEpiDcLozRJGegY+Ei7/z0tSLkMmxGZNybVMSfWj9aJn8Z5Fc7dBUNJOOVgPv2H7IwulSQ==", - "requires": { - "p-limit": "^2.0.0" - } - }, - "p-try": { - "version": "2.2.0", - "resolved": "https://registry.npmjs.org/p-try/-/p-try-2.2.0.tgz", - "integrity": "sha512-R4nPAVTAU0B9D35/Gk3uJf/7XYbQcyohSKdvAxIRSNghFl4e71hVoGnBNQz9cWaXxO2I10KTC+3jMdvvoKw6dQ==" - }, - "pify": { - "version": "4.0.1", - "resolved": "https://registry.npmjs.org/pify/-/pify-4.0.1.tgz", - "integrity": "sha512-uB80kBFb/tfd68bVleG9T5GGsGPjJrLAUpR5PZIrhBnIaRTQRjqdJSsIKkOP6OAIFbj7GOrcudc5pNjZ+geV2g==" - }, "pkg-dir": { "version": "3.0.0", "resolved": "https://registry.npmjs.org/pkg-dir/-/pkg-dir-3.0.0.tgz", @@ -16699,9 +15437,9 @@ } }, "typescript": { - "version": "3.7.4", - "resolved": "https://registry.npmjs.org/typescript/-/typescript-3.7.4.tgz", - "integrity": "sha512-A25xv5XCtarLwXpcDNZzCGvW2D1S3/bACratYBx2sax8PefsFhlYmkQicKHvpYflFS8if4zne5zT5kpJ7pzuvw==" + "version": "3.7.5", + "resolved": "https://registry.npmjs.org/typescript/-/typescript-3.7.5.tgz", + "integrity": "sha512-/P5lkRXkWHNAbcJIiHPfRoKqyd7bsyCma1hZNUGfn20qm64T6ZBlrzprymeu918H+mB/0rIg2gGK/BXkhhYgBw==" }, "typewriter": { "version": "7.0.1", @@ -16732,49 +15470,11 @@ "yargs": "^13.2.2" }, "dependencies": { - "find-up": { - "version": "3.0.0", - "resolved": "https://registry.npmjs.org/find-up/-/find-up-3.0.0.tgz", - "integrity": "sha512-1yD6RmLI1XBfxugvORwlck6f75tYL+iR0jqwsOrOxMZyGYqUuDhJ0l4AXdO1iX/FTs9cBAMEk1gWSEx1kSbylg==", - "requires": { - "locate-path": "^3.0.0" - } - }, - "locate-path": { - "version": "3.0.0", - "resolved": "https://registry.npmjs.org/locate-path/-/locate-path-3.0.0.tgz", - "integrity": "sha512-7AO748wWnIhNqAuaty2ZWHkQHRSNfPVIsPIfwEOWO22AmaoVrWavlOcMR5nzTLNYvp36X220/maaRsrec1G65A==", - "requires": { - "p-locate": "^3.0.0", - "path-exists": "^3.0.0" - } - }, "lodash": { "version": "4.17.12", "resolved": "https://registry.npmjs.org/lodash/-/lodash-4.17.12.tgz", "integrity": "sha512-+CiwtLnsJhX03p20mwXuvhoebatoh5B3tt+VvYlrPgZC1g36y+RRbkufX95Xa+X4I59aWEacDFYwnJZiyBh9gA==" }, - "p-limit": { - "version": "2.2.2", - "resolved": "https://registry.npmjs.org/p-limit/-/p-limit-2.2.2.tgz", - "integrity": "sha512-WGR+xHecKTr7EbUEhyLSh5Dube9JtdiG78ufaeLxTgpudf/20KqyMioIUZJAezlTIi6evxuoUs9YXc11cU+yzQ==", - "requires": { - "p-try": "^2.0.0" - } - }, - "p-locate": { - "version": "3.0.0", - "resolved": "https://registry.npmjs.org/p-locate/-/p-locate-3.0.0.tgz", - "integrity": "sha512-x+12w/To+4GFfgJhBEpiDcLozRJGegY+Ei7/z0tSLkMmxGZNybVMSfWj9aJn8Z5Fc7dBUNJOOVgPv2H7IwulSQ==", - "requires": { - "p-limit": "^2.0.0" - } - }, - "p-try": { - "version": "2.2.0", - "resolved": "https://registry.npmjs.org/p-try/-/p-try-2.2.0.tgz", - "integrity": "sha512-R4nPAVTAU0B9D35/Gk3uJf/7XYbQcyohSKdvAxIRSNghFl4e71hVoGnBNQz9cWaXxO2I10KTC+3jMdvvoKw6dQ==" - }, "semver": { "version": "6.3.0", "resolved": "https://registry.npmjs.org/semver/-/semver-6.3.0.tgz", @@ -16809,14 +15509,14 @@ } }, "ua-parser-js": { - "version": "0.7.20", - "resolved": "https://registry.npmjs.org/ua-parser-js/-/ua-parser-js-0.7.20.tgz", - "integrity": "sha512-8OaIKfzL5cpx8eCMAhhvTlft8GYF8b2eQr6JkCyVdrgjcytyOmPCXrqXFcUnhonRpLlh5yxEZVohm6mzaowUOw==" + "version": "0.7.21", + "resolved": "https://registry.npmjs.org/ua-parser-js/-/ua-parser-js-0.7.21.tgz", + "integrity": "sha512-+O8/qh/Qj8CgC6eYBVBykMrNtp5Gebn4dlGD/kKXVkJNDwyrAwSIqwz8CDf+tsAIWVycKcku6gIXJ0qwx/ZXaQ==" }, "uglify-js": { - "version": "3.7.2", - "resolved": "https://registry.npmjs.org/uglify-js/-/uglify-js-3.7.2.tgz", - "integrity": "sha512-uhRwZcANNWVLrxLfNFEdltoPNhECUR3lc+UdJoG9CBpMcSnKyWA94tc3eAujB1GcMY5Uwq8ZMp4qWpxWYDQmaA==", + "version": "3.7.6", + "resolved": "https://registry.npmjs.org/uglify-js/-/uglify-js-3.7.6.tgz", + "integrity": "sha512-yYqjArOYSxvqeeiYH2VGjZOqq6SVmhxzaPjJC1W2F9e+bqvFL9QXQ2osQuKUFjM2hGjKG2YclQnRKWQSt/nOTQ==", "optional": true, "requires": { "commander": "~2.20.3", @@ -17201,12 +15901,14 @@ "integrity": "sha1-RQ1Nyfpw3nMnYvvS1KKJgUGaDM8=" }, "util.promisify": { - "version": "1.0.0", - "resolved": "https://registry.npmjs.org/util.promisify/-/util.promisify-1.0.0.tgz", - "integrity": "sha512-i+6qA2MPhvoKLuxnJNpXAGhg7HphQOSUq2LKMZD0m15EiskXUkMvKdF4Uui0WYeCUGea+o2cw/ZuwehtfsrNkA==", + "version": "1.0.1", + "resolved": "https://registry.npmjs.org/util.promisify/-/util.promisify-1.0.1.tgz", + "integrity": "sha512-g9JpC/3He3bm38zsLupWryXHoEcS22YHthuPQSJdMy6KNrzIRzWqcsHzD/WUnqe45whVou4VIsPew37DoXWNrA==", "requires": { - "define-properties": "^1.1.2", - "object.getownpropertydescriptors": "^2.0.3" + "define-properties": "^1.1.3", + "es-abstract": "^1.17.2", + "has-symbols": "^1.0.1", + "object.getownpropertydescriptors": "^2.1.0" } }, "utils-merge": { @@ -17215,9 +15917,9 @@ "integrity": "sha1-n5VxD1CiZ5R7LMwSR0HBAoQn5xM=" }, "uuid": { - "version": "3.3.3", - "resolved": "https://registry.npmjs.org/uuid/-/uuid-3.3.3.tgz", - "integrity": "sha512-pW0No1RGHgzlpHJO1nsVrHKpOEIxkGg1xB+v0ZmdNH5OAeAwzAVrCnI2/6Mtx+Uys6iaylxa+D3g4j63IKKjSQ==" + "version": "3.4.0", + "resolved": "https://registry.npmjs.org/uuid/-/uuid-3.4.0.tgz", + "integrity": "sha512-HjSDRw6gZE5JMggctHBcjVak08+KEVhSIiDzFnT9S9aegmp85S/bReBVTb4QTFaRNptJ9kuYaNhnbNEOkbKb/A==" }, "v8-compile-cache": { "version": "2.1.0", @@ -17982,6 +16684,21 @@ "html-entities": "^1.2.0", "querystring": "^0.2.0", "strip-ansi": "^3.0.0" + }, + "dependencies": { + "ansi-regex": { + "version": "2.1.1", + "resolved": "https://registry.npmjs.org/ansi-regex/-/ansi-regex-2.1.1.tgz", + "integrity": "sha1-w7M6te42DYbg5ijwRorn7yfWVN8=" + }, + "strip-ansi": { + "version": "3.0.1", + "resolved": "https://registry.npmjs.org/strip-ansi/-/strip-ansi-3.0.1.tgz", + "integrity": "sha1-ajhfuIU9lS1f8F0Oiq+UJ43GPc8=", + "requires": { + "ansi-regex": "^2.0.0" + } + } } }, "webpack-log": { @@ -18118,21 +16835,6 @@ "ansi-styles": "^3.2.0", "string-width": "^3.0.0", "strip-ansi": "^5.0.0" - }, - "dependencies": { - "ansi-regex": { - "version": "4.1.0", - "resolved": "https://registry.npmjs.org/ansi-regex/-/ansi-regex-4.1.0.tgz", - "integrity": "sha512-1apePfXM1UOSqw0o9IiFAovVz9M5S1Dg+4TrDwfMewQ6p/rmMueb7tWZjQ1rx4Loy1ArBggoqGpfqqdI4rondg==" - }, - "strip-ansi": { - "version": "5.2.0", - "resolved": "https://registry.npmjs.org/strip-ansi/-/strip-ansi-5.2.0.tgz", - "integrity": "sha512-DuRs1gKbBqsMKIZlrffwlug8MHkcnpjs5VPmL1PAh+mA30U0DTotfDZ0d2UUsXpPmPmMMJ6W773MaA3J+lbiWA==", - "requires": { - "ansi-regex": "^4.1.0" - } - } } }, "wrappy": { @@ -18207,46 +16909,6 @@ "which-module": "^2.0.0", "y18n": "^4.0.0", "yargs-parser": "^15.0.0" - }, - "dependencies": { - "find-up": { - "version": "3.0.0", - "resolved": "https://registry.npmjs.org/find-up/-/find-up-3.0.0.tgz", - "integrity": "sha512-1yD6RmLI1XBfxugvORwlck6f75tYL+iR0jqwsOrOxMZyGYqUuDhJ0l4AXdO1iX/FTs9cBAMEk1gWSEx1kSbylg==", - "requires": { - "locate-path": "^3.0.0" - } - }, - "locate-path": { - "version": "3.0.0", - "resolved": "https://registry.npmjs.org/locate-path/-/locate-path-3.0.0.tgz", - "integrity": "sha512-7AO748wWnIhNqAuaty2ZWHkQHRSNfPVIsPIfwEOWO22AmaoVrWavlOcMR5nzTLNYvp36X220/maaRsrec1G65A==", - "requires": { - "p-locate": "^3.0.0", - "path-exists": "^3.0.0" - } - }, - "p-limit": { - "version": "2.2.2", - "resolved": "https://registry.npmjs.org/p-limit/-/p-limit-2.2.2.tgz", - "integrity": "sha512-WGR+xHecKTr7EbUEhyLSh5Dube9JtdiG78ufaeLxTgpudf/20KqyMioIUZJAezlTIi6evxuoUs9YXc11cU+yzQ==", - "requires": { - "p-try": "^2.0.0" - } - }, - "p-locate": { - "version": "3.0.0", - "resolved": "https://registry.npmjs.org/p-locate/-/p-locate-3.0.0.tgz", - "integrity": "sha512-x+12w/To+4GFfgJhBEpiDcLozRJGegY+Ei7/z0tSLkMmxGZNybVMSfWj9aJn8Z5Fc7dBUNJOOVgPv2H7IwulSQ==", - "requires": { - "p-limit": "^2.0.0" - } - }, - "p-try": { - "version": "2.2.0", - "resolved": "https://registry.npmjs.org/p-try/-/p-try-2.2.0.tgz", - "integrity": "sha512-R4nPAVTAU0B9D35/Gk3uJf/7XYbQcyohSKdvAxIRSNghFl4e71hVoGnBNQz9cWaXxO2I10KTC+3jMdvvoKw6dQ==" - } } }, "yargs-parser": { diff --git a/website/pages/api-docs/auth/alicloud/index.mdx b/website/pages/api-docs/auth/alicloud/index.mdx index 46a53ee67..a19a3c88a 100644 --- a/website/pages/api-docs/auth/alicloud/index.mdx +++ b/website/pages/api-docs/auth/alicloud/index.mdx @@ -9,7 +9,7 @@ description: This is the API documentation for the Vault AliCloud auth method. This is the API documentation for the Vault AliCloud auth method. For general information about the usage and operation of the AliCloud method, please -see the [Vault AliCloud auth method documentation](/docs/auth/alicloud.html). +see the [Vault AliCloud auth method documentation](/docs/auth/alicloud). This documentation assumes the AliCloud auth method is mounted at the `/auth/alicloud` path in Vault. Since it is possible to enable auth methods at any location, diff --git a/website/pages/api-docs/auth/app-id/index.mdx b/website/pages/api-docs/auth/app-id/index.mdx index c774fb6a6..c3a2fd98e 100644 --- a/website/pages/api-docs/auth/app-id/index.mdx +++ b/website/pages/api-docs/auth/app-id/index.mdx @@ -12,7 +12,7 @@ Please use AppRole instead. This is the API documentation for the Vault App ID auth method. For general information about the usage and operation of the App ID method, please -see the [Vault App ID method documentation](/docs/auth/app-id.html). +see the [Vault App ID method documentation](/docs/auth/app-id). This documentation assumes the App ID method is mounted at the `/auth/app-id` path in Vault. Since it is possible to enable auth methods at any location, diff --git a/website/pages/api-docs/auth/approle/index.mdx b/website/pages/api-docs/auth/approle/index.mdx index 7def1a9f8..9beede8ff 100644 --- a/website/pages/api-docs/auth/approle/index.mdx +++ b/website/pages/api-docs/auth/approle/index.mdx @@ -9,7 +9,7 @@ description: This is the API documentation for the Vault AppRole auth method. This is the API documentation for the Vault AppRole auth method. For general information about the usage and operation of the AppRole method, please -see the [Vault AppRole method documentation](/docs/auth/approle.html). +see the [Vault AppRole method documentation](/docs/auth/approle). This documentation assumes the AppRole method is mounted at the `/auth/approle` path in Vault. Since it is possible to enable auth methods at any location, diff --git a/website/pages/api-docs/auth/aws/index.mdx b/website/pages/api-docs/auth/aws/index.mdx index 0ff2816b8..d5cbcf74b 100644 --- a/website/pages/api-docs/auth/aws/index.mdx +++ b/website/pages/api-docs/auth/aws/index.mdx @@ -9,7 +9,7 @@ description: This is the API documentation for the Vault AWS auth method. This is the API documentation for the Vault AWS auth method. For general information about the usage and operation of the AWS method, please -see the [Vault AWS method documentation](/docs/auth/aws.html). +see the [Vault AWS method documentation](/docs/auth/aws). This documentation assumes the AWS method is mounted at the `/auth/aws` path in Vault. Since it is possible to enable auth methods at any location, @@ -137,7 +137,7 @@ $ curl \ ## Configure Identity Integration This configures the way that Vault interacts with the -[Identity](/docs/secrets/identity/index.html) store. The default (as of Vault +[Identity](/docs/secrets/identity) store. The default (as of Vault 1.0.3) is `role_id` for both values. | Method | Path | @@ -150,7 +150,7 @@ This configures the way that Vault interacts with the using the `iam` auth method. Valid choices are `role_id`, `unique_id`, and `full_arn` When `role_id` is selected, the randomly generated ID of the role is used. When `unique_id` is selected, the [IAM Unique - ID](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_identifiers.html#identifiers-unique-ids) + ID](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_identifiers#identifiers-unique-ids) of the IAM principal (either the user or role) is used as the identity alias name. When `full_arn` is selected, the ARN returned by the `sts:GetCallerIdentity` call is used as the alias name. This is either @@ -705,7 +705,7 @@ list in order to satisfy that constraint. role inferencing is activated. This only applies to the iam auth method. - `resolve_aws_unique_ids` `(bool: true)` - When set, resolves the `bound_iam_principal_arn` to the - [AWS Unique ID](http://docs.aws.amazon.com/IAM/latest/UserGuide/reference_identifiers.html#identifiers-unique-ids) + [AWS Unique ID](http://docs.aws.amazon.com/IAM/latest/UserGuide/reference_identifiers#identifiers-unique-ids) for the bound principal ARN. This field is ignored when `bound_iam_principal_arn` ends with a wildcard character. This requires Vault to be able to call `iam:GetUser` or `iam:GetRole` on the diff --git a/website/pages/api-docs/auth/azure/index.mdx b/website/pages/api-docs/auth/azure/index.mdx index a3ee1003c..15fd64156 100644 --- a/website/pages/api-docs/auth/azure/index.mdx +++ b/website/pages/api-docs/auth/azure/index.mdx @@ -11,7 +11,7 @@ description: |- This is the API documentation for the Vault Azure auth method plugin. To learn more about the usage and operation, see the -[Vault Azure method documentation](/docs/auth/azure.html). +[Vault Azure method documentation](/docs/auth/azure). This documentation assumes the plugin method is mounted at the `/auth/azure` path in Vault. Since it is possible to enable auth methods diff --git a/website/pages/api-docs/auth/cert/index.mdx b/website/pages/api-docs/auth/cert/index.mdx index d53cfd1a1..ca9d11b8d 100644 --- a/website/pages/api-docs/auth/cert/index.mdx +++ b/website/pages/api-docs/auth/cert/index.mdx @@ -11,7 +11,7 @@ description: |- This is the API documentation for the Vault TLS Certificate authentication method. For general information about the usage and operation of the TLS -Certificate method, please see the [Vault TLS Certificate method documentation](/docs/auth/cert.html). +Certificate method, please see the [Vault TLS Certificate method documentation](/docs/auth/cert). This documentation assumes the TLS Certificate method is mounted at the `/auth/cert` path in Vault. Since it is possible to enable auth methods at any diff --git a/website/pages/api-docs/auth/cf/index.mdx b/website/pages/api-docs/auth/cf/index.mdx index 4bedd728e..6c0165fac 100644 --- a/website/pages/api-docs/auth/cf/index.mdx +++ b/website/pages/api-docs/auth/cf/index.mdx @@ -9,7 +9,7 @@ description: This is the API documentation for the Vault Cloud Foundry auth meth This is the API documentation for the Vault CF auth method. For general information about the usage and operation of the CF method, please -see the [Vault CF method documentation](/docs/auth/cf.html). +see the [Vault CF method documentation](/docs/auth/cf). This documentation assumes the CF method is mounted at the `/auth/cf` path in Vault. Since it is possible to enable auth methods at any location, @@ -20,7 +20,7 @@ please update your API calls accordingly. Configure the root CA certificate to be used for verifying instance identity certificates, and configure access to the CF API. For detailed instructions on how to obtain these values, please see the [Vault CF method -documentation](/docs/auth/cf.html). +documentation](/docs/auth/cf). | Method | Path | | :----- | ----------------- | diff --git a/website/pages/api-docs/auth/gcp/index.mdx b/website/pages/api-docs/auth/gcp/index.mdx index afdb116c8..3249f2b55 100644 --- a/website/pages/api-docs/auth/gcp/index.mdx +++ b/website/pages/api-docs/auth/gcp/index.mdx @@ -11,7 +11,7 @@ description: |- This is the API documentation for the Vault Google Cloud auth method. To learn more about the usage and operation, see the -[Vault Google Cloud method documentation](/docs/auth/gcp.html). +[Vault Google Cloud method documentation](/docs/auth/gcp). This documentation assumes the plugin method is mounted at the `/auth/gcp` path in Vault. Since it is possible to enable auth methods diff --git a/website/pages/api-docs/auth/github/index.mdx b/website/pages/api-docs/auth/github/index.mdx index 98cdfca30..a08356cd1 100644 --- a/website/pages/api-docs/auth/github/index.mdx +++ b/website/pages/api-docs/auth/github/index.mdx @@ -9,7 +9,7 @@ description: This is the API documentation for the Vault GitHub auth method. This is the API documentation for the Vault GitHub auth method. For general information about the usage and operation of the GitHub method, please -see the [Vault GitHub method documentation](/docs/auth/github.html). +see the [Vault GitHub method documentation](/docs/auth/github). This documentation assumes the GitHub method is enabled at the `/auth/github` path in Vault. Since it is possible to enable auth methods at any location, diff --git a/website/pages/api-docs/auth/jwt/index.mdx b/website/pages/api-docs/auth/jwt/index.mdx index ddf934479..99abf4eac 100644 --- a/website/pages/api-docs/auth/jwt/index.mdx +++ b/website/pages/api-docs/auth/jwt/index.mdx @@ -11,7 +11,7 @@ description: |- This is the API documentation for the Vault JWT/OIDC auth method plugin. To learn more about the usage and operation, see the -[Vault JWT/OIDC method documentation](/docs/auth/jwt.html). +[Vault JWT/OIDC method documentation](/docs/auth/jwt). This documentation assumes the plugin method is mounted at the `/auth/jwt` path in Vault. Since it is possible to enable auth methods @@ -281,7 +281,7 @@ Obtain an authorization URL from Vault to start an OIDC login flow. - `redirect_uri` `(string: )` - Path to the callback to complete the login. This will be of the form, "https://.../oidc/callback" where the leading portion is dependent on your Vault server location, port, and the mount of the JWT plugin. This must be configured with Vault and the - provider. See [Redirect URIs](/docs/auth/jwt.html#redirect-uris) for more information. + provider. See [Redirect URIs](/docs/auth/jwt#redirect-uris) for more information. ### Sample Payload diff --git a/website/pages/api-docs/auth/kerberos/index.mdx b/website/pages/api-docs/auth/kerberos/index.mdx index 945115970..75221312b 100644 --- a/website/pages/api-docs/auth/kerberos/index.mdx +++ b/website/pages/api-docs/auth/kerberos/index.mdx @@ -9,7 +9,7 @@ description: This is the API documentation for the Vault Kerberos auth method pl This is the API documentation for the Vault Kerberos auth method plugin. To learn more about the usage and operation, see the -[Vault Kerberos auth method](/docs/auth/kerberos.html). +[Vault Kerberos auth method](/docs/auth/kerberos). This documentation assumes the Kerberos auth method is mounted at the `auth/kerberos` path in Vault. Since it is possible to enable auth methods at diff --git a/website/pages/api-docs/auth/kubernetes/index.mdx b/website/pages/api-docs/auth/kubernetes/index.mdx index e72546451..653fd1606 100644 --- a/website/pages/api-docs/auth/kubernetes/index.mdx +++ b/website/pages/api-docs/auth/kubernetes/index.mdx @@ -9,7 +9,7 @@ description: This is the API documentation for the Vault Kubernetes auth method This is the API documentation for the Vault Kubernetes auth method plugin. To learn more about the usage and operation, see the -[Vault Kubernetes auth method](/docs/auth/kubernetes.html). +[Vault Kubernetes auth method](/docs/auth/kubernetes). This documentation assumes the Kubernetes method is mounted at the `/auth/kubernetes` path in Vault. Since it is possible to enable auth methods at diff --git a/website/pages/api-docs/auth/ldap/index.mdx b/website/pages/api-docs/auth/ldap/index.mdx index 9837847a4..ec69a5b1e 100644 --- a/website/pages/api-docs/auth/ldap/index.mdx +++ b/website/pages/api-docs/auth/ldap/index.mdx @@ -9,7 +9,7 @@ description: This is the API documentation for the Vault LDAP auth method. This is the API documentation for the Vault LDAP auth method. For general information about the usage and operation of the LDAP method, please -see the [Vault LDAP method documentation](/docs/auth/ldap.html). +see the [Vault LDAP method documentation](/docs/auth/ldap). This documentation assumes the LDAP method is mounted at the `/auth/ldap` path in Vault. Since it is possible to enable auth methods at any location, diff --git a/website/pages/api-docs/auth/oci/index.mdx b/website/pages/api-docs/auth/oci/index.mdx index a6eb244df..9f5bf11c6 100644 --- a/website/pages/api-docs/auth/oci/index.mdx +++ b/website/pages/api-docs/auth/oci/index.mdx @@ -9,7 +9,7 @@ description: This is the API documentation for the Vault OCI auth method plugin. This is the API documentation for the Vault OCI auth method plugin. To learn more about the usage and operation, see the -[Vault OCI auth method](/docs/auth/oci.html). +[Vault OCI auth method](/docs/auth/oci). This documentation assumes the OCI method is mounted at the `/auth/oci` path in Vault. Since it is possible to enable auth methods at diff --git a/website/pages/api-docs/auth/okta/index.mdx b/website/pages/api-docs/auth/okta/index.mdx index ea275a211..5015b4298 100644 --- a/website/pages/api-docs/auth/okta/index.mdx +++ b/website/pages/api-docs/auth/okta/index.mdx @@ -9,7 +9,7 @@ description: This is the API documentation for the Vault Okta auth method. This is the API documentation for the Vault Okta auth method. For general information about the usage and operation of the Okta method, please -see the [Vault Okta method documentation](/docs/auth/okta.html). +see the [Vault Okta method documentation](/docs/auth/okta). This documentation assumes the Okta method is mounted at the `/auth/okta` path in Vault. Since it is possible to enable auth methods at any location, diff --git a/website/pages/api-docs/auth/radius/index.mdx b/website/pages/api-docs/auth/radius/index.mdx index af2b13e07..3bca5f3eb 100644 --- a/website/pages/api-docs/auth/radius/index.mdx +++ b/website/pages/api-docs/auth/radius/index.mdx @@ -9,7 +9,7 @@ description: This is the API documentation for the Vault RADIUS auth method. This is the API documentation for the Vault RADIUS auth method. For general information about the usage and operation of the RADIUS method, please -see the [Vault RADIUS method documentation](/docs/auth/radius.html). +see the [Vault RADIUS method documentation](/docs/auth/radius). This documentation assumes the RADIUS method is mounted at the `/auth/radius` path in Vault. Since it is possible to enable auth methods at any location, diff --git a/website/pages/api-docs/auth/token/index.mdx b/website/pages/api-docs/auth/token/index.mdx index 7391761f8..8c22bfb5a 100644 --- a/website/pages/api-docs/auth/token/index.mdx +++ b/website/pages/api-docs/auth/token/index.mdx @@ -9,7 +9,7 @@ description: This is the API documentation for the Vault token auth method. This is the API documentation for the Vault token auth method. For general information about the usage and operation of the token method, please -see the [Vault Token method documentation](/docs/auth/token.html). +see the [Vault Token method documentation](/docs/auth/token). ## List Accessors @@ -84,7 +84,7 @@ during this call. - `lease` `(string: "")` - DEPRECATED; use `ttl` instead - `ttl` `(string: "")` - The TTL period of the token, provided as "1h", where hour is the largest suffix. If not provided, the token is valid for the - [default lease TTL](/docs/configuration/index.html), or indefinitely if the + [default lease TTL](/docs/configuration), or indefinitely if the root policy is used. - `type` `(string: "")` - The token type. Can be "batch" or "service". Defaults to the type specified by the role configuration named by `role_name`. diff --git a/website/pages/api-docs/auth/userpass/index.mdx b/website/pages/api-docs/auth/userpass/index.mdx index 48bcef641..d1dbde6b7 100644 --- a/website/pages/api-docs/auth/userpass/index.mdx +++ b/website/pages/api-docs/auth/userpass/index.mdx @@ -11,7 +11,7 @@ description: |- This is the API documentation for the Vault Username & Password auth method. For general information about the usage and operation of the Username and Password method, please -see the [Vault Userpass method documentation](/docs/auth/userpass.html). +see the [Vault Userpass method documentation](/docs/auth/userpass). This documentation assumes the Username & Password method is mounted at the `/auth/userpass` path in Vault. Since it is possible to enable auth methods at any location, diff --git a/website/pages/api-docs/index.mdx b/website/pages/api-docs/index.mdx index ea40ae116..571d7d83f 100644 --- a/website/pages/api-docs/index.mdx +++ b/website/pages/api-docs/index.mdx @@ -37,7 +37,7 @@ either the `X-Vault-Token` HTTP Header or as `Authorization` HTTP Header using the `Bearer ` scheme. Otherwise, a client token can be retrieved via [authentication -backends](/docs/auth/index.html). +backends](/docs/auth). Each auth method has one or more unauthenticated login endpoints. These endpoints can be reached without any authentication, and are used for @@ -50,7 +50,7 @@ client or passed via the `X-Vault-Token` or `Authorization` header for future re ## Namespaces -If using the [Namespaces](/docs/enterprise/namespaces/index.html) feature, API +If using the [Namespaces](/docs/enterprise/namespaces) feature, API operations are relative to the namespace value passed in via the `X-Vault-Namespace` header. For instance, if the request path is to `secret/foo`, and the header is set to `ns1/ns2/`, the final request path Vault @@ -186,7 +186,7 @@ To retrieve the help for any API within Vault, including mounted backends, auth methods, etc. then append `?help=1` to any URL. If you have valid permission to access the path, then the help text will be return a markdown-formatted block in the `help` attribute of the response. -Additionally, with the [OpenAPI generation](/api/system/internal-specs-openapi.html) in Vault, you will get back a small +Additionally, with the [OpenAPI generation](/api/system/internal-specs-openapi) in Vault, you will get back a small OpenAPI document in the `openapi` attribute. This document is relevant for the path you're looking up and any paths under it - also note paths in the OpenAPI document are relative to the initial path queried. Example request: @@ -289,4 +289,4 @@ A maximum request size of 32MB is imposed to prevent a denial of service attack with arbitrarily large requests; this can be tuned per `listener` block in Vault's server configuration file. -[agent]: /docs/agent/index.html#listener-stanza +[agent]: /docs/agent#listener-stanza diff --git a/website/pages/api-docs/relatedtools.mdx b/website/pages/api-docs/relatedtools.mdx index b2683e2eb..cda98c439 100644 --- a/website/pages/api-docs/relatedtools.mdx +++ b/website/pages/api-docs/relatedtools.mdx @@ -34,4 +34,4 @@ The following list of tools is maintained by the community of Vault users; Hashi - [Vault-CRD](https://vault.koudingspawn.de/) - Synchronize secrets stored in HashiCorp Vault to Kubernetes Secrets for better GitOps without secrets stored in git manifest files. - [nc-vault-env](https://github.com/namecheap/nc-vault-env) - JS CLI tool that fetches secrets in parallel, puts them into the environment and then `exec`s the process that needs them. Supports auth token renewal, multiple auth backends, verbose logging and dummy mode. -Want to add your own project, or one that you use? Additions are welcome via [pull requests](https://github.com/hashicorp/vault/blob/master/website/source/api/relatedtools.html.md). +Want to add your own project, or one that you use? Additions are welcome via [pull requests](https://github.com/hashicorp/vault/blob/master/website/pages/api-docs/relatedtools.mdx). diff --git a/website/pages/api-docs/secret/ad/index.mdx b/website/pages/api-docs/secret/ad/index.mdx index e76384589..0588d5d7f 100644 --- a/website/pages/api-docs/secret/ad/index.mdx +++ b/website/pages/api-docs/secret/ad/index.mdx @@ -9,7 +9,7 @@ description: This is the API documentation for the Vault Active Directory secret This is the API documentation for the Vault AD secrets engine. For general information about the usage and operation of the AD secrets engine, please see -the [Vault Active Directory documentation](/docs/secrets/ad/index.html). +the [Vault Active Directory documentation](/docs/secrets/ad). This documentation assumes the AD secrets engine is enabled at the `/ad` path in Vault. Since it is possible to enable secrets engines at any location, please diff --git a/website/pages/api-docs/secret/alicloud/index.mdx b/website/pages/api-docs/secret/alicloud/index.mdx index f41b89867..a773afb70 100644 --- a/website/pages/api-docs/secret/alicloud/index.mdx +++ b/website/pages/api-docs/secret/alicloud/index.mdx @@ -9,7 +9,7 @@ description: This is the API documentation for the Vault AliCloud secrets engine This is the API documentation for the Vault AliCloud secrets engine. For general information about the usage and operation of the AliCloud secrets engine, please see -the [Vault AliCloud documentation](/docs/secrets/alicloud/index.html). +the [Vault AliCloud documentation](/docs/secrets/alicloud). This documentation assumes the AliCloud secrets engine is enabled at the `/alicloud` path in Vault. Since it is possible to enable secrets engines at any location, please @@ -29,7 +29,7 @@ To use instance metadata, leave the static credential configuration unset. At present, this endpoint does not confirm that the provided AliCloud credentials are valid AliCloud credentials with proper permissions. -Please see the [Vault AliCloud documentation](/docs/secrets/alicloud/index.html) for +Please see the [Vault AliCloud documentation](/docs/secrets/alicloud) for the policies that should be attached to the access key you provide. | Method | Path | @@ -78,7 +78,7 @@ The `role` endpoint configures how Vault will generate credentials for users of - `name` (string, required) – Specifies the name of the role to generate credentials against. This is part of the request URL. - `remote_policies` (string, optional) - The names and types of a pre-existing policies to be applied to the generate access token. Example: "name:AliyunOSSReadOnlyAccess,type:System". - `inline_policies` (string, optional) - The policy document JSON to be generated and attached to the access token. -- `role_arn` (string, optional) - The ARN of a role that will be assumed to obtain STS credentials. See [Vault AliCloud documentation](/docs/secrets/alicloud/index.html) regarding trusted actors. +- `role_arn` (string, optional) - The ARN of a role that will be assumed to obtain STS credentials. See [Vault AliCloud documentation](/docs/secrets/alicloud) regarding trusted actors. - `ttl` (int, optional) - The duration in seconds after which the issued token should expire. Defaults to 0, in which case the value will fallback to the system/mount defaults. - `max_ttl` (int, optional) - The maximum allowed lifetime of tokens issued using this role. diff --git a/website/pages/api-docs/secret/aws/index.mdx b/website/pages/api-docs/secret/aws/index.mdx index 127c5c9c9..f5146898f 100644 --- a/website/pages/api-docs/secret/aws/index.mdx +++ b/website/pages/api-docs/secret/aws/index.mdx @@ -9,7 +9,7 @@ description: This is the API documentation for the Vault AWS secrets engine. This is the API documentation for the Vault AWS secrets engine. For general information about the usage and operation of the AWS secrets engine, please see -the [Vault AWS documentation](/docs/secrets/aws/index.html). +the [Vault AWS documentation](/docs/secrets/aws). This documentation assumes the AWS secrets engine is enabled at the `/aws` path in Vault. Since it is possible to enable secrets engines at any location, please diff --git a/website/pages/api-docs/secret/azure/index.mdx b/website/pages/api-docs/secret/azure/index.mdx index a2bdfff91..013bed3c4 100644 --- a/website/pages/api-docs/secret/azure/index.mdx +++ b/website/pages/api-docs/secret/azure/index.mdx @@ -223,8 +223,8 @@ $ curl \ ## Revoking/Renewing Secrets -See docs on how to [renew](/api/system/leases.html#renew-lease) and [revoke](/api/system/leases.html#revoke-lease) leases. +See docs on how to [renew](/api/system/leases#renew-lease) and [revoke](/api/system/leases#revoke-lease) leases. -[docs]: /docs/secrets/azure/index.html -[roles]: /docs/secrets/azure/index.html#roles -[groups]: /docs/secrets/azure/index.html#azure-groups +[docs]: /docs/secrets/azure +[roles]: /docs/secrets/azure#roles +[groups]: /docs/secrets/azure#azure-groups diff --git a/website/pages/api-docs/secret/cassandra/index.mdx b/website/pages/api-docs/secret/cassandra/index.mdx index 29d4facd1..0d98c155b 100644 --- a/website/pages/api-docs/secret/cassandra/index.mdx +++ b/website/pages/api-docs/secret/cassandra/index.mdx @@ -10,12 +10,12 @@ description: This is the API documentation for the Vault Cassandra secrets engin ~> **Deprecation Note:** This backend is deprecated in favor of the combined databases backend added in v0.7.1. See the API documentation for the new implementation of this backend at -[Cassandra database plugin HTTP API](/api/secret/databases/cassandra.html). +[Cassandra database plugin HTTP API](/api/secret/databases/cassandra). This is the API documentation for the Vault Cassandra secrets engine. For general information about the usage and operation of the Cassandra backend, please see the -[Vault Cassandra backend documentation](/docs/secrets/cassandra/index.html). +[Vault Cassandra backend documentation](/docs/secrets/cassandra). This documentation assumes the Cassandra backend is mounted at the `/cassandra` path in Vault. Since it is possible to enable secrets engines at any location, @@ -55,7 +55,7 @@ Cassandra. private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. For convenience format is the same as the output of the `issue` command from the `pki` backend; see - [the pki documentation](/docs/secrets/pki/index.html). + [the pki documentation](/docs/secrets/pki). - `protocol_version` `(int: 2)` – Specifies the CQL protocol version to use. diff --git a/website/pages/api-docs/secret/consul/index.mdx b/website/pages/api-docs/secret/consul/index.mdx index f74548d96..a85d2c76e 100644 --- a/website/pages/api-docs/secret/consul/index.mdx +++ b/website/pages/api-docs/secret/consul/index.mdx @@ -9,7 +9,7 @@ description: This is the API documentation for the Vault Consul secrets engine. This is the API documentation for the Vault Consul secrets engine. For general information about the usage and operation of the Consul secrets engine, please -see the [Vault Consul documentation](/docs/secrets/consul/index.html). +see the [Vault Consul documentation](/docs/secrets/consul). This documentation assumes the Consul secrets engine is enabled at the `/consul` path in Vault. Since it is possible to enable secrets engines at any location, @@ -75,7 +75,7 @@ updated attributes. - `policy` `(string: )` – Specifies the base64 encoded ACL policy. The ACL format can be found in the [Consul ACL - documentation](https://www.consul.io/docs/internals/acl.html). This is + documentation](https://www.consul.io/docs/internals/acl). This is required unless the `token_type` is `management`. - `policies` `(list: )` – The list of policies to assign to the generated diff --git a/website/pages/api-docs/secret/cubbyhole/index.mdx b/website/pages/api-docs/secret/cubbyhole/index.mdx index 57a00e558..c063c0d2f 100644 --- a/website/pages/api-docs/secret/cubbyhole/index.mdx +++ b/website/pages/api-docs/secret/cubbyhole/index.mdx @@ -10,7 +10,7 @@ description: This is the API documentation for the Vault Cubbyhole secrets engin This is the API documentation for the Vault Cubbyhole secrets engine. For general information about the usage and operation of the Cubbyhole secrets engine, please see the -[Vault Cubbyhole documentation](/docs/secrets/cubbyhole/index.html). +[Vault Cubbyhole documentation](/docs/secrets/cubbyhole). This documentation assumes the Cubbyhole secrets engine is enabled at the `/cubbyhole` path in Vault. Since it is possible to enable secrets engines at diff --git a/website/pages/api-docs/secret/databases/cassandra.mdx b/website/pages/api-docs/secret/databases/cassandra.mdx index e0cad8dc8..39f7ee999 100644 --- a/website/pages/api-docs/secret/databases/cassandra.mdx +++ b/website/pages/api-docs/secret/databases/cassandra.mdx @@ -16,7 +16,7 @@ configured roles for the Cassandra database. ## Configure Connection In addition to the parameters defined by the [Database -Secrets Engine](/api/secret/databases/index.html#configure-connection), this plugin +Secrets Engine](/api/secret/databases#configure-connection), this plugin has a number of parameters to further configure a connection. | Method | Path | @@ -51,7 +51,7 @@ has a number of parameters to further configure a connection. private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. For convenience format is the same as the output of the `issue` command from the `pki` secrets engine; see - [the pki documentation](/docs/secrets/pki/index.html). + [the pki documentation](/docs/secrets/pki). - `skip_verification` `(bool: false)` - Skip permissions checks when a connection to Cassandra is first created. These checks ensure that Vault is able to create roles, but can be resource @@ -121,7 +121,7 @@ $ curl \ Statements are configured during role creation and are used by the plugin to determine what is sent to the database on user creation, renewing, and revocation. For more information on configuring roles see the [Role -API](/api/secret/databases/index.html#create-role) in the database secrets engine docs. +API](/api/secret/databases#create-role) in the database secrets engine docs. ### Parameters diff --git a/website/pages/api-docs/secret/databases/elasticdb.mdx b/website/pages/api-docs/secret/databases/elasticdb.mdx index 61beac1e9..7d7db2b36 100644 --- a/website/pages/api-docs/secret/databases/elasticdb.mdx +++ b/website/pages/api-docs/secret/databases/elasticdb.mdx @@ -16,7 +16,7 @@ configured roles for Elasticsearch. ## Configure Connection In addition to the parameters defined by the [Database -Backend](/api/secret/databases/index.html#configure-connection), this plugin +Backend](/api/secret/databases#configure-connection), this plugin has a number of parameters to further configure a connection. | Method | Path | @@ -65,7 +65,7 @@ $ curl \ Statements are configured during role creation and are used by the plugin to determine what is sent to the database on user creation, renewing, and revocation. For more information on configuring roles see the [Role -API](/api/secret/databases/index.html#create-role) in the database secrets engine docs. +API](/api/secret/databases#create-role) in the database secrets engine docs. ### Parameters diff --git a/website/pages/api-docs/secret/databases/hanadb.mdx b/website/pages/api-docs/secret/databases/hanadb.mdx index 979f0866a..17c1fa5f6 100644 --- a/website/pages/api-docs/secret/databases/hanadb.mdx +++ b/website/pages/api-docs/secret/databases/hanadb.mdx @@ -16,7 +16,7 @@ configured roles for the HANA database. ## Configure Connection In addition to the parameters defined by the [database -secrets engine](/api/secret/databases/index.html#configure-connection), this plugin +secrets engine](/api/secret/databases#configure-connection), this plugin has a number of parameters to further configure a connection. | Method | Path | Produces | @@ -74,7 +74,7 @@ $ curl \ Statements are configured during role creation and are used by the plugin to determine what is sent to the database on user creation, renewing, and revocation. For more information on configuring roles see the [Role -API](/api/secret/databases/index.html#create-role) in the database secrets engine docs. +API](/api/secret/databases#create-role) in the database secrets engine docs. ### Parameters diff --git a/website/pages/api-docs/secret/databases/index.mdx b/website/pages/api-docs/secret/databases/index.mdx index 009b85873..ef6ef8d8c 100644 --- a/website/pages/api-docs/secret/databases/index.mdx +++ b/website/pages/api-docs/secret/databases/index.mdx @@ -10,7 +10,7 @@ description: Top page for database secrets engine information This is the API documentation for the Vault Database secrets engine. For general information about the usage and operation of the database secrets engine, please see the -[Vault database secrets engine documentation](/docs/secrets/databases/index.html). +[Vault database secrets engine documentation](/docs/secrets/databases). This documentation assumes the database secrets engine is enabled at the `/database` path in Vault. Since it is possible to enable secrets engines at any @@ -228,7 +228,7 @@ This endpoint creates or updates a role definition. - `max_ttl` `(string/int: 0)` - Specifies the maximum TTL for the leases associated with this role. Accepts time suffixed strings ("1h") or an integer - number of seconds. Defaults to system/mount default TTL time; this value is allowed to be less than the mount max TTL (or, if not set, the system max TTL), but it is not allowed to be longer. See also [The TTL General Case](https://www.vaultproject.io/docs/concepts/tokens.html#the-general-case). + number of seconds. Defaults to system/mount default TTL time; this value is allowed to be less than the mount max TTL (or, if not set, the system max TTL), but it is not allowed to be longer. See also [The TTL General Case](/docs/concepts/tokens#the-general-case). - `creation_statements` `(list: )` – Specifies the database statements executed to create and configure a user. See the plugin's API page diff --git a/website/pages/api-docs/secret/databases/influxdb.mdx b/website/pages/api-docs/secret/databases/influxdb.mdx index 27c730c8a..3e4207f76 100644 --- a/website/pages/api-docs/secret/databases/influxdb.mdx +++ b/website/pages/api-docs/secret/databases/influxdb.mdx @@ -16,7 +16,7 @@ configured roles for the Influxdb database. ## Configure Connection In addition to the parameters defined by the [Database -Secrets Engine](/api/secret/databases/index.html#configure-connection), this plugin +Secrets Engine](/api/secret/databases#configure-connection), this plugin has a number of parameters to further configure a connection. | Method | Path | @@ -51,7 +51,7 @@ has a number of parameters to further configure a connection. private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. For convenience format is the same as the output of the `issue` command from the `pki` secrets engine; see - [the pki documentation](/docs/secrets/pki/index.html). + [the pki documentation](/docs/secrets/pki). - `connect_timeout` `(string: "5s")` – Specifies the connection timeout to use. @@ -103,7 +103,7 @@ $ curl \ Statements are configured during role creation and are used by the plugin to determine what is sent to the database on user creation, renewing, and revocation. For more information on configuring roles see the [Role -API](/api/secret/databases/index.html#create-role) in the database secrets engine docs. +API](/api/secret/databases#create-role) in the database secrets engine docs. ### Parameters diff --git a/website/pages/api-docs/secret/databases/mongodb.mdx b/website/pages/api-docs/secret/databases/mongodb.mdx index 6ee9245bf..a540133c6 100644 --- a/website/pages/api-docs/secret/databases/mongodb.mdx +++ b/website/pages/api-docs/secret/databases/mongodb.mdx @@ -16,7 +16,7 @@ configured roles for the MongoDB database. ## Configure Connection In addition to the parameters defined by the [Database -Backend](/api/secret/databases/index.html#configure-connection), this plugin +Backend](/api/secret/databases#configure-connection), this plugin has a number of parameters to further configure a connection. | Method | Path | @@ -65,7 +65,7 @@ $ curl \ Statements are configured during role creation and are used by the plugin to determine what is sent to the database on user creation, renewing, and revocation. For more information on configuring roles see the [Role -API](/api/secret/databases/index.html#create-role) in the database secrets engine docs. +API](/api/secret/databases#create-role) in the database secrets engine docs. ### Parameters diff --git a/website/pages/api-docs/secret/databases/mssql.mdx b/website/pages/api-docs/secret/databases/mssql.mdx index ebd01d6bb..e1387ed16 100644 --- a/website/pages/api-docs/secret/databases/mssql.mdx +++ b/website/pages/api-docs/secret/databases/mssql.mdx @@ -16,7 +16,7 @@ configured roles for the MSSQL database. ## Configure Connection In addition to the parameters defined by the [Database -Backend](/api/secret/databases/index.html#configure-connection), this plugin +Backend](/api/secret/databases#configure-connection), this plugin has a number of parameters to further configure a connection. | Method | Path | @@ -74,7 +74,7 @@ $ curl \ Statements are configured during role creation and are used by the plugin to determine what is sent to the database on user creation, renewing, and revocation. For more information on configuring roles see the [Role -API](/api/secret/databases/index.html#create-role) in the database secrets engine docs. +API](/api/secret/databases#create-role) in the database secrets engine docs. ### Parameters diff --git a/website/pages/api-docs/secret/databases/mysql-maria.mdx b/website/pages/api-docs/secret/databases/mysql-maria.mdx index eae47c6f8..b6af7466d 100644 --- a/website/pages/api-docs/secret/databases/mysql-maria.mdx +++ b/website/pages/api-docs/secret/databases/mysql-maria.mdx @@ -16,7 +16,7 @@ configured roles for the MySQL database. ## Configure Connection In addition to the parameters defined by the [Database -Backend](/api/secret/databases/index.html#configure-connection), this plugin +Backend](/api/secret/databases#configure-connection), this plugin has a number of parameters to further configure a connection. | Method | Path | @@ -74,7 +74,7 @@ $ curl \ Statements are configured during role creation and are used by the plugin to determine what is sent to the database on user creation, renewing, and revocation. For more information on configuring roles see the [Role -API](/api/secret/databases/index.html#create-role) in the database secrets engine docs. +API](/api/secret/databases#create-role) in the database secrets engine docs. ### Parameters diff --git a/website/pages/api-docs/secret/databases/oracle.mdx b/website/pages/api-docs/secret/databases/oracle.mdx index c4c439c91..424e8da6f 100644 --- a/website/pages/api-docs/secret/databases/oracle.mdx +++ b/website/pages/api-docs/secret/databases/oracle.mdx @@ -16,7 +16,7 @@ configured roles for the Oracle database. ## Configure Connection In addition to the parameters defined by the [Database -Backend](/api/secret/databases/index.html#configure-connection), this plugin +Backend](/api/secret/databases#configure-connection), this plugin has a number of parameters to further configure a connection. | Method | Path | @@ -71,7 +71,7 @@ $ curl \ Statements are configured during role creation and are used by the plugin to determine what is sent to the database on user creation, renewing, and revocation. For more information on configuring roles see the [Role -API](/api/secret/databases/index.html#create-role) in the database secrets engine docs. +API](/api/secret/databases#create-role) in the database secrets engine docs. ### Parameters diff --git a/website/pages/api-docs/secret/databases/postgresql.mdx b/website/pages/api-docs/secret/databases/postgresql.mdx index cae50df10..fe47eaf42 100644 --- a/website/pages/api-docs/secret/databases/postgresql.mdx +++ b/website/pages/api-docs/secret/databases/postgresql.mdx @@ -16,7 +16,7 @@ configured roles for the PostgreSQL database. ## Configure Connection In addition to the parameters defined by the [Database -Backend](/api/secret/databases/index.html#configure-connection), this plugin +Backend](/api/secret/databases#configure-connection), this plugin has a number of parameters to further configure a connection. | Method | Path | @@ -74,7 +74,7 @@ $ curl \ Statements are configured during role creation and are used by the plugin to determine what is sent to the database on user creation, renewing, and revocation. For more information on configuring roles see the [Role -API](/api/secret/databases/index.html#create-role) in the database secrets engine docs. +API](/api/secret/databases#create-role) in the database secrets engine docs. ### Parameters diff --git a/website/pages/api-docs/secret/gcp/index.mdx b/website/pages/api-docs/secret/gcp/index.mdx index f3c0c2bc8..03847d121 100644 --- a/website/pages/api-docs/secret/gcp/index.mdx +++ b/website/pages/api-docs/secret/gcp/index.mdx @@ -9,7 +9,7 @@ description: This is the API documentation for the Vault Google Cloud secrets en This is the API documentation for the Vault Google Cloud Platform (GCP) secrets engine. For general information about the usage and operation of -the GCP secrets engine, please see [these docs](/docs/secrets/gcp/index.html). +the GCP secrets engine, please see [these docs](/docs/secrets/gcp). This documentation assumes the GCP secrets engine is enabled at the `/gcp` path in Vault. Since it is possible to mount secrets engines at any path, please @@ -26,9 +26,9 @@ This endpoint configures shared information for the secrets engine. ### Parameters - `credentials` (`string:""`) - JSON credentials (either file contents or '@path/to/file') - See docs for [alternative ways](/docs/secrets/gcp/index.html#passing-credentials-to-vault) + See docs for [alternative ways](/docs/secrets/gcp#passing-credentials-to-vault) to pass in to this parameter, as well as the - [required permissions](/docs/secrets/gcp/index.html#required-permissions). + [required permissions](/docs/secrets/gcp#required-permissions). - `ttl` (`int: 0 || string:"0s"`) – Specifies default config TTL for long-lived credentials (i.e. service account keys). Accepts integer number of seconds or Go duration format string. @@ -90,7 +90,7 @@ $ curl \ | :----- | :------------------- | | `POST` | `/gcp/roleset/:name` | -This method allows you to create a roleset or update an existing roleset. See [roleset docs](/docs/secrets/gcp/index.html#rolesets) for the GCP secrets backend +This method allows you to create a roleset or update an existing roleset. See [roleset docs](/docs/secrets/gcp#rolesets) for the GCP secrets backend to learn more about what happens when you create or update a roleset. **If you update a roleset's bindings, this will effectively revoke any secrets @@ -120,7 +120,7 @@ generated under this roleset.** #### Sample Bindings: -See [bindings format docs](/docs/secrets/gcp/index.html#roleset-bindings) for more information. +See [bindings format docs](/docs/secrets/gcp#roleset-bindings) for more information. ```hcl resource "//cloudresourcemanager.googleapis.com/projects/mygcpproject" { @@ -380,5 +380,5 @@ $ curl \ ## Revoking/Renewing Secrets -See docs on how to [renew](/api/system/leases.html#renew-lease) and [revoke](/api/system/leases.html#revoke-lease) leases. +See docs on how to [renew](/api/system/leases#renew-lease) and [revoke](/api/system/leases#revoke-lease) leases. Note this only applies to service account keys. diff --git a/website/pages/api-docs/secret/gcpkms/index.mdx b/website/pages/api-docs/secret/gcpkms/index.mdx index da5eab6d1..73cd85b9a 100644 --- a/website/pages/api-docs/secret/gcpkms/index.mdx +++ b/website/pages/api-docs/secret/gcpkms/index.mdx @@ -10,7 +10,7 @@ description: This is the API documentation for the Vault Google Cloud KMS secret This is the API documentation for the Vault Google Cloud KMS secrets engine. For general information about the usage and operation of the Google Cloud KMS secrets engine, please see the -[Google Cloud KMS documentation](/docs/secrets/gcpkms/index.html). +[Google Cloud KMS documentation](/docs/secrets/gcpkms). This documentation assumes the Google Cloud KMS secrets engine is enabled at the `/gcpkms` path in Vault. Since it is possible to enable secrets engines at any diff --git a/website/pages/api-docs/secret/identity/index.mdx b/website/pages/api-docs/secret/identity/index.mdx index bd4598663..1725dce8f 100644 --- a/website/pages/api-docs/secret/identity/index.mdx +++ b/website/pages/api-docs/secret/identity/index.mdx @@ -9,13 +9,13 @@ description: This is the API documentation for the Vault Identity secrets engine This is the API documentation for the Vault Identity secrets engine. For general information about the usage and operation of the Identity secrets engine, please -see the [Vault Identity documentation](/docs/secrets/identity/index.html). +see the [Vault Identity documentation](/docs/secrets/identity). ## API Sections -- [Entity](entity.html) -- [Entity Alias](entity-alias.html) -- [Group](group.html) -- [Group Alias](group-alias.html) -- [Identity Tokens](tokens.html) -- [Lookup](lookup.html) +- [Entity](entity) +- [Entity Alias](entity-alias) +- [Group](group) +- [Group Alias](group-alias) +- [Identity Tokens](tokens) +- [Lookup](lookup) diff --git a/website/pages/api-docs/secret/kmip/index.mdx b/website/pages/api-docs/secret/kmip/index.mdx index cb5420210..b4778c6d0 100644 --- a/website/pages/api-docs/secret/kmip/index.mdx +++ b/website/pages/api-docs/secret/kmip/index.mdx @@ -9,7 +9,7 @@ description: This is the API documentation for the Vault KMIP secrets engine. This is the API documentation for the Vault KMIP secrets engine. For general information about the usage and operation of -the KMIP secrets engine, please see [these docs](/docs/secrets/kmip/index.html). +the KMIP secrets engine, please see [these docs](/docs/secrets/kmip). This documentation assumes the KMIP secrets engine is enabled at the `/kmip` path in Vault. Since it is possible to mount secrets engines at any path, please diff --git a/website/pages/api-docs/secret/kv/index.mdx b/website/pages/api-docs/secret/kv/index.mdx index 0086949a0..812280f90 100644 --- a/website/pages/api-docs/secret/kv/index.mdx +++ b/website/pages/api-docs/secret/kv/index.mdx @@ -9,8 +9,8 @@ description: This is the API documentation for the Vault KV secrets engine. This backend can be run in one of two versions. Each of which have a distinct API. Choose the version below you are running. For more information on the KV secrets -engine see the [Vault kv documentation](/docs/secrets/kv/index.html). +engine see the [Vault kv documentation](/docs/secrets/kv). -- [KV Version 1 API](/api/secret/kv/kv-v1.html) +- [KV Version 1 API](/api/secret/kv/kv-v1) -- [KV Version 2 API](/api/secret/kv/kv-v2.html) +- [KV Version 2 API](/api/secret/kv/kv-v2) diff --git a/website/pages/api-docs/secret/kv/kv-v1.mdx b/website/pages/api-docs/secret/kv/kv-v1.mdx index 45ff4b5ea..0f716e958 100644 --- a/website/pages/api-docs/secret/kv/kv-v1.mdx +++ b/website/pages/api-docs/secret/kv/kv-v1.mdx @@ -9,7 +9,7 @@ description: This is the API documentation for the Vault KV secrets engine. This is the API documentation for the Vault KV secrets engine. For general information about the usage and operation of the kv secrets engine, please -see the [Vault kv documentation](/docs/secrets/kv/index.html). +see the [Vault kv documentation](/docs/secrets/kv). This documentation assumes the kv secrets engine is enabled at the `/secret` path in Vault. Since it is possible to enable secrets engines at any @@ -54,7 +54,7 @@ $ curl \ _Note_: the `lease_duration` field, which will be populated if a "ttl" field was included in the data, is advisory. No lease is created. This is a way for writers to indicate how often a given value should be re-read by the client. -See the [Vault KV secrets engine documentation](/docs/secrets/kv/index.html) +See the [Vault KV secrets engine documentation](/docs/secrets/kv) for more details. ## List Secrets @@ -122,7 +122,7 @@ policy granting the `update` capability. be held at the given location. Multiple key/value pairs can be specified, and all will be returned on a read operation. A key called `ttl` will trigger some special behavior. See the [Vault KV secrets engine - documentation](/docs/secrets/kv/index.html) for details. + documentation](/docs/secrets/kv) for details. ### Sample Payload diff --git a/website/pages/api-docs/secret/kv/kv-v2.mdx b/website/pages/api-docs/secret/kv/kv-v2.mdx index 506fa2276..30d1e59cb 100644 --- a/website/pages/api-docs/secret/kv/kv-v2.mdx +++ b/website/pages/api-docs/secret/kv/kv-v2.mdx @@ -10,7 +10,7 @@ description: This is the API documentation for the Vault KV secrets engine. This is the API documentation for the Vault KV secrets engine while running in versioned mode. For general information about the usage and operation of the kv secrets engine, please see the [Vault kv -documentation](/docs/secrets/kv/index.html). +documentation](/docs/secrets/kv). This documentation assumes the kv secrets engine is enabled at the `/secret` path in Vault and that versioning has been enabled. Since it is diff --git a/website/pages/api-docs/secret/mongodb/index.mdx b/website/pages/api-docs/secret/mongodb/index.mdx index b3d40b270..45fcee8a6 100644 --- a/website/pages/api-docs/secret/mongodb/index.mdx +++ b/website/pages/api-docs/secret/mongodb/index.mdx @@ -10,12 +10,12 @@ description: This is the API documentation for the Vault MongoDB secrets engine. ~> **Deprecation Note:** This secrets engine is deprecated in favor of the combined databases secrets engine added in v0.7.1. See the API documentation for the new implementation of this secrets engine at -[MongoDB database plugin HTTP API](/api/secret/databases/mongodb.html). +[MongoDB database plugin HTTP API](/api/secret/databases/mongodb). This is the API documentation for the Vault MongoDB secrets engine. For general information about the usage and operation of the MongoDB secrets engine, please see the -[Vault MongoDB secrets engine documentation](/docs/secrets/mongodb/index.html). +[Vault MongoDB secrets engine documentation](/docs/secrets/mongodb). This documentation assumes the MongoDB secrets engine is enabled at the `/mongodb` path in Vault. Since it is possible to enable secrets engines at any diff --git a/website/pages/api-docs/secret/mssql/index.mdx b/website/pages/api-docs/secret/mssql/index.mdx index 2ff4871f4..f596988cc 100644 --- a/website/pages/api-docs/secret/mssql/index.mdx +++ b/website/pages/api-docs/secret/mssql/index.mdx @@ -10,11 +10,11 @@ description: This is the API documentation for the Vault MSSQL secrets engine. ~> **Deprecation Note:** This secrets engine is deprecated in favor of the combined databases secrets engine added in v0.7.1. See the API documentation for the new implementation of this secrets engine at -[MSSQL database plugin HTTP API](/api/secret/databases/mssql.html). +[MSSQL database plugin HTTP API](/api/secret/databases/mssql). This is the API documentation for the Vault MSSQL secrets engine. For general information about the usage and operation of the MSSQL secrets engine, please -see the [Vault MSSQL documentation](/docs/secrets/mssql/index.html). +see the [Vault MSSQL documentation](/docs/secrets/mssql). This documentation assumes the MSSQL secrets engine is enabled at the `/mssql` path in Vault. Since it is possible to enable secrets engines at any location, diff --git a/website/pages/api-docs/secret/mysql/index.mdx b/website/pages/api-docs/secret/mysql/index.mdx index db19cd265..b85c8959a 100644 --- a/website/pages/api-docs/secret/mysql/index.mdx +++ b/website/pages/api-docs/secret/mysql/index.mdx @@ -10,11 +10,11 @@ description: This is the API documentation for the Vault MySQL secrets engine. ~> **Deprecation Note:** This secrets engine is deprecated in favor of the combined databases secrets engine added in v0.7.1. See the API documentation for the new implementation of this secrets engine at -[MySQL/MariaDB database plugin HTTP API](/api/secret/databases/mysql-maria.html). +[MySQL/MariaDB database plugin HTTP API](/api/secret/databases/mysql-maria). This is the API documentation for the Vault MySQL secrets engine. For general information about the usage and operation of the MySQL secrets engine, please -see the [Vault MySQL documentation](/docs/secrets/mysql/index.html). +see the [Vault MySQL documentation](/docs/secrets/mysql). This documentation assumes the MySQL secrets engine is enabled at the `/mysql` path in Vault. Since it is possible to enable secrets engines at any location, diff --git a/website/pages/api-docs/secret/nomad/index.mdx b/website/pages/api-docs/secret/nomad/index.mdx index 9a8130acd..574fefb42 100644 --- a/website/pages/api-docs/secret/nomad/index.mdx +++ b/website/pages/api-docs/secret/nomad/index.mdx @@ -9,7 +9,7 @@ description: This is the API documentation for the Vault Nomad secret backend. This is the API documentation for the Vault Nomad secret backend. For general information about the usage and operation of the Nomad backend, please see the -[Vault Nomad backend documentation](/docs/secrets/nomad/index.html). +[Vault Nomad backend documentation](/docs/secrets/nomad). This documentation assumes the Nomad backend is mounted at the `/nomad` path in Vault. Since it is possible to mount secret backends at any location, please @@ -182,7 +182,7 @@ updated attributes. - `policies` `(string: "")` – Comma separated list of Nomad policies the token is going to be created against. These need to be created beforehand in Nomad. -- `global` `(bool: "false")` – Specifies if the token should be global, as defined in the [Nomad Documentation](https://www.nomadproject.io/guides/acl.html#acl-tokens). +- `global` `(bool: "false")` – Specifies if the token should be global, as defined in the [Nomad Documentation](https://www.nomadproject.io/guides/acl#acl-tokens). - `type` `(string: "client")` - Specifies the type of token to create when using this role. Valid values are `"client"` or `"management"`. diff --git a/website/pages/api-docs/secret/pki/index.mdx b/website/pages/api-docs/secret/pki/index.mdx index 545ee3d19..826d68523 100644 --- a/website/pages/api-docs/secret/pki/index.mdx +++ b/website/pages/api-docs/secret/pki/index.mdx @@ -9,7 +9,7 @@ description: This is the API documentation for the Vault PKI secrets engine. This is the API documentation for the Vault PKI secrets engine. For general information about the usage and operation of the PKI secrets engine, please see -the [PKI documentation](/docs/secrets/pki/index.html). +the [PKI documentation](/docs/secrets/pki). This documentation assumes the PKI secrets engine is enabled at the `/pki` path in Vault. Since it is possible to enable secrets engines at any location, please @@ -545,7 +545,7 @@ $ curl \ This endpoint allows submitting the signed CA certificate corresponding to a private key generated via `/pki/intermediate/generate`. The certificate should be submitted in PEM format; see the documentation for -[/pki/config/ca](/api/secret/pki/index.html#submit-ca-information) for some +[/pki/config/ca](/api/secret/pki#submit-ca-information) for some hints on submitting. | Method | Path | diff --git a/website/pages/api-docs/secret/postgresql/index.mdx b/website/pages/api-docs/secret/postgresql/index.mdx index 75d30c484..9f7ef9fe9 100644 --- a/website/pages/api-docs/secret/postgresql/index.mdx +++ b/website/pages/api-docs/secret/postgresql/index.mdx @@ -10,12 +10,12 @@ description: This is the API documentation for the Vault PostgreSQL secrets engi ~> **Deprecation Note:** This secrets engine is deprecated in favor of the combined databases secrets engine added in v0.7.1. See the API documentation for the new implementation of this secrets engine at -[PostgreSQL database plugin HTTP API](/api/secret/databases/postgresql.html). +[PostgreSQL database plugin HTTP API](/api/secret/databases/postgresql). This is the API documentation for the Vault PostgreSQL secrets engine. For general information about the usage and operation of the PostgreSQL secrets engine, please see the [PostgreSQL -documentation](/docs/secrets/postgresql/index.html). +documentation](/docs/secrets/postgresql). This documentation assumes the PostgreSQL secrets engine is enabled at the `/postgresql` path in Vault. Since it is possible to enable secrets engines at diff --git a/website/pages/api-docs/secret/rabbitmq/index.mdx b/website/pages/api-docs/secret/rabbitmq/index.mdx index 9111db22c..6c441c66f 100644 --- a/website/pages/api-docs/secret/rabbitmq/index.mdx +++ b/website/pages/api-docs/secret/rabbitmq/index.mdx @@ -9,7 +9,7 @@ description: This is the API documentation for the Vault RabbitMQ secrets engine This is the API documentation for the Vault RabbitMQ secrets engine. For general information about the usage and operation of the RabbitMQ secrets engine, please -see the [RabbitMQ documentation](/docs/secrets/rabbitmq/index.html). +see the [RabbitMQ documentation](/docs/secrets/rabbitmq). This documentation assumes the RabbitMQ secrets engine is enabled at the `/rabbitmq` path in Vault. Since it is possible to enable secrets engines at any diff --git a/website/pages/api-docs/secret/ssh/index.mdx b/website/pages/api-docs/secret/ssh/index.mdx index 0674161b1..3cac2069c 100644 --- a/website/pages/api-docs/secret/ssh/index.mdx +++ b/website/pages/api-docs/secret/ssh/index.mdx @@ -9,7 +9,7 @@ description: This is the API documentation for the Vault SSH secrets engine. This is the API documentation for the Vault SSH secrets engine. For general information about the usage and operation of the SSH secrets engine, please see -the [SSH documentation](/docs/secrets/ssh/index.html). +the [SSH documentation](/docs/secrets/ssh). This documentation assumes the SSH secrets engine is enabled at the `/ssh` path in Vault. Since it is possible to enable secrets engines at any location, please diff --git a/website/pages/api-docs/secret/totp/index.mdx b/website/pages/api-docs/secret/totp/index.mdx index caf1759c2..1e441200f 100644 --- a/website/pages/api-docs/secret/totp/index.mdx +++ b/website/pages/api-docs/secret/totp/index.mdx @@ -9,7 +9,7 @@ description: This is the API documentation for the Vault TOTP secrets engine. This is the API documentation for the Vault TOTP secrets engine. For general information about the usage and operation of the TOTP secrets engine, please see -the [TOTP documentation](/docs/secrets/totp/index.html). +the [TOTP documentation](/docs/secrets/totp). This documentation assumes the TOTP secrets engine is enabled at the `/totp` path in Vault. Since it is possible to enable secrets engines at any location, diff --git a/website/pages/api-docs/secret/transit/index.mdx b/website/pages/api-docs/secret/transit/index.mdx index c8fe2cb86..311b7b26f 100644 --- a/website/pages/api-docs/secret/transit/index.mdx +++ b/website/pages/api-docs/secret/transit/index.mdx @@ -9,7 +9,7 @@ description: This is the API documentation for the Vault Transit secrets engine. This is the API documentation for the Vault Transit secrets engine. For general information about the usage and operation of the Transit secrets engine, please -see the [transit documentation](/docs/secrets/transit/index.html). +see the [transit documentation](/docs/secrets/transit). This documentation assumes the transit secrets engine is enabled at the `/transit` path in Vault. Since it is possible to enable secrets engines at any @@ -401,10 +401,7 @@ Use the base64-encoded plaintext in the payload: } ``` -!> Vault HTTP API imposes a maximum request size of 32MB to prevent a denial -of service attack. This can be tuned per [`listener` -block](/docs/configuration/listener/tcp.html) in the Vault server -configuration. +!> Vault HTTP API imposes a maximum request size of 32MB to prevent a denial of service attack. This can be tuned per [`listener` block](/docs/configuration/listener/tcp) in the Vault server configuration. ### Sample Request @@ -1328,4 +1325,4 @@ $ curl \ }, ``` -[sys-plugin-reload-backend]: /api/system/plugins-reload-backend.html#reload-plugins +[sys-plugin-reload-backend]: /api/system/plugins-reload-backend#reload-plugins diff --git a/website/pages/api-docs/system/internal-specs-openapi.mdx b/website/pages/api-docs/system/internal-specs-openapi.mdx index 3ef09515e..102bc2ee0 100644 --- a/website/pages/api-docs/system/internal-specs-openapi.mdx +++ b/website/pages/api-docs/system/internal-specs-openapi.mdx @@ -16,7 +16,7 @@ The set of included paths is based on the permissions of the request token. The response may include Vault-specific [extensions](https://github.com/oai/openapi-specification/blob/master/versions/3.0.2.md#specification-extensions). Three are currently defined: -- `x-vault-sudo` - Endpoint requires [sudo](https://www.vaultproject.io/docs/concepts/policies.html#sudo) privileges. +- `x-vault-sudo` - Endpoint requires [sudo](/docs/concepts/policies#sudo) privileges. - `x-vault-unauthenticated` - Endpoint is unauthenticated. - `x-vault-create-supported` - Endpoint allows creation of new items, in addition to updating existing items. diff --git a/website/pages/api-docs/system/mfa/index.mdx b/website/pages/api-docs/system/mfa/index.mdx index 25b11ceed..de0998604 100644 --- a/website/pages/api-docs/system/mfa/index.mdx +++ b/website/pages/api-docs/system/mfa/index.mdx @@ -13,10 +13,10 @@ description: >- ## Supported MFA types. -- [TOTP](/api/system/mfa/totp.html) +- [TOTP](/api/system/mfa/totp) -- [Okta](/api/system/mfa/okta.html) +- [Okta](/api/system/mfa/okta) -- [Duo](/api/system/mfa/duo.html) +- [Duo](/api/system/mfa/duo) -- [PingID](/api/system/mfa/pingid.html) +- [PingID](/api/system/mfa/pingid) diff --git a/website/pages/api-docs/system/raw.mdx b/website/pages/api-docs/system/raw.mdx index 3ffa8f64a..738fbc33c 100644 --- a/website/pages/api-docs/system/raw.mdx +++ b/website/pages/api-docs/system/raw.mdx @@ -10,7 +10,7 @@ description: The `/sys/raw` endpoint is used to access the raw underlying store The `/sys/raw` endpoint is used to access the raw underlying store in Vault. This endpoint is off by default. See the -[Vault configuration documentation](/docs/configuration/index.html) to +[Vault configuration documentation](/docs/configuration) to enable. ## Read Raw diff --git a/website/pages/api-docs/system/storage/index.mdx b/website/pages/api-docs/system/storage/index.mdx index 78daec5f1..3eba0efab 100644 --- a/website/pages/api-docs/system/storage/index.mdx +++ b/website/pages/api-docs/system/storage/index.mdx @@ -7,4 +7,4 @@ description: |- The '/sys/storage' endpoints are used to manage Vault's storage backends. --- -This API sub-section is currently only used to manage [Raft](raft.html) storage backend. +This API sub-section is currently only used to manage [Raft](raft) storage backend. diff --git a/website/pages/docs/agent/autoauth/index.mdx b/website/pages/docs/agent/autoauth/index.mdx index b05a383d2..5c0ada843 100644 --- a/website/pages/docs/agent/autoauth/index.mdx +++ b/website/pages/docs/agent/autoauth/index.mdx @@ -33,7 +33,7 @@ configured Sinks, subject to their configuration. Sinks support some advanced features, including the ability for the written values to be encrypted or -[response-wrapped](/docs/concepts/response-wrapping.html). +[response-wrapped](/docs/concepts/response-wrapping). Both mechanisms can be used concurrently; in this case, the value will be response-wrapped, then encrypted. diff --git a/website/pages/docs/agent/autoauth/methods/alicloud.mdx b/website/pages/docs/agent/autoauth/methods/alicloud.mdx index 1bf4c6182..4717eb742 100644 --- a/website/pages/docs/agent/autoauth/methods/alicloud.mdx +++ b/website/pages/docs/agent/autoauth/methods/alicloud.mdx @@ -8,7 +8,7 @@ description: AliCloud Method for Vault Agent Auto-Auth # Vault Agent Auto-Auth AliCloud Method The `alicloud` method performs authentication against the [AliCloud Auth -method](https://www.vaultproject.io/docs/auth/alicloud.html). +method](/docs/auth/alicloud). ## Credentials diff --git a/website/pages/docs/agent/autoauth/methods/approle.mdx b/website/pages/docs/agent/autoauth/methods/approle.mdx index 0df06b73e..85f7fe53a 100644 --- a/website/pages/docs/agent/autoauth/methods/approle.mdx +++ b/website/pages/docs/agent/autoauth/methods/approle.mdx @@ -9,7 +9,7 @@ description: AppRole Method for Vault Agent Auto-Auth The `approle` method reads in a role ID and a secret ID from files and sends the values to the [AppRole Auth -method](https://www.vaultproject.io/docs/auth/approle.html). +method](/docs/auth/approle). The method caches values and it is safe to delete the role ID/secret ID files after they have been read. In fact, by default, after reading the secret ID, @@ -32,7 +32,7 @@ cached. - `secret_id_response_wrapping_path` `(string: optional)` - If set, the value at `secret_id_file_path` will be expected to be a [Response-Wrapping - Token](https://www.vaultproject.io/docs/concepts/response-wrapping.html) + Token](/docs/concepts/response-wrapping) containing the output of the secret ID retrieval endpoint for the role (e.g. `auth/approle/role/webservers/secret-id`) and the creation path for the response-wrapping token must match the value set here. diff --git a/website/pages/docs/agent/autoauth/methods/aws.mdx b/website/pages/docs/agent/autoauth/methods/aws.mdx index daf7b9bc2..40d0fcd7a 100644 --- a/website/pages/docs/agent/autoauth/methods/aws.mdx +++ b/website/pages/docs/agent/autoauth/methods/aws.mdx @@ -8,7 +8,7 @@ description: AWS Method for Vault Agent Auto-Auth # Vault Agent Auto-Auth AWS Method The `aws` method performs authentication against the [AWS Auth -method](https://www.vaultproject.io/docs/auth/aws.html). Both `ec2` and `iam` +method](/docs/auth/aws). Both `ec2` and `iam` authentication types are supported. If `ec2` is used, the agent will store the reauthentication value in memory and use it for reauthenticating, but will not persist it to disk. @@ -49,13 +49,13 @@ parameters unset in your configuration. - `region` `(string: "us-east-1")` - The region to use for signing the authentication request. The region Agent uses should match that corresponding to - [`sts_endpoint`](https://www.vaultproject.io/api/auth/aws/index.html#sts_endpoint), + [`sts_endpoint`](/api/auth/aws#sts_endpoint), if a custom endpoint has been configured on the Vault server. - `session_token` `(string: optional)` - The session token to use for authentication, if needed. - `header_value` `(string: optional)` - If configured in Vault, the value to use for - [`iam_server_id_header_value`](https://www.vaultproject.io/api/auth/aws/index.html#iam_server_id_header_value). + [`iam_server_id_header_value`](/api/auth/aws#iam_server_id_header_value). ## Learn diff --git a/website/pages/docs/agent/autoauth/methods/azure.mdx b/website/pages/docs/agent/autoauth/methods/azure.mdx index de5d520f8..79bd1918e 100644 --- a/website/pages/docs/agent/autoauth/methods/azure.mdx +++ b/website/pages/docs/agent/autoauth/methods/azure.mdx @@ -9,7 +9,7 @@ description: Azure Method for Vault Agent Auto-Auth The `azure` method reads in Azure instance credentials and uses them to authenticate with the [Azure Auth -method](https://www.vaultproject.io/docs/auth/azure.html). It reads most +method](/docs/auth/azure). It reads most parameters needed for authentication directly from instance information based on the value of the `resource` parameter. diff --git a/website/pages/docs/agent/autoauth/methods/cert.mdx b/website/pages/docs/agent/autoauth/methods/cert.mdx index 68fcc2a99..69f3d58c7 100644 --- a/website/pages/docs/agent/autoauth/methods/cert.mdx +++ b/website/pages/docs/agent/autoauth/methods/cert.mdx @@ -11,10 +11,10 @@ The `cert` method uses the configured TLS certificates from the `vault` stanza o the agent configuration and takes an optional `name` parameter. There is no option to use certificates which differ from those used in the `vault` stanza. -See TLS settings in the [`vault` Stanza](https://vaultproject.io/docs/agent/index.html#vault-stanza) +See TLS settings in the [`vault` Stanza](/docs/agent#vault-stanza) ## Configuration - `name` `(string: optional)` - The trusted certificate role which should be used when authenticating with TLS. If a `name` is not specified, the auth method will - try to authenticate against [all trusted certificates](https://www.vaultproject.io/docs/auth/cert.html#authentication). + try to authenticate against [all trusted certificates](/docs/auth/cert#authentication). diff --git a/website/pages/docs/agent/autoauth/methods/cf.mdx b/website/pages/docs/agent/autoauth/methods/cf.mdx index 5b1b725f7..65b31fe9e 100644 --- a/website/pages/docs/agent/autoauth/methods/cf.mdx +++ b/website/pages/docs/agent/autoauth/methods/cf.mdx @@ -8,7 +8,7 @@ description: CF Method for Vault Agent Auto-Auth # Vault Agent Auto-Auth CF Method The `cf` method performs authentication against the [CF Auth -method](https://www.vaultproject.io/docs/auth/cf.html). +method](/docs/auth/cf). ## Credentials diff --git a/website/pages/docs/agent/autoauth/methods/gcp.mdx b/website/pages/docs/agent/autoauth/methods/gcp.mdx index 2c026a6b3..cf4805072 100644 --- a/website/pages/docs/agent/autoauth/methods/gcp.mdx +++ b/website/pages/docs/agent/autoauth/methods/gcp.mdx @@ -8,7 +8,7 @@ description: GCP Method for Vault Agent Auto-Auth # Vault Agent Auto-Auth GCP Method The `gcp` method performs authentication against the [GCP Auth -method](https://www.vaultproject.io/docs/auth/gcp.html). Both `gce` and `iam` +method](/docs/auth/gcp). Both `gce` and `iam` authentication types are supported. ## Credentials diff --git a/website/pages/docs/agent/autoauth/methods/jwt.mdx b/website/pages/docs/agent/autoauth/methods/jwt.mdx index 0edcd5aa3..5ee5fe86a 100644 --- a/website/pages/docs/agent/autoauth/methods/jwt.mdx +++ b/website/pages/docs/agent/autoauth/methods/jwt.mdx @@ -8,7 +8,7 @@ description: JWT Method for Vault Agent Auto-Auth # Vault Agent Auto-Auth JWT Method The `jwt` method reads in a JWT from a file and sends it to the [JWT Auth -method](https://www.vaultproject.io/docs/auth/jwt.html). Since JWTs often have +method](/docs/auth/jwt). Since JWTs often have limited lifetime, it constantly watches for a new JWT to be written, and when found it will immediately ingress this value, delete the file, and use the new JWT to perform a reauthentication. diff --git a/website/pages/docs/agent/autoauth/methods/kubernetes.mdx b/website/pages/docs/agent/autoauth/methods/kubernetes.mdx index e820a6338..9e70939af 100644 --- a/website/pages/docs/agent/autoauth/methods/kubernetes.mdx +++ b/website/pages/docs/agent/autoauth/methods/kubernetes.mdx @@ -10,7 +10,7 @@ description: Kubernetes Method for Vault Agent Auto-Auth The `kubernetes` method reads in a Kubernetes service account token from the running pod (via `/var/run/secrets/kubernetes.io/serviceaccount/token`) and sends it to the [Kubernetes Auth -method](https://www.vaultproject.io/docs/auth/kubernetes.html). +method](/docs/auth/kubernetes). ## Configuration diff --git a/website/pages/docs/agent/caching/index.mdx b/website/pages/docs/agent/caching/index.mdx index f42af3ddc..a60eb4b9e 100644 --- a/website/pages/docs/agent/caching/index.mdx +++ b/website/pages/docs/agent/caching/index.mdx @@ -40,7 +40,7 @@ specific scenarios. ## Using Auto-Auth Token Vault Agent allows for easy authentication to Vault in a wide variety of -environments using [Auto-Auth](/docs/agent/autoauth/index.html). By setting the +environments using [Auto-Auth](/docs/agent/autoauth). By setting the `use_auto_auth_token` (see below) configuration, clients will not be required to provide a Vault token to the requests made to the agent. When this configuration is set, if the request doesn't already bear a token, then the diff --git a/website/pages/docs/agent/index.mdx b/website/pages/docs/agent/index.mdx index 065e462e2..bdd141ed7 100644 --- a/website/pages/docs/agent/index.mdx +++ b/website/pages/docs/agent/index.mdx @@ -172,9 +172,9 @@ template { } ``` -[vault]: /docs/agent/index.html#vault-stanza -[autoauth]: /docs/agent/autoauth/index.html -[caching]: /docs/agent/caching/index.html -[template]: /docs/agent/template/index.html -[listener]: /docs/agent/index.html#listener-stanza -[listener_main]: /docs/configuration/listener/tcp.html +[vault]: /docs/agent#vault-stanza +[autoauth]: /docs/agent/autoauth +[caching]: /docs/agent/caching +[template]: /docs/agent/template +[listener]: /docs/agent#listener-stanza +[listener_main]: /docs/configuration/listener/tcp diff --git a/website/pages/docs/audit/index.mdx b/website/pages/docs/audit/index.mdx index 4821bedb1..a33dbc561 100644 --- a/website/pages/docs/audit/index.mdx +++ b/website/pages/docs/audit/index.mdx @@ -80,4 +80,4 @@ block. ## API Audit devices also have a full HTTP API. Please see the [Audit device API -docs](/api/system/audit.html) for more details. +docs](/api/system/audit) for more details. diff --git a/website/pages/docs/auth/alicloud.mdx b/website/pages/docs/auth/alicloud.mdx index 7175f1ffa..275c3aacd 100644 --- a/website/pages/docs/auth/alicloud.mdx +++ b/website/pages/docs/auth/alicloud.mdx @@ -109,5 +109,5 @@ can be found found in the ## API The AliCloud auth method has a full HTTP API. Please see the -[AliCloud Auth API](/api/auth/alicloud/index.html) for more +[AliCloud Auth API](/api/auth/alicloud) for more details. diff --git a/website/pages/docs/auth/app-id.mdx b/website/pages/docs/auth/app-id.mdx index 344443b60..924329e55 100644 --- a/website/pages/docs/auth/app-id.mdx +++ b/website/pages/docs/auth/app-id.mdx @@ -8,7 +8,7 @@ description: The AppID auth method is a mechanism for machines to authenticate w # AppID Auth Method ~> **DEPRECATED!** As of Vault 0.6.1, AppID is deprecated in favor of -[AppRole](/docs/auth/approle.html). AppRole can accommodate the same workflow as +[AppRole](/docs/auth/approle). AppRole can accommodate the same workflow as AppID while enabling much more secure and flexible management and other types of authentication workflows. No new features or enhancements are planned for App ID, and new users should use AppRole instead of AppID. @@ -121,5 +121,5 @@ management tool. ## API The AppID auth method has a full HTTP API. Please see the -[AppID auth method API](/api/auth/app-id/index.html) for more +[AppID auth method API](/api/auth/app-id) for more details. diff --git a/website/pages/docs/auth/approle.mdx b/website/pages/docs/auth/approle.mdx index 73c3ba0b7..fc40bc698 100644 --- a/website/pages/docs/auth/approle.mdx +++ b/website/pages/docs/auth/approle.mdx @@ -207,8 +207,7 @@ full set of client credentials (RoleID and SecretID) in order to create the entry, even if these are then distributed via different paths. However, in Pull mode, even though the RoleID must be known in order to distribute it to the client, the SecretID can be kept confidential from all parties except for the -final authenticating client by using [Response -Wrapping](/docs/concepts/response-wrapping.html). +final authenticating client by using [Response Wrapping](/docs/concepts/response-wrapping). Push mode is available for App-ID workflow compatibility, which in some specific cases is preferable, but in most cases Pull mode is more secure and @@ -234,5 +233,5 @@ guide for a step-by-step tutorial. ## API The AppRole auth method has a full HTTP API. Please see the -[AppRole API](/api/auth/approle/index.html) for more +[AppRole API](/api/auth/approle) for more details. diff --git a/website/pages/docs/auth/aws.mdx b/website/pages/docs/auth/aws.mdx index 3f6290474..f3db9e937 100644 --- a/website/pages/docs/auth/aws.mdx +++ b/website/pages/docs/auth/aws.mdx @@ -429,7 +429,7 @@ not specify the policy component, the client will inherit the allowed policies s on the role. If the role tag creation specifies the policy component but it contains no policies, the token will contain only the `default` policy; by default, this policy allows only manipulation (revocation, renewal, lookup) of the existing token, plus -access to its [cubbyhole](/docs/secrets/cubbyhole/index.html). +access to its [cubbyhole](/docs/secrets/cubbyhole). This can be useful to allow instances access to a secure "scratch space" for storing data (via the token's cubbyhole) but without granting any access to other resources provided by or resident in Vault. @@ -728,5 +728,5 @@ The response will be in JSON. For example: ## API The AWS auth method has a full HTTP API. Please see the -[AWS Auth API](/api/auth/aws/index.html) for more +[AWS Auth API](/api/auth/aws) for more details. diff --git a/website/pages/docs/auth/azure.mdx b/website/pages/docs/auth/azure.mdx index ad055cb28..49386b0ea 100644 --- a/website/pages/docs/auth/azure.mdx +++ b/website/pages/docs/auth/azure.mdx @@ -21,7 +21,7 @@ Currently supports authentication for: ## Prerequisites: The following documentation assumes that the method has been -[mounted](/docs/plugin/index.html) at `auth/azure`. +[mounted](/docs/plugin) at `auth/azure`. - A configured [Azure AD application](https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-integrating-applications) which is used as the resource for generating MSI access tokens. - Client credentials (shared secret) for accessing the Azure Resource Manager with read access to compute endpoints. See [Azure AD Service to Service Client Credentials](https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-protocols-oauth-service-to-service) @@ -37,7 +37,7 @@ The next sections review how the authN/Z workflows work. If you have already reviewed these sections, here are some quick links to: - [Usage](#usage) -- [API documentation](/api/auth/azure/index.html) docs. +- [API documentation](/api/auth/azure) docs. ## Authentication @@ -134,7 +134,7 @@ tool. authentication type, as well as overall constraints and configuration for the generated auth tokens. - For the complete list of role options, please see the [API documentation](/api/auth/azure/index.html). + For the complete list of role options, please see the [API documentation](/api/auth/azure). ### Via the API @@ -175,7 +175,7 @@ method as an external plugin. The azure plugin method is integrated into Vault a a builtin method by default. Assuming you have saved the binary `vault-plugin-auth-azure` to some folder and -configured the [plugin directory](/docs/internals/plugins.html#plugin-directory) +configured the [plugin directory](/docs/internals/plugins#plugin-directory) for your server at `path/to/plugins`: 1. Enable the plugin in the catalog: @@ -194,4 +194,4 @@ for your server at `path/to/plugins`: ## API -The Azure Auth Plugin has a full HTTP API. Please see the [API documentation](/api/auth/azure/index.html) for more details. +The Azure Auth Plugin has a full HTTP API. Please see the [API documentation](/api/auth/azure) for more details. diff --git a/website/pages/docs/auth/cert.mdx b/website/pages/docs/auth/cert.mdx index 84e621d2f..8d340751d 100644 --- a/website/pages/docs/auth/cert.mdx +++ b/website/pages/docs/auth/cert.mdx @@ -127,4 +127,4 @@ management tool. ## API The TLS Certificate auth method has a full HTTP API. Please see the -[TLS Certificate API](/api/auth/cert/index.html) for more details. +[TLS Certificate API](/api/auth/cert) for more details. diff --git a/website/pages/docs/auth/cf.mdx b/website/pages/docs/auth/cf.mdx index 460ac9f7c..63e39f9e3 100644 --- a/website/pages/docs/auth/cf.mdx +++ b/website/pages/docs/auth/cf.mdx @@ -296,5 +296,5 @@ match the certificates you're checking. ## API -The CF auth method has a full HTTP API. Please see the [CF Auth API](/api/auth/cf/index.html) +The CF auth method has a full HTTP API. Please see the [CF Auth API](/api/auth/cf) for more details. diff --git a/website/pages/docs/auth/gcp.mdx b/website/pages/docs/auth/gcp.mdx index 9d8bf3a33..d60224559 100644 --- a/website/pages/docs/auth/gcp.mdx +++ b/website/pages/docs/auth/gcp.mdx @@ -342,7 +342,7 @@ The GCP Auth Plugin has a full HTTP API. Please see the [signjwt-method]: https://cloud.google.com/iam/reference/rest/v1/projects.serviceAccounts/signJwt [cloud-creds]: https://cloud.google.com/docs/authentication/production#providing_credentials_to_your_application [service-accounts]: https://cloud.google.com/compute/docs/access/service-accounts -[api-docs]: /api/auth/gcp/index.html -[identity-group-aliases]: /api/secret/identity/group-alias.html +[api-docs]: /api/auth/gcp +[identity-group-aliases]: /api/secret/identity/group-alias [instance-identity]: https://cloud.google.com/compute/docs/instances/verifying-instance-identity [repo]: https://github.com/hashicorp/vault-plugin-auth-gcp diff --git a/website/pages/docs/auth/github.mdx b/website/pages/docs/auth/github.mdx index ed582e5ff..6e276ca6f 100644 --- a/website/pages/docs/auth/github.mdx +++ b/website/pages/docs/auth/github.mdx @@ -109,5 +109,5 @@ management tool. ## API The GitHub auth method has a full HTTP API. Please see the -[GitHub Auth API](/api/auth/github/index.html) for more +[GitHub Auth API](/api/auth/github) for more details. diff --git a/website/pages/docs/auth/index.mdx b/website/pages/docs/auth/index.mdx index 519d3f544..f14f96fff 100644 --- a/website/pages/docs/auth/index.mdx +++ b/website/pages/docs/auth/index.mdx @@ -13,12 +13,12 @@ responsible for assigning identity and a set of policies to a user. Having multiple auth methods enables you to use an auth method that makes the most sense for your use case of Vault and your organization. -For example, on developer machines, the [GitHub auth method](/docs/auth/github.html) -is easiest to use. But for servers the [AppRole](/docs/auth/approle.html) +For example, on developer machines, the [GitHub auth method](/docs/auth/github) +is easiest to use. But for servers the [AppRole](/docs/auth/approle) method is the recommended choice. To learn more about authentication, see the -[authentication concepts page](/docs/concepts/auth.html). +[authentication concepts page](/docs/concepts/auth). ## Enabling/Disabling Auth Methods @@ -28,7 +28,7 @@ Auth methods can be enabled/disabled using the CLI or the API. $ vault auth enable userpass ``` -When enabled, auth methods are similar to [secrets engines](/docs/secrets/index.html): +When enabled, auth methods are similar to [secrets engines](/docs/secrets): they are mounted within the Vault mount table and can be accessed and configured using the standard read/write API. All auth methods are mounted underneath the `auth/` prefix. diff --git a/website/pages/docs/auth/jwt.mdx b/website/pages/docs/auth/jwt.mdx index 92151b556..b4f788437 100644 --- a/website/pages/docs/auth/jwt.mdx +++ b/website/pages/docs/auth/jwt.mdx @@ -114,7 +114,7 @@ JSON Pointer can be used as a selector. Refer to the ## OIDC Authentication This section covers the setup and use of OIDC roles. If a JWT is to be provided directly, -refer to the [JWT Authentication](/docs/auth/jwt.html#jwt-authentication) section below. Basic +refer to the [JWT Authentication](/docs/auth/jwt#jwt-authentication) section below. Basic familiarity with [OIDC concepts](https://developer.okta.com/blog/2017/07/25/oidc-primer-part-1) is assumed. @@ -143,7 +143,7 @@ Logging in via the Vault UI requires a redirect URI of the form: The "host:port" must be correct for the Vault server, and "path" must match the path the JWT backend is mounted at (e.g. "oidc" or "jwt"). -If [namespaces](https://www.vaultproject.io/docs/enterprise/namespaces/index.html) are being used, +If [namespaces](/docs/enterprise/namespaces) are being used, they must be added as query parameters, for example: `https://vault.example.com:8200/ui/vault/auth/oidc/oidc/callback?namespace=my_ns` @@ -180,7 +180,7 @@ The callback listener may be customized with the following optional parameters: The OIDC authentication flow has been successfully tested with a number of providers. A full guide to configuring OAuth/OIDC applications is beyond the scope of Vault documentation, but a collection of provider configuration steps has been collected to help get started: -[OIDC Provider Setup](/docs/auth/jwt_oidc_providers.html) +[OIDC Provider Setup](/docs/auth/jwt_oidc_providers) ### OIDC Configuration Troubleshooting @@ -204,7 +204,7 @@ why things aren't working. Some tips for setting up OIDC: `cat jwt.json | jq -r .access_token | cut -d. -f2 | base64 -D` -- As of Vault 1.2, the [`verbose_oidc_logging`](/api/auth/jwt/index.html#verbose_oidc_logging) role +- As of Vault 1.2, the [`verbose_oidc_logging`](/api/auth/jwt#verbose_oidc_logging) role option is available which will log the received OIDC token if debug-level logging is enabled. This can be helpful when debugging provider setup and verifying that the received claims are what you expect. Since claims data is logged verbatim and may contain sensitive information, this option should not be @@ -270,7 +270,7 @@ management tool. 1. Use the `/config` endpoint to configure Vault. To support JWT roles, either local keys or an OIDC Discovery URL must be present. For OIDC roles, OIDC Discovery URL, OIDC Client ID and OIDC Client Secret are required. For the - list of available configuration options, please see the [API documentation](/api/auth/jwt/index.html). + list of available configuration options, please see the [API documentation](/api/auth/jwt). ```text $ vault write auth/jwt/config \ @@ -302,4 +302,4 @@ management tool. ## API The JWT Auth Plugin has a full HTTP API. Please see the -[API docs](/api/auth/jwt/index.html) for more details. +[API docs](/api/auth/jwt) for more details. diff --git a/website/pages/docs/auth/jwt_oidc_providers.mdx b/website/pages/docs/auth/jwt_oidc_providers.mdx index cc7fd6a49..2210de933 100644 --- a/website/pages/docs/auth/jwt_oidc_providers.mdx +++ b/website/pages/docs/auth/jwt_oidc_providers.mdx @@ -8,7 +8,7 @@ description: OIDC provider configuration quick starts This page collects high-level setup steps on how to configure an OIDC application for various providers. For more general usage and operation -information, see the [Vault JWT/OIDC method documentation](https://www.vaultproject.io/docs/auth/jwt.html). +information, see the [Vault JWT/OIDC method documentation](/docs/auth/jwt). OIDC providers are often highly configurable and you should become familiar with their recommended settings and best practices. The instructions below are @@ -33,17 +33,17 @@ Reference: [Azure Active Directory v2.0 and the OpenID Connect protocol](https:/ it will not be accessible after you leave the page. Please note [Azure AD v2.0 endpoints](https://docs.microsoft.com/en-gb/azure/active-directory/develop/azure-ad-endpoint-comparison) -are required for [external groups](https://www.vaultproject.io/docs/secrets/identity/index.html#external-vs-internal-groups) to work. +are required for [external groups](/docs/secrets/identity#external-vs-internal-groups) to work. - `groupMembershipClaims` should be changed from `none` in the [App registration manifest](https://docs.microsoft.com/en-us/azure/active-directory/develop/reference-app-manifest). Options are "All" or "Security" -- In the [OIDC Role config](https://www.vaultproject.io/api/auth/jwt/index.html#create-role) +- In the [OIDC Role config](/api/auth/jwt#create-role) the scope `"https://graph.microsoft.com/.default"` should be added to add groups to the jwt token and `groups_claim` should be set to `groups`. -- Finally Azure AD group can be referenced by using the groups `objectId` as the [group alias name](https://www.vaultproject.io/api/secret/identity/group-alias.html) for the external group. +- Finally Azure AD group can be referenced by using the groups `objectId` as the [group alias name](/api/secret/identity/group-alias) for the external group. ### CLI setup instructions: diff --git a/website/pages/docs/auth/kerberos.mdx b/website/pages/docs/auth/kerberos.mdx index e4fcddfe2..f1908359d 100644 --- a/website/pages/docs/auth/kerberos.mdx +++ b/website/pages/docs/auth/kerberos.mdx @@ -26,8 +26,8 @@ it into HashiCorp's maintenance. ## Prerequisites Kerberos is a very hands-on auth method. Other auth methods like -[LDAP](https://www.vaultproject.io/docs/auth/ldap.html) and -[Azure](https://www.vaultproject.io/docs/auth/azure.html) only require +[LDAP](/docs/auth/ldap) and +[Azure](/docs/auth/azure) only require a cursory amount of knowledge for configuration and use. Kerberos, on the other hand, is best used by people already familiar with it. We recommend that you use simpler authentication methods if @@ -113,14 +113,14 @@ $ vault write auth/kerberos/config/ldap \ ``` The LDAP above relies upon the same code as the LDAP auth method. -See [its documentation](https://www.vaultproject.io/docs/auth/ldap.html) +See [its documentation](/docs/auth/ldap) for further discussion of available parameters. - Configure the Vault policies that should be granted to those who successfully authenticate based on their LDAP group membership. Since this is identical to the LDAP auth method, see - [Group Membership Resolution](https://www.vaultproject.io/docs/auth/ldap.html#group-membership-resolution) - and [LDAP Group -> Policy Mapping](https://www.vaultproject.io/docs/auth/ldap.html#ldap-group-gt-policy-mapping) + [Group Membership Resolution](/docs/auth/ldap#group-membership-resolution) + and [LDAP Group -> Policy Mapping](/docs/auth/ldap#ldap-group-gt-policy-mapping) for further discussion. ```text @@ -194,7 +194,7 @@ in the `keytab` file. After you've stripped the issue down to its simplest form, if you still encounter difficulty resolving it, it will be much easier to gain assistance by posting your reproduction to the [Vault Forum](https://discuss.hashicorp.com/c/vault) -or by providing it to [HashiCorp Support](https://www.hashicorp.com/support.html) +or by providing it to [HashiCorp Support](https://www.hashicorp.com/support) (if applicable.) ### Additional Troubleshooting Resources @@ -219,5 +219,5 @@ client. ## API The Kerberos auth method has a full HTTP API. Please see the -[Kerberos auth method API](/api/auth/kerberos/index.html) for more +[Kerberos auth method API](/api/auth/kerberos) for more details. diff --git a/website/pages/docs/auth/kubernetes.mdx b/website/pages/docs/auth/kubernetes.mdx index 283614fac..4b1962bcb 100644 --- a/website/pages/docs/auth/kubernetes.mdx +++ b/website/pages/docs/auth/kubernetes.mdx @@ -81,7 +81,7 @@ management tool. !> **NOTE:** The pattern Vault uses to authenticate Pods depends on sharing the JWT token over the network. Given the [security model of - Vault](/docs/internals/security.html), this is allowable because Vault is + Vault](/docs/internals/security), this is allowable because Vault is part of the trusted compute base. In general, Kubernetes applications should **not** share this JWT with other applications, as it allows API calls to be made on behalf of the Pod and can result in unintended access being granted @@ -136,6 +136,6 @@ subjects: ## API The Kubernetes Auth Plugin has a full HTTP API. Please see the -[API docs](/api/auth/kubernetes/index.html) for more details. +[API docs](/api/auth/kubernetes) for more details. [k8s-tokenreview]: https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.10/#tokenreview-v1-authentication-k8s-io diff --git a/website/pages/docs/auth/ldap.mdx b/website/pages/docs/auth/ldap.mdx index 3e36679fb..6b7b3c762 100644 --- a/website/pages/docs/auth/ldap.mdx +++ b/website/pages/docs/auth/ldap.mdx @@ -254,5 +254,5 @@ It should be noted that user -> policy mapping happens at token creation time. A ## API The LDAP auth method has a full HTTP API. Please see the -[LDAP auth method API](/api/auth/ldap/index.html) for more +[LDAP auth method API](/api/auth/ldap) for more details. diff --git a/website/pages/docs/auth/mfa.mdx b/website/pages/docs/auth/mfa.mdx index 21628f829..5e70cb59f 100644 --- a/website/pages/docs/auth/mfa.mdx +++ b/website/pages/docs/auth/mfa.mdx @@ -13,7 +13,7 @@ description: |- edition of Vault. This system is not supported by HashiCorp. Vault Enterprise contains a fully-supported MFA system that is significantly more complete and flexible and which can be used throughout Vault's API. See the [Vault -Enterprise MFA](/docs/enterprise/mfa/index.html) page for more information. +Enterprise MFA](/docs/enterprise/mfa) page for more information. Several auth methods support multi-factor authentication (MFA). Once enabled for a method, users are required to provide additional verification, diff --git a/website/pages/docs/auth/oci.mdx b/website/pages/docs/auth/oci.mdx index ae88d589f..d588b854b 100644 --- a/website/pages/docs/auth/oci.mdx +++ b/website/pages/docs/auth/oci.mdx @@ -97,22 +97,22 @@ Create the Vault admin role: 1. Log into the Vault using instance principal. - This assumes that the VAULT_ADDR export has been specified, as shown earlier in this page. - The compute instance that you are logging in from should be a part of a dynamic group that was added to the Vault admin role. The compute instance should also have connectivity to the endpoint specified in VAULT_ADDR. - - When testing in dev mode in the same compute instance that the Vault is running, this is [http://127.0.0.1:8200](http://127.0.0.1:8200/). + - When testing in dev mode in the same compute instance that the Vault is running, this is [http://127.0.0.1:8200](http://127.0.0.1:8200/). `vault login -method=oci auth_type=instance role=vaultadminrole` You will see a response that includes a token with the previously added policy. -1. Use the received token to read secrets, writer secrets, and add roles per the instructions in [https://www.vaultproject.io/docs/secrets/kv/kv-v1.html](https://www.Vaultproject.io/docs/secrets/kv/kv-v1.html). +1. Use the received token to read secrets, writer secrets, and add roles per the instructions in [/docs/secrets/kv/kv-v1](/docs/secrets/kv/kv-v1). 1. Log into Vault using the user API key. - [Add an API Key](https://docs.cloud.oracle.com/iaas/Content/API/Concepts/apisigningkey.htm) for a user in the console. This user should be part of a group that has previously been added to the Vault admin role. - - Create the config file `~/.oci/config` using the user's credentials as detailed in [https://docs.cloud.oracle.com/iaas/Content/API/Concepts/sdkconfig.htm](https://docs.cloud.oracle.com/iaas/Content/API/Concepts/sdkconfig.htm). + - Create the config file `~/.oci/config` using the user's credentials as detailed in [https://docs.cloud.oracle.com/iaas/Content/API/Concepts/sdkconfig.htm](https://docs.cloud.oracle.com/iaas/Content/API/Concepts/sdkconfig.htm). Ensure that the region in the config matches the region of the compute instance that is running Vault. - Log into Vault using the user API key. `vault login -method=oci auth_type=apikey role=vaultadminrole` -1. Stop Vault and re-start it in the production environment. See [https://www.vaultproject.io/docs/configuration](https://www.Vaultproject.io/docs/configuration/) for more information. +1. Stop Vault and re-start it in the production environment. See [the configuration docs](/docs/configuration/) for more information. 1. Repeat all steps in this [Configure the OCI Auth Method](#OnboardingtoOCIAuthMethod-ConfiguretheOCIAuthMethod) section while in the production environment. ### Manage Roles in the OCI Auth method @@ -200,4 +200,4 @@ POST http://127.0.0.1/v1/auth/oci/login/devrole ## API -The OCI Auth method has a full HTTP API. Please see the [API docs](/api/auth/oci/index.html) for more details. +The OCI Auth method has a full HTTP API. Please see the [API docs](/api/auth/oci) for more details. diff --git a/website/pages/docs/auth/okta.mdx b/website/pages/docs/auth/okta.mdx index 83284a0e9..b6bc3bc1f 100644 --- a/website/pages/docs/auth/okta.mdx +++ b/website/pages/docs/auth/okta.mdx @@ -113,4 +113,4 @@ management tool. ## API The Okta auth method has a full HTTP API. Please see the -[Okta Auth API](/api/auth/okta/index.html) for more details. +[Okta Auth API](/api/auth/okta) for more details. diff --git a/website/pages/docs/auth/radius.mdx b/website/pages/docs/auth/radius.mdx index 76c15d173..eecb68353 100644 --- a/website/pages/docs/auth/radius.mdx +++ b/website/pages/docs/auth/radius.mdx @@ -79,5 +79,5 @@ The response will contain a token at `auth.client_token`: ## API The RADIUS auth method has a full HTTP API. Please see the -[RADIUS Auth API](/api/auth/radius/index.html) for more +[RADIUS Auth API](/api/auth/radius) for more details. diff --git a/website/pages/docs/auth/token.mdx b/website/pages/docs/auth/token.mdx index 7e386bc28..43f588fad 100644 --- a/website/pages/docs/auth/token.mdx +++ b/website/pages/docs/auth/token.mdx @@ -18,7 +18,7 @@ The token store can also be used to bypass any other auth method: you can create tokens directly, as well as perform a variety of other operations on tokens such as renewal and revocation. -Please see the [token concepts](/docs/concepts/tokens.html) page dedicated +Please see the [token concepts](/docs/concepts/tokens) page dedicated to tokens. ## Authentication @@ -37,5 +37,5 @@ either `X-Vault-Token: ` or `Authorization: Bearer `. ## API The Token auth method has a full HTTP API. Please see the -[Token auth method API](/api/auth/token/index.html) for more +[Token auth method API](/api/auth/token) for more details. diff --git a/website/pages/docs/auth/userpass.mdx b/website/pages/docs/auth/userpass.mdx index 6caefe6f1..c1f6401da 100644 --- a/website/pages/docs/auth/userpass.mdx +++ b/website/pages/docs/auth/userpass.mdx @@ -85,4 +85,4 @@ management tool. ## API The Userpass auth method has a full HTTP API. Please see the [Userpass auth -method API](/api/auth/userpass/index.html) for more details. +method API](/api/auth/userpass) for more details. diff --git a/website/pages/docs/commands/agent.mdx b/website/pages/docs/commands/agent.mdx index db2c66171..7f444abd8 100644 --- a/website/pages/docs/commands/agent.mdx +++ b/website/pages/docs/commands/agent.mdx @@ -7,4 +7,4 @@ description: The "agent" command is used to start Vault Agent # agent -Please see the [Vault Agent documentation page](/docs/agent/index.html). +Please see the [Vault Agent documentation page](/docs/agent). diff --git a/website/pages/docs/commands/audit/disable.mdx b/website/pages/docs/commands/audit/disable.mdx index 0a19dc3f9..74d04d9a4 100644 --- a/website/pages/docs/commands/audit/disable.mdx +++ b/website/pages/docs/commands/audit/disable.mdx @@ -30,5 +30,5 @@ Success! Disabled audit device (if it was enabled) at: file/ ## Usage -There are no flags beyond the [standard set of flags](/docs/commands/index.html) +There are no flags beyond the [standard set of flags](/docs/commands) included on all commands. diff --git a/website/pages/docs/commands/audit/enable.mdx b/website/pages/docs/commands/audit/enable.mdx index 17d1fe75c..0c7aec7d1 100644 --- a/website/pages/docs/commands/audit/enable.mdx +++ b/website/pages/docs/commands/audit/enable.mdx @@ -27,7 +27,7 @@ Success! Enabled the file audit device at: file/ ## Usage The following flags are available in addition to the [standard set of -flags](/docs/commands/index.html) included on all commands. +flags](/docs/commands) included on all commands. - `-description` `(string: "")` - Human-friendly description for the purpose of this audit device. diff --git a/website/pages/docs/commands/audit/index.mdx b/website/pages/docs/commands/audit/index.mdx index 2d8d16ee3..ca6135bc0 100644 --- a/website/pages/docs/commands/audit/index.mdx +++ b/website/pages/docs/commands/audit/index.mdx @@ -13,7 +13,7 @@ The `audit` command groups subcommands for interacting with Vault's audit devices. Users can list, enable, and disable audit devices. For more information, please see the [audit device -documentation](/docs/audit/index.html) +documentation](/docs/audit) ## Examples diff --git a/website/pages/docs/commands/audit/list.mdx b/website/pages/docs/commands/audit/list.mdx index 73f00a212..8ee5ff5a2 100644 --- a/website/pages/docs/commands/audit/list.mdx +++ b/website/pages/docs/commands/audit/list.mdx @@ -35,7 +35,7 @@ file/ file n/a replicated file_path=/var/log/audit.log ## Usage The following flags are available in addition to the [standard set of -flags](/docs/commands/index.html) included on all commands. +flags](/docs/commands) included on all commands. ### Output Options diff --git a/website/pages/docs/commands/auth/disable.mdx b/website/pages/docs/commands/auth/disable.mdx index c3e733c55..b99b080a8 100644 --- a/website/pages/docs/commands/auth/disable.mdx +++ b/website/pages/docs/commands/auth/disable.mdx @@ -29,5 +29,5 @@ Success! Disabled the auth method (if it existed) at: userpass/ ## Usage -There are no flags beyond the [standard set of flags](/docs/commands/index.html) +There are no flags beyond the [standard set of flags](/docs/commands) included on all commands. diff --git a/website/pages/docs/commands/auth/enable.mdx b/website/pages/docs/commands/auth/enable.mdx index 97b87fa6a..241d1612d 100644 --- a/website/pages/docs/commands/auth/enable.mdx +++ b/website/pages/docs/commands/auth/enable.mdx @@ -18,7 +18,7 @@ auth method. An auth method is responsible for authenticating users or machines and assigning them policies and a token with which they can access Vault. Authentication is usually mapped to policy. Please see the [policies -concepts](/docs/concepts/policies.html) page for more information. +concepts](/docs/concepts/policies) page for more information. ## Examples @@ -37,12 +37,12 @@ Success! Data written to: auth/userpass/users/sethvargo ``` For more information on the specific configuration options and paths, please see -the [auth method](/docs/auth/index.html) documentation. +the [auth method](/docs/auth) documentation. ## Usage The following flags are available in addition to the [standard set of -flags](/docs/commands/index.html) included on all commands. +flags](/docs/commands) included on all commands. - `-description` `(string: "")` - Human-friendly description for the purpose of this auth method. diff --git a/website/pages/docs/commands/auth/help.mdx b/website/pages/docs/commands/auth/help.mdx index b722f1491..44fffe1b7 100644 --- a/website/pages/docs/commands/auth/help.mdx +++ b/website/pages/docs/commands/auth/help.mdx @@ -40,5 +40,5 @@ $ vault auth help my-method/ ## Usage -There are no flags beyond the [standard set of flags](/docs/commands/index.html) +There are no flags beyond the [standard set of flags](/docs/commands) included on all commands. diff --git a/website/pages/docs/commands/auth/index.mdx b/website/pages/docs/commands/auth/index.mdx index ce1cd5826..25019d409 100644 --- a/website/pages/docs/commands/auth/index.mdx +++ b/website/pages/docs/commands/auth/index.mdx @@ -14,10 +14,10 @@ The `auth` command groups subcommands for interacting with Vault's auth methods. Users can list, enable, disable, and get help for different auth methods. For more information, please see the [auth method -documentation](/docs/auth/index.html) or the [authentication -concepts](/docs/concepts/auth.html) page. +documentation](/docs/auth) or the [authentication +concepts](/docs/concepts/auth) page. -To authenticate to Vault as a user or machine, use the [`vault login`](/docs/commands/login.html) command instead. This command is for +To authenticate to Vault as a user or machine, use the [`vault login`](/docs/commands/login) command instead. This command is for interacting with the auth methods themselves, not authenticating to Vault. ## Examples diff --git a/website/pages/docs/commands/auth/list.mdx b/website/pages/docs/commands/auth/list.mdx index 377f5080a..4475d5892 100644 --- a/website/pages/docs/commands/auth/list.mdx +++ b/website/pages/docs/commands/auth/list.mdx @@ -37,7 +37,7 @@ userpass/ userpass auth_userpass_eea6507e n/a system syst ## Usage The following flags are available in addition to the [standard set of -flags](/docs/commands/index.html) included on all commands. +flags](/docs/commands) included on all commands. ### Output Options diff --git a/website/pages/docs/commands/auth/tune.mdx b/website/pages/docs/commands/auth/tune.mdx index 26238e328..ca7deb6ba 100644 --- a/website/pages/docs/commands/auth/tune.mdx +++ b/website/pages/docs/commands/auth/tune.mdx @@ -25,7 +25,7 @@ Success! Tuned the auth method at: github/ ## Usage The following flags are available in addition to the [standard set of -flags](/docs/commands/index.html) included on all commands. +flags](/docs/commands) included on all commands. - `-default-lease-ttl` `(duration: "")` - The default lease TTL for this auth method. If unspecified, this defaults to the Vault server's globally diff --git a/website/pages/docs/commands/debug.mdx b/website/pages/docs/commands/debug.mdx index 7c97f14d4..c3543bcdd 100644 --- a/website/pages/docs/commands/debug.mdx +++ b/website/pages/docs/commands/debug.mdx @@ -123,7 +123,7 @@ $ vault debug -target=host -target=metrics ## Usage The following flags are available in addition to the [standard set of -flags](/docs/commands/index.html) included on all commands. +flags](/docs/commands) included on all commands. ### Command Options diff --git a/website/pages/docs/commands/delete.mdx b/website/pages/docs/commands/delete.mdx index 251616927..c4371fb4a 100644 --- a/website/pages/docs/commands/delete.mdx +++ b/website/pages/docs/commands/delete.mdx @@ -36,5 +36,5 @@ $ vault delete aws/roles/ops ## Usage -There are no flags beyond the [standard set of flags](/docs/commands/index.html) +There are no flags beyond the [standard set of flags](/docs/commands) included on all commands. diff --git a/website/pages/docs/commands/index.mdx b/website/pages/docs/commands/index.mdx index bb86d4fd3..091c42a2c 100644 --- a/website/pages/docs/commands/index.mdx +++ b/website/pages/docs/commands/index.mdx @@ -13,9 +13,9 @@ description: |- ~> **Note:** The Vault CLI interface was changed substantially in 0.9.2+ and may cause confusion while using older versions of Vault with this documentation. Read our -[upgrade guide](/guides/upgrading/upgrade-to-0.9.2.html#backwards-compatible-cli-changes) for more information. +[upgrade guide](/guides/upgrading/upgrade-to-0.9.2#backwards-compatible-cli-changes) for more information. -In addition to a verbose [HTTP API](/api/index.html), Vault features a +In addition to a verbose [HTTP API](/api), Vault features a command-line interface that wraps common functionality and formats output. The Vault CLI is a single static binary. It is a thin wrapper around the HTTP API. Every CLI command maps directly to the HTTP API internally. @@ -50,7 +50,7 @@ and arguments if any: vault [options] [path] [args] ``` -- `options` - [Flags](/docs/commands/index.html#flags) to specify additional settings +- `options` - [Flags](/docs/commands#flags) to specify additional settings - `args` - API arguments specific to the operation -> **NOTE:** Run `vault path-help ` to see the list of args (parameters). @@ -60,7 +60,7 @@ vault [options] [path] [args] The following `write` command creates a new user (`bob`) in the userpass auth method. It passes the `-address` flag to specify the Vault server address which precedes the path (`auth/userpass/users/bob`) and its -[argument](/api/auth/userpass/index.html#create-update-user) +[argument](/api/auth/userpass#create-update-user) (`password="long-password"`) at last. ```text @@ -68,7 +68,7 @@ $ vault write -address="http://127.0.0.1:8200" auth/userpass/users/bob password= ``` If multiple options (`-address` and `-namespace`) and -[arguments](/api/auth/userpass/index.html#create-update-user) (`password` and +[arguments](/api/auth/userpass#create-update-user) (`password` and `policies`) are specified, the command would look like: ```text @@ -206,7 +206,7 @@ precedence over the environment variables. Vault authentication token. Conceptually similar to a session token on a website, the `VAULT_TOKEN` environment variable holds the contents of the token. For more information, please see the [token -concepts](/docs/concepts/tokens.html) page. +concepts](/docs/concepts/tokens) page. ### `VAULT_ADDR` @@ -257,7 +257,7 @@ High Availability mode. Do not verify Vault's presented certificate before communicating with it. Setting this variable is not recommended and voids Vault's [security -model](/docs/internals/security.html). +model](/docs/internals/security). ### `VAULT_TLS_SERVER_NAME` @@ -281,7 +281,7 @@ limiting is off by default. _Note:_ The rate is limited for each invocation of the `vault` CLI. Since each invocation of the `vault` CLI typically only makes a few requests, this environment variable is most useful when using the Go -[Vault client API](https://www.vaultproject.io/api/libraries.html#go). +[Vault client API](/api/libraries#go). ### `VAULT_NAMESPACE` diff --git a/website/pages/docs/commands/kv/delete.mdx b/website/pages/docs/commands/kv/delete.mdx index 9a0b15452..7d8d1b9fd 100644 --- a/website/pages/docs/commands/kv/delete.mdx +++ b/website/pages/docs/commands/kv/delete.mdx @@ -33,7 +33,7 @@ Success! Data deleted (if it existed) at: secret/creds ## Usage -There are no flags beyond the [standard set of flags](/docs/commands/index.html) +There are no flags beyond the [standard set of flags](/docs/commands) included on all commands. ### Command Options diff --git a/website/pages/docs/commands/kv/destroy.mdx b/website/pages/docs/commands/kv/destroy.mdx index ce49d12ae..e9b7684ea 100644 --- a/website/pages/docs/commands/kv/destroy.mdx +++ b/website/pages/docs/commands/kv/destroy.mdx @@ -9,7 +9,7 @@ description: |- # kv destroy -~> **NOTE:** This is a [K/V Version 2](/docs/secrets/kv/kv-v2.html) secrets +~> **NOTE:** This is a [K/V Version 2](/docs/secrets/kv/kv-v2) secrets engine command, and not available for Version 1. The `kv destroy` command permanently removes the specified versions' data @@ -27,7 +27,7 @@ Success! Data written to: secret/destroy/creds ## Usage -There are no flags beyond the [standard set of flags](/docs/commands/index.html) +There are no flags beyond the [standard set of flags](/docs/commands) included on all commands. ### Output Options diff --git a/website/pages/docs/commands/kv/enable-versioning.mdx b/website/pages/docs/commands/kv/enable-versioning.mdx index c4cb7b8db..5e0ce8225 100644 --- a/website/pages/docs/commands/kv/enable-versioning.mdx +++ b/website/pages/docs/commands/kv/enable-versioning.mdx @@ -24,7 +24,7 @@ Success! Tuned the secrets engine at: secret/ ## Usage -There are no flags beyond the [standard set of flags](/docs/commands/index.html) +There are no flags beyond the [standard set of flags](/docs/commands) included on all commands. ### Output Options diff --git a/website/pages/docs/commands/kv/get.mdx b/website/pages/docs/commands/kv/get.mdx index 43427495b..c229e1f5b 100644 --- a/website/pages/docs/commands/kv/get.mdx +++ b/website/pages/docs/commands/kv/get.mdx @@ -54,7 +54,7 @@ my-long-passcode ## Usage -There are no flags beyond the [standard set of flags](/docs/commands/index.html) +There are no flags beyond the [standard set of flags](/docs/commands) included on all commands. ### Output Options diff --git a/website/pages/docs/commands/kv/index.mdx b/website/pages/docs/commands/kv/index.mdx index f3bd2a020..1d6692be9 100644 --- a/website/pages/docs/commands/kv/index.mdx +++ b/website/pages/docs/commands/kv/index.mdx @@ -10,8 +10,8 @@ description: |- # kv The `kv` command groups subcommands for interacting with Vault's key/value -secrets engine (both [K/V Version 1](/docs/secrets/kv/kv-v1.html) and [K/V -Version 2](/docs/secrets/kv/kv-v2.html). +secrets engine (both [K/V Version 1](/docs/secrets/kv/kv-v1) and [K/V +Version 2](/docs/secrets/kv/kv-v2). ## Examples diff --git a/website/pages/docs/commands/kv/list.mdx b/website/pages/docs/commands/kv/list.mdx index 840d4f5d5..7db7861a7 100644 --- a/website/pages/docs/commands/kv/list.mdx +++ b/website/pages/docs/commands/kv/list.mdx @@ -34,7 +34,7 @@ release ## Usage -There are no flags beyond the [standard set of flags](/docs/commands/index.html) +There are no flags beyond the [standard set of flags](/docs/commands) included on all commands. ### Output Options diff --git a/website/pages/docs/commands/kv/metadata.mdx b/website/pages/docs/commands/kv/metadata.mdx index 266a50d67..4b19a094c 100644 --- a/website/pages/docs/commands/kv/metadata.mdx +++ b/website/pages/docs/commands/kv/metadata.mdx @@ -9,7 +9,7 @@ description: |- # kv metadata -~> **NOTE:** This is a [K/V Version 2](/docs/secrets/kv/kv-v2.html) secrets +~> **NOTE:** This is a [K/V Version 2](/docs/secrets/kv/kv-v2) secrets engine command, and not available for Version 1. The `kv metadata` command has subcommands for interacting with the metadata and diff --git a/website/pages/docs/commands/kv/patch.mdx b/website/pages/docs/commands/kv/patch.mdx index 8dab5f6b2..86d38cc06 100644 --- a/website/pages/docs/commands/kv/patch.mdx +++ b/website/pages/docs/commands/kv/patch.mdx @@ -9,7 +9,7 @@ description: |- # kv patch -~> **NOTE:** This is a [K/V Version 2](/docs/secrets/kv/kv-v2.html) secrets +~> **NOTE:** This is a [K/V Version 2](/docs/secrets/kv/kv-v2) secrets engine command, and not available for Version 1. The `kv patch` command writes the data to the given path in the K/V v2 secrets @@ -55,7 +55,7 @@ $ echo "abcd1234" | vault kv patch secret/foo bar=- ## Usage -There are no flags beyond the [standard set of flags](/docs/commands/index.html) +There are no flags beyond the [standard set of flags](/docs/commands) included on all commands. ### Output Options diff --git a/website/pages/docs/commands/kv/put.mdx b/website/pages/docs/commands/kv/put.mdx index bfe6761b9..53fef9fa4 100644 --- a/website/pages/docs/commands/kv/put.mdx +++ b/website/pages/docs/commands/kv/put.mdx @@ -44,7 +44,7 @@ $ echo "abcd1234" | vault kv put secret/foo bar=- ## Usage -There are no flags beyond the [standard set of flags](/docs/commands/index.html) +There are no flags beyond the [standard set of flags](/docs/commands) included on all commands. ### Output Options diff --git a/website/pages/docs/commands/kv/rollback.mdx b/website/pages/docs/commands/kv/rollback.mdx index 1b0d5a8d2..4e41432b1 100644 --- a/website/pages/docs/commands/kv/rollback.mdx +++ b/website/pages/docs/commands/kv/rollback.mdx @@ -9,7 +9,7 @@ description: |- # kv rollback -~> **NOTE:** This is a [K/V Version 2](/docs/secrets/kv/kv-v2.html) secrets +~> **NOTE:** This is a [K/V Version 2](/docs/secrets/kv/kv-v2) secrets engine command, and not available for Version 1. The `kv rollback` command restores a given previous version to the current @@ -34,7 +34,7 @@ version 6 ## Usage -There are no flags beyond the [standard set of flags](/docs/commands/index.html) +There are no flags beyond the [standard set of flags](/docs/commands) included on all commands. ### Output Options diff --git a/website/pages/docs/commands/kv/undelete.mdx b/website/pages/docs/commands/kv/undelete.mdx index f40dd10f5..5514ad95e 100644 --- a/website/pages/docs/commands/kv/undelete.mdx +++ b/website/pages/docs/commands/kv/undelete.mdx @@ -10,7 +10,7 @@ description: |- # kv undelete -~> **NOTE:** This is a [K/V Version 2](/docs/secrets/kv/kv-v2.html) secrets +~> **NOTE:** This is a [K/V Version 2](/docs/secrets/kv/kv-v2) secrets engine command, and not available for Version 1. The `kv undelete` command undoes the deletes of the data for the provided version @@ -28,7 +28,7 @@ Success! Data written to: secret/undelete/creds ## Usage -There are no flags beyond the [standard set of flags](/docs/commands/index.html) +There are no flags beyond the [standard set of flags](/docs/commands) included on all commands. ### Output Options diff --git a/website/pages/docs/commands/lease.mdx b/website/pages/docs/commands/lease.mdx index 447be5b9d..bd119b5c1 100644 --- a/website/pages/docs/commands/lease.mdx +++ b/website/pages/docs/commands/lease.mdx @@ -10,7 +10,7 @@ description: |- # lease The `lease` command groups subcommands for interacting with leases attached to -secrets. For leases attached to tokens, use the [`vault token`](/docs/commands/token.html) subcommand. +secrets. For leases attached to tokens, use the [`vault token`](/docs/commands/token) subcommand. ## Examples diff --git a/website/pages/docs/commands/lease/index.mdx b/website/pages/docs/commands/lease/index.mdx index 447be5b9d..bd119b5c1 100644 --- a/website/pages/docs/commands/lease/index.mdx +++ b/website/pages/docs/commands/lease/index.mdx @@ -10,7 +10,7 @@ description: |- # lease The `lease` command groups subcommands for interacting with leases attached to -secrets. For leases attached to tokens, use the [`vault token`](/docs/commands/token.html) subcommand. +secrets. For leases attached to tokens, use the [`vault token`](/docs/commands/token) subcommand. ## Examples diff --git a/website/pages/docs/commands/lease/renew.mdx b/website/pages/docs/commands/lease/renew.mdx index 5148b1f75..8136291af 100644 --- a/website/pages/docs/commands/lease/renew.mdx +++ b/website/pages/docs/commands/lease/renew.mdx @@ -28,7 +28,7 @@ Success! Revoked lease: database/creds/readonly/27e1b9a1-27b8-83d9-9fe0-d99d786b ## Usage The following flags are available in addition to the [standard set of -flags](/docs/commands/index.html) included on all commands. +flags](/docs/commands) included on all commands. - `-increment` `(duration: "")` - Request a specific increment in seconds. Vault is not required to honor this request. diff --git a/website/pages/docs/commands/lease/revoke.mdx b/website/pages/docs/commands/lease/revoke.mdx index e366340d5..37bf9603f 100644 --- a/website/pages/docs/commands/lease/revoke.mdx +++ b/website/pages/docs/commands/lease/revoke.mdx @@ -31,7 +31,7 @@ Success! Revoked any leases with prefix: database/creds ## Usage The following flags are available in addition to the [standard set of -flags](/docs/commands/index.html) included on all commands. +flags](/docs/commands) included on all commands. - `-force` `(bool: false)` - Delete the lease from Vault even if the secret engine revocation fails. This is meant for recovery situations where the diff --git a/website/pages/docs/commands/list.mdx b/website/pages/docs/commands/list.mdx index a24ebbf27..5d0424768 100644 --- a/website/pages/docs/commands/list.mdx +++ b/website/pages/docs/commands/list.mdx @@ -22,5 +22,5 @@ $ vault list secret/my-app/ ## Usage -There are no flags beyond the [standard set of flags](/docs/commands/index.html) +There are no flags beyond the [standard set of flags](/docs/commands) included on all commands. diff --git a/website/pages/docs/commands/login.mdx b/website/pages/docs/commands/login.mdx index 518ea0774..f0cebee90 100644 --- a/website/pages/docs/commands/login.mdx +++ b/website/pages/docs/commands/login.mdx @@ -103,7 +103,7 @@ token_meta_username my-username ## Usage The following flags are available in addition to the [standard set of -flags](/docs/commands/index.html) included on all commands. +flags](/docs/commands) included on all commands. ### Output Options diff --git a/website/pages/docs/commands/operator/generate-root.mdx b/website/pages/docs/commands/operator/generate-root.mdx index 6f454881c..a27f6c37c 100644 --- a/website/pages/docs/commands/operator/generate-root.mdx +++ b/website/pages/docs/commands/operator/generate-root.mdx @@ -21,14 +21,14 @@ One of the following must be provided to start the root token generation: final value. - A file containing a PGP key or a - [keybase](/docs/concepts/pgp-gpg-keybase.html) username in the `-pgp-key` + [keybase](/docs/concepts/pgp-gpg-keybase) username in the `-pgp-key` flag. The resulting token is encrypted with this public key. An unseal key may be provided directly on the command line as an argument to the command. If key is specified as "-", the command will read from stdin. If a TTY is available, the command will prompt for text. -Please see the [generate root guide](/guides/operations/generate-root.html) for +Please see the [generate root guide](/guides/operations/generate-root) for step-by-step instructions. ## Examples @@ -54,7 +54,7 @@ $ vault operator generate-root -otp="..." ## Usage The following flags are available in addition to the [standard set of -flags](/docs/commands/index.html) included on all commands. +flags](/docs/commands) included on all commands. ### Output Options diff --git a/website/pages/docs/commands/operator/init.mdx b/website/pages/docs/commands/operator/init.mdx index 1da21f2ac..141de3977 100644 --- a/website/pages/docs/commands/operator/init.mdx +++ b/website/pages/docs/commands/operator/init.mdx @@ -24,7 +24,7 @@ called "unseal keys" in Vault's documentation. This command cannot be run against already-initialized Vault cluster. -For more information on sealing and unsealing, please the [seal concepts page](/docs/concepts/seal.html). +For more information on sealing and unsealing, please the [seal concepts page](/docs/concepts/seal). ## Examples @@ -61,7 +61,7 @@ $ vault operator init -root-token-pgp-key="keybase:hashicorp" ## Usage The following flags are available in addition to the [standard set of -flags](/docs/commands/index.html) included on all commands. +flags](/docs/commands) included on all commands. ### Output Options diff --git a/website/pages/docs/commands/operator/key-status.mdx b/website/pages/docs/commands/operator/key-status.mdx index eb0f76b07..9bea1aee7 100644 --- a/website/pages/docs/commands/operator/key-status.mdx +++ b/website/pages/docs/commands/operator/key-status.mdx @@ -25,7 +25,7 @@ Install Time 01 Jan 17 12:30 UTC ## Usage The following flags are available in addition to the [standard set of -flags](/docs/commands/index.html) included on all commands. +flags](/docs/commands) included on all commands. ### Output Options diff --git a/website/pages/docs/commands/operator/migrate.mdx b/website/pages/docs/commands/operator/migrate.mdx index 6307715c1..a26b67b37 100644 --- a/website/pages/docs/commands/operator/migrate.mdx +++ b/website/pages/docs/commands/operator/migrate.mdx @@ -49,7 +49,7 @@ $ vault operator migrate -config migrate.hcl -start "data/logical/fd" The `operator migrate` command uses a dedicated configuration file to specify the source and destination storage backends. The format of the storage stanzas is identical -to that used to [configure Vault](/docs/configuration/storage/index.html), +to that used to [configure Vault](/docs/configuration/storage), with the only difference being that two stanzas are required: `storage_source` and `storage_destination`. ```hcl diff --git a/website/pages/docs/commands/operator/rekey.mdx b/website/pages/docs/commands/operator/rekey.mdx index 34e3e07cb..e8c01b107 100644 --- a/website/pages/docs/commands/operator/rekey.mdx +++ b/website/pages/docs/commands/operator/rekey.mdx @@ -22,7 +22,7 @@ An unseal key may be provided directly on the command line as an argument to the command. If key is specified as "-", the command will read from stdin. If a TTY is available, the command will prompt for text. -Please see the [rotating and rekeying](/guides/operations/rekeying-and-rotating.html) for +Please see the [rotating and rekeying](/guides/operations/rekeying-and-rotating) for step-by-step instructions. ## Examples @@ -97,7 +97,7 @@ $ vault operator rekey -verify -nonce="..." ## Usage The following flags are available in addition to the [standard set of -flags](/docs/commands/index.html) included on all commands. +flags](/docs/commands) included on all commands. ### Output Options @@ -134,7 +134,7 @@ flags](/docs/commands/index.html) included on all commands. providing an unseal key. The default is false. - `-target` `(string: "barrier")` - Target for rekeying. "recovery" only applies - when HSM support is enabled or using [Auto Unseal](/docs/concepts/seal.html#auto-unseal). + when HSM support is enabled or using [Auto Unseal](/docs/concepts/seal#auto-unseal). - `-verify` `(bool: false)` - Indicate during the phase `-init` that the verification process is activated for the rekey. Along with `-nonce` option diff --git a/website/pages/docs/commands/operator/rotate.mdx b/website/pages/docs/commands/operator/rotate.mdx index 6f029b8af..f224b6fdc 100644 --- a/website/pages/docs/commands/operator/rotate.mdx +++ b/website/pages/docs/commands/operator/rotate.mdx @@ -33,7 +33,7 @@ Install Time 01 May 17 10:30 UTC ## Usage The following flags are available in addition to the [standard set of -flags](/docs/commands/index.html) included on all commands. +flags](/docs/commands) included on all commands. ### Output Options diff --git a/website/pages/docs/commands/operator/seal.mdx b/website/pages/docs/commands/operator/seal.mdx index 9015ce499..24d21c6b4 100644 --- a/website/pages/docs/commands/operator/seal.mdx +++ b/website/pages/docs/commands/operator/seal.mdx @@ -26,7 +26,7 @@ Users will have to re-enter their portions of the master key again. This command does nothing if the Vault server is already sealed. For more information on sealing and unsealing, please the [seal concepts -page](/docs/concepts/seal.html). +page](/docs/concepts/seal). ## Examples @@ -39,5 +39,5 @@ Success! Vault is sealed. ## Usage -There are no flags beyond the [standard set of flags](/docs/commands/index.html) +There are no flags beyond the [standard set of flags](/docs/commands) included on all commands. diff --git a/website/pages/docs/commands/operator/step-down.mdx b/website/pages/docs/commands/operator/step-down.mdx index 5ac72657a..a013f5dac 100644 --- a/website/pages/docs/commands/operator/step-down.mdx +++ b/website/pages/docs/commands/operator/step-down.mdx @@ -26,5 +26,5 @@ Success! Stepped down: http://127.0.0.1:8200 ## Usage -There are no flags beyond the [standard set of flags](/docs/commands/index.html) +There are no flags beyond the [standard set of flags](/docs/commands) included on all commands. diff --git a/website/pages/docs/commands/operator/unseal.mdx b/website/pages/docs/commands/operator/unseal.mdx index 8312d7e27..b950411ea 100644 --- a/website/pages/docs/commands/operator/unseal.mdx +++ b/website/pages/docs/commands/operator/unseal.mdx @@ -29,7 +29,7 @@ Key (will be hidden): IXyR0OJnSFobekZMMCKCoVEpT7wI6l+USMzE3IcyDyo= ``` For more information on sealing and unsealing, please the [seal concepts -page](/docs/concepts/seal.html). +page](/docs/concepts/seal). ## Examples @@ -47,7 +47,7 @@ Unseal Progress: 0 ## Usage The following flags are available in addition to the [standard set of -flags](/docs/commands/index.html) included on all commands. +flags](/docs/commands) included on all commands. ### Output Options diff --git a/website/pages/docs/commands/path-help.mdx b/website/pages/docs/commands/path-help.mdx index eae50d346..7bffceec7 100644 --- a/website/pages/docs/commands/path-help.mdx +++ b/website/pages/docs/commands/path-help.mdx @@ -88,5 +88,5 @@ user of this backend. ## Usage -There are no flags beyond the [standard set of flags](/docs/commands/index.html) +There are no flags beyond the [standard set of flags](/docs/commands) included on all commands. diff --git a/website/pages/docs/commands/plugin/deregister.mdx b/website/pages/docs/commands/plugin/deregister.mdx index 9996d2e50..99637fa9f 100644 --- a/website/pages/docs/commands/plugin/deregister.mdx +++ b/website/pages/docs/commands/plugin/deregister.mdx @@ -24,5 +24,5 @@ Success! Deregistered plugin (if it was registered): my-custom-plugin ## Usage -There are no flags beyond the [standard set of flags](/docs/commands/index.html) +There are no flags beyond the [standard set of flags](/docs/commands) included on all commands. diff --git a/website/pages/docs/commands/plugin/info.mdx b/website/pages/docs/commands/plugin/info.mdx index bba9797e8..81e06d3df 100644 --- a/website/pages/docs/commands/plugin/info.mdx +++ b/website/pages/docs/commands/plugin/info.mdx @@ -29,7 +29,7 @@ sha256 d3f0a8be02f6c074cf38c9c99d4d04c9c6466249 ## Usage The following flags are available in addition to the [standard set of -flags](/docs/commands/index.html) included on all commands. +flags](/docs/commands) included on all commands. ### Output Options diff --git a/website/pages/docs/commands/plugin/list.mdx b/website/pages/docs/commands/plugin/list.mdx index c343e1e5d..c111c4b44 100644 --- a/website/pages/docs/commands/plugin/list.mdx +++ b/website/pages/docs/commands/plugin/list.mdx @@ -32,7 +32,7 @@ cassandra-database-plugin ## Usage The following flags are available in addition to the [standard set of -flags](/docs/commands/index.html) included on all commands. +flags](/docs/commands) included on all commands. ### Output Options diff --git a/website/pages/docs/commands/plugin/register.mdx b/website/pages/docs/commands/plugin/register.mdx index 98a3eab4d..b8c9eaea3 100644 --- a/website/pages/docs/commands/plugin/register.mdx +++ b/website/pages/docs/commands/plugin/register.mdx @@ -35,7 +35,7 @@ $ vault plugin register \ ## Usage The following flags are available in addition to the [standard set of -flags](/docs/commands/index.html) included on all commands. +flags](/docs/commands) included on all commands. ### Output Options diff --git a/website/pages/docs/commands/policy/delete.mdx b/website/pages/docs/commands/policy/delete.mdx index dff346e37..44c5a418a 100644 --- a/website/pages/docs/commands/policy/delete.mdx +++ b/website/pages/docs/commands/policy/delete.mdx @@ -27,5 +27,5 @@ $ vault policy delete my-policy ## Usage -There are no flags beyond the [standard set of flags](/docs/commands/index.html) +There are no flags beyond the [standard set of flags](/docs/commands) included on all commands. diff --git a/website/pages/docs/commands/policy/fmt.mdx b/website/pages/docs/commands/policy/fmt.mdx index 4ea8e75ad..6be72bf60 100644 --- a/website/pages/docs/commands/policy/fmt.mdx +++ b/website/pages/docs/commands/policy/fmt.mdx @@ -24,5 +24,5 @@ $ vault policy fmt my-policy.hcl ## Usage -There are no flags beyond the [standard set of flags](/docs/commands/index.html) +There are no flags beyond the [standard set of flags](/docs/commands) included on all commands. diff --git a/website/pages/docs/commands/policy/index.mdx b/website/pages/docs/commands/policy/index.mdx index ef42509b4..7dc14b545 100644 --- a/website/pages/docs/commands/policy/index.mdx +++ b/website/pages/docs/commands/policy/index.mdx @@ -13,7 +13,7 @@ The `policy` command groups subcommands for interacting with policies. Users can write, read, and list policies in Vault. For more information, please see the [policy -documentation](/docs/concepts/policies.html). +documentation](/docs/concepts/policies). ## Examples diff --git a/website/pages/docs/commands/policy/list.mdx b/website/pages/docs/commands/policy/list.mdx index 896ac0575..2088e926d 100644 --- a/website/pages/docs/commands/policy/list.mdx +++ b/website/pages/docs/commands/policy/list.mdx @@ -25,7 +25,7 @@ root ## Usage The following flags are available in addition to the [standard set of -flags](/docs/commands/index.html) included on all commands. +flags](/docs/commands) included on all commands. ### Output Options diff --git a/website/pages/docs/commands/policy/read.mdx b/website/pages/docs/commands/policy/read.mdx index e58de66f1..19afd3e67 100644 --- a/website/pages/docs/commands/policy/read.mdx +++ b/website/pages/docs/commands/policy/read.mdx @@ -23,7 +23,7 @@ $ vault policy read my-policy ## Usage The following flags are available in addition to the [standard set of -flags](/docs/commands/index.html) included on all commands. +flags](/docs/commands) included on all commands. ### Output Options diff --git a/website/pages/docs/commands/policy/write.mdx b/website/pages/docs/commands/policy/write.mdx index eec677d84..4963dc3d5 100644 --- a/website/pages/docs/commands/policy/write.mdx +++ b/website/pages/docs/commands/policy/write.mdx @@ -15,7 +15,7 @@ a local file PATH or stdin. If PATH is "-", the policy is read from stdin. Otherwise, it is loaded from the file at the given path on the local disk. For details on the policy syntax, please see the [policy -documentation](/docs/concepts/policies.html). +documentation](/docs/concepts/policies). ## Examples @@ -33,5 +33,5 @@ $ cat my-policy.hcl | vault policy write my-policy - ## Usage -There are no flags beyond the [standard set of flags](/docs/commands/index.html) +There are no flags beyond the [standard set of flags](/docs/commands) included on all commands. diff --git a/website/pages/docs/commands/read.mdx b/website/pages/docs/commands/read.mdx index 8ce767bbb..0d6afe30f 100644 --- a/website/pages/docs/commands/read.mdx +++ b/website/pages/docs/commands/read.mdx @@ -31,7 +31,7 @@ foo bar ## Usage The following flags are available in addition to the [standard set of -flags](/docs/commands/index.html) included on all commands. +flags](/docs/commands) included on all commands. ### Output Options diff --git a/website/pages/docs/commands/secrets/disable.mdx b/website/pages/docs/commands/secrets/disable.mdx index 454130d33..bbeb7844f 100644 --- a/website/pages/docs/commands/secrets/disable.mdx +++ b/website/pages/docs/commands/secrets/disable.mdx @@ -27,5 +27,5 @@ $ vault secrets disable aws/ ## Usage -There are no flags beyond the [standard set of flags](/docs/commands/index.html) +There are no flags beyond the [standard set of flags](/docs/commands) included on all commands. diff --git a/website/pages/docs/commands/secrets/enable.mdx b/website/pages/docs/commands/secrets/enable.mdx index ce9f23889..57f44618d 100644 --- a/website/pages/docs/commands/secrets/enable.mdx +++ b/website/pages/docs/commands/secrets/enable.mdx @@ -23,7 +23,7 @@ Some secrets engines persist data, some act as data pass-through, and some generate dynamic credentials. The secrets engine will likely require configuration after it is mounted. For details on the specific configuration options, please see the [secrets engine -documentation](/docs/secrets/index.html). +documentation](/docs/secrets). ## Examples @@ -53,12 +53,12 @@ $ vault secrets enable -path=my-secrets my-plugin ``` For more information on the specific configuration options and paths, please see -the [secrets engine](/docs/secrets/index.html) documentation. +the [secrets engine](/docs/secrets) documentation. ## Usage The following flags are available in addition to the [standard set of -flags](/docs/commands/index.html) included on all commands. +flags](/docs/commands) included on all commands. - `-default-lease-ttl` `(duration: "")` - The default lease TTL for this secrets engine. If unspecified, this defaults to the Vault server's globally diff --git a/website/pages/docs/commands/secrets/index.mdx b/website/pages/docs/commands/secrets/index.mdx index 025857824..04b9b3b12 100644 --- a/website/pages/docs/commands/secrets/index.mdx +++ b/website/pages/docs/commands/secrets/index.mdx @@ -17,7 +17,7 @@ Some secrets engines persist data, some act as data pass-through, and some generate dynamic credentials. The secrets engine will likely require configuration after it is mounted. For details on the specific configuration options, please see the [secrets engine -documentation](/docs/secrets/index.html). +documentation](/docs/secrets). ## Examples diff --git a/website/pages/docs/commands/secrets/list.mdx b/website/pages/docs/commands/secrets/list.mdx index 79b85fac4..66175184e 100644 --- a/website/pages/docs/commands/secrets/list.mdx +++ b/website/pages/docs/commands/secrets/list.mdx @@ -43,7 +43,7 @@ sys/ system system_a9fd745d n/a n/a n/a ## Usage The following flags are available in addition to the [standard set of -flags](/docs/commands/index.html) included on all commands. +flags](/docs/commands) included on all commands. ### Output Options diff --git a/website/pages/docs/commands/secrets/move.mdx b/website/pages/docs/commands/secrets/move.mdx index 80a6a4158..3c79de746 100644 --- a/website/pages/docs/commands/secrets/move.mdx +++ b/website/pages/docs/commands/secrets/move.mdx @@ -27,5 +27,5 @@ $ vault secrets move secret/ kv/ ## Usage -There are no flags beyond the [standard set of flags](/docs/commands/index.html) +There are no flags beyond the [standard set of flags](/docs/commands) included on all commands. diff --git a/website/pages/docs/commands/secrets/tune.mdx b/website/pages/docs/commands/secrets/tune.mdx index ea1dbd08e..c9840c847 100644 --- a/website/pages/docs/commands/secrets/tune.mdx +++ b/website/pages/docs/commands/secrets/tune.mdx @@ -25,7 +25,7 @@ $ vault secrets tune -default-lease-ttl=72h pki/ ## Usage The following flags are available in addition to the [standard set of -flags](/docs/commands/index.html) included on all commands. +flags](/docs/commands) included on all commands. - `-default-lease-ttl` `(duration: "")` - The default lease TTL for this secrets engine. If unspecified, this defaults to the Vault server's globally diff --git a/website/pages/docs/commands/server.mdx b/website/pages/docs/commands/server.mdx index 1a621b533..977610486 100644 --- a/website/pages/docs/commands/server.mdx +++ b/website/pages/docs/commands/server.mdx @@ -18,13 +18,13 @@ API before the server can respond to requests. For more information, please see: -- [`operator init` command](/docs/commands/operator/init.html) for information +- [`operator init` command](/docs/commands/operator/init) for information on initializing a Vault server. -- [`operator unseal` command](/docs/commands/operator/unseal.html) for +- [`operator unseal` command](/docs/commands/operator/unseal) for information on providing unseal keys. -- [Vault configuration](/docs/configuration/index.html) for the syntax and +- [Vault configuration](/docs/configuration) for the syntax and various configuration options for a Vault server. ## Examples @@ -44,7 +44,7 @@ $ vault server -dev -dev-root-token-id="root" ## Usage The following flags are available in addition to the [standard set of -flags](/docs/commands/index.html) included on all commands. +flags](/docs/commands) included on all commands. ### Command Options diff --git a/website/pages/docs/commands/ssh.mdx b/website/pages/docs/commands/ssh.mdx index ba832d106..859d78ab1 100644 --- a/website/pages/docs/commands/ssh.mdx +++ b/website/pages/docs/commands/ssh.mdx @@ -46,12 +46,12 @@ $ vault ssh \ For step-by-step guides and instructions for each of the available SSH auth methods, please see the corresponding [SSH secrets -engine](/docs/secrets/ssh/index.html). +engine](/docs/secrets/ssh). ## Usage The following flags are available in addition to the [standard set of -flags](/docs/commands/index.html) included on all commands. +flags](/docs/commands) included on all commands. ### Output Options diff --git a/website/pages/docs/commands/status.mdx b/website/pages/docs/commands/status.mdx index a4ecb5338..167d38b74 100644 --- a/website/pages/docs/commands/status.mdx +++ b/website/pages/docs/commands/status.mdx @@ -41,7 +41,7 @@ High-Availability Enabled: false ## Usage The following flags are available in addition to the [standard set of -flags](/docs/commands/index.html) included on all commands. +flags](/docs/commands) included on all commands. ### Output Options diff --git a/website/pages/docs/commands/token/capabilities.mdx b/website/pages/docs/commands/token/capabilities.mdx index 84c01fdeb..2240fabd4 100644 --- a/website/pages/docs/commands/token/capabilities.mdx +++ b/website/pages/docs/commands/token/capabilities.mdx @@ -36,7 +36,7 @@ deny ## Usage The following flags are available in addition to the [standard set of -flags](/docs/commands/index.html) included on all commands. +flags](/docs/commands) included on all commands. ### Output Options diff --git a/website/pages/docs/commands/token/create.mdx b/website/pages/docs/commands/token/create.mdx index 28c037d32..fcfd00568 100644 --- a/website/pages/docs/commands/token/create.mdx +++ b/website/pages/docs/commands/token/create.mdx @@ -58,7 +58,7 @@ token_policies [my-policy] ## Usage The following flags are available in addition to the [standard set of -flags](/docs/commands/index.html) included on all commands. +flags](/docs/commands) included on all commands. ### Output Options diff --git a/website/pages/docs/commands/token/index.mdx b/website/pages/docs/commands/token/index.mdx index 0be55a06f..428f5223f 100644 --- a/website/pages/docs/commands/token/index.mdx +++ b/website/pages/docs/commands/token/index.mdx @@ -13,7 +13,7 @@ The `token` command groups subcommands for interacting with tokens. Users can create, lookup, renew, and revoke tokens. For more information on tokens, please see the [token concepts -page](/docs/concepts/tokens.html). +page](/docs/concepts/tokens). ## Examples diff --git a/website/pages/docs/commands/token/lookup.mdx b/website/pages/docs/commands/token/lookup.mdx index c6e6c86e7..9c753e71a 100644 --- a/website/pages/docs/commands/token/lookup.mdx +++ b/website/pages/docs/commands/token/lookup.mdx @@ -37,7 +37,7 @@ $ vault token lookup -accessor 9793c9b3-e04a-46f3-e7b8-748d7da248da ## Usage The following flags are available in addition to the [standard set of -flags](/docs/commands/index.html) included on all commands. +flags](/docs/commands) included on all commands. ### Output Options diff --git a/website/pages/docs/commands/token/renew.mdx b/website/pages/docs/commands/token/renew.mdx index 3eca84c7a..9cac1e95c 100644 --- a/website/pages/docs/commands/token/renew.mdx +++ b/website/pages/docs/commands/token/renew.mdx @@ -40,7 +40,7 @@ $ vault token renew -increment=30m 96ddf4bc-d217-f3ba-f9bd-017055595017 ## Usage The following flags are available in addition to the [standard set of -flags](/docs/commands/index.html) included on all commands. +flags](/docs/commands) included on all commands. ### Output Options diff --git a/website/pages/docs/commands/token/revoke.mdx b/website/pages/docs/commands/token/revoke.mdx index 250fb9bac..c3e6b84e0 100644 --- a/website/pages/docs/commands/token/revoke.mdx +++ b/website/pages/docs/commands/token/revoke.mdx @@ -39,7 +39,7 @@ Success! Revoked token (if it existed) ## Usage The following flags are available in addition to the [standard set of -flags](/docs/commands/index.html) included on all commands. +flags](/docs/commands) included on all commands. - `-accessor` `(bool: false)` - Treat the argument as an accessor instead of a token. diff --git a/website/pages/docs/commands/unwrap.mdx b/website/pages/docs/commands/unwrap.mdx index 953d17060..5e1f777ca 100644 --- a/website/pages/docs/commands/unwrap.mdx +++ b/website/pages/docs/commands/unwrap.mdx @@ -33,7 +33,7 @@ $ vault unwrap # unwraps 848f9ccf... ## Usage The following flags are available in addition to the [standard set of -flags](/docs/commands/index.html) included on all commands. +flags](/docs/commands) included on all commands. ### Output Options diff --git a/website/pages/docs/commands/write.mdx b/website/pages/docs/commands/write.mdx index 87b6abcc0..fb6f97ac3 100644 --- a/website/pages/docs/commands/write.mdx +++ b/website/pages/docs/commands/write.mdx @@ -50,7 +50,7 @@ $ echo $MY_TOKEN | vault write consul/config/access token=- ## Usage The following flags are available in addition to the [standard set of -flags](/docs/commands/index.html) included on all commands. +flags](/docs/commands) included on all commands. ### Output Options diff --git a/website/pages/docs/concepts/auth.mdx b/website/pages/docs/concepts/auth.mdx index 53790b992..f2956b3bd 100644 --- a/website/pages/docs/concepts/auth.mdx +++ b/website/pages/docs/concepts/auth.mdx @@ -11,14 +11,14 @@ description: >- Authentication in Vault is the process by which user or machine supplied information is verified against an internal or external system. Vault supports -multiple [auth methods](/docs/auth/index.html) including GitHub, +multiple [auth methods](/docs/auth) including GitHub, LDAP, AppRole, and more. Each auth method has a specific use case. Before a client can interact with Vault, it must _authenticate_ against an auth method. Upon authentication, a token is generated. This token is conceptually similar to a session ID on a website. The token may have attached policy, which is mapped at authentication time. This process is described in -detail in the [policies concepts](/docs/concepts/policies.html) documentation. +detail in the [policies concepts](/docs/concepts/policies) documentation. ## auth methods @@ -49,7 +49,7 @@ access, although some backends do support MFA. ## Tokens -There is an [entire page dedicated to tokens](/docs/concepts/tokens.html), +There is an [entire page dedicated to tokens](/docs/concepts/tokens), but it is important to understand that authentication works by verifying your identity and then generating a token to associate with that identity. @@ -61,7 +61,7 @@ the API you'll have to do this manually. This token given for authentication with any backend can also be used with the full set of token commands, such as creating new sub-tokens, revoking tokens, and renewing tokens. This is all covered on the -[token concepts page](/docs/concepts/tokens.html). +[token concepts page](/docs/concepts/tokens). ## Authenticating @@ -100,7 +100,7 @@ be used. ## Auth Leases Just like secrets, identities have -[leases](/docs/concepts/lease.html) associated with them. This means that +[leases](/docs/concepts/lease) associated with them. This means that you must reauthenticate after the given lease period to continue accessing Vault. diff --git a/website/pages/docs/concepts/dev-server.mdx b/website/pages/docs/concepts/dev-server.mdx index 21f4ef6d2..1d3908500 100644 --- a/website/pages/docs/concepts/dev-server.mdx +++ b/website/pages/docs/concepts/dev-server.mdx @@ -50,9 +50,7 @@ flags or by specifying a configuration file): The dev server should be used for experimentation with Vault features, such as different auth methods, secrets engines, audit devices, etc. -If you're new to Vault, you may want to pick up with [Your First -Secret](/intro/getting-started/first-secret.html) in -our getting started guide. +If you're new to Vault, you may want to pick up with [Your First Secret](/intro/getting-started/first-secret) in our getting started guide. In addition to experimentation, the dev server is very easy to automate for development environments. diff --git a/website/pages/docs/concepts/ha.mdx b/website/pages/docs/concepts/ha.mdx index f0214b888..b593594c8 100644 --- a/website/pages/docs/concepts/ha.mdx +++ b/website/pages/docs/concepts/ha.mdx @@ -17,7 +17,7 @@ You can tell if a data store supports high availability mode ("HA") by starting the server and seeing if "(HA available)" is output next to the data store information. If it is, then Vault will automatically use HA mode. This information is also available on the -[Configuration](/docs/configuration/index.html) page. +[Configuration](/docs/configuration) page. To be highly available, one of the Vault server nodes grabs a lock within the data store. The successful server node then becomes the active node; all other @@ -151,7 +151,7 @@ variable, which takes precedence. Currently there are several storage backends that support high availability mode, including Consul, ZooKeeper and etcd. These may change over time, and the -[configuration page](/docs/configuration/index.html) should be referenced. +[configuration page](/docs/configuration) should be referenced. The Consul backend is the recommended HA backend, as it is used in production by HashiCorp and its customers with commercial support. diff --git a/website/pages/docs/concepts/lease.mdx b/website/pages/docs/concepts/lease.mdx index ea944b19f..ec3148d47 100644 --- a/website/pages/docs/concepts/lease.mdx +++ b/website/pages/docs/concepts/lease.mdx @@ -27,7 +27,7 @@ to check in routinely. In addition to renewals, a lease can be _revoked_. When a lease is revoked, it invalidates that secret immediately and prevents any further renewals. For -example, with the [AWS secrets engine](/docs/secrets/aws/index.html), the +example, with the [AWS secrets engine](/docs/secrets/aws), the access keys will be deleted from AWS the moment a lease is revoked. This renders the access keys invalid from that point forward. @@ -36,7 +36,7 @@ or automatically by Vault. When a lease is expired, Vault will automatically revoke that lease. When a token is revoked, Vault will revoke all leases that were created using that token. -**Note**: The [Key/Value Backend](/docs/secrets/kv/index.html) which stores +**Note**: The [Key/Value Backend](/docs/secrets/kv) which stores arbitrary secrets does not issue leases although it will sometimes return a lease duration; see the documentation for more information. diff --git a/website/pages/docs/concepts/policies.mdx b/website/pages/docs/concepts/policies.mdx index 4497041fc..12eb6fc06 100644 --- a/website/pages/docs/concepts/policies.mdx +++ b/website/pages/docs/concepts/policies.mdx @@ -19,7 +19,7 @@ system. ## Policy-Authorization Workflow Before a human or machine can gain access, an administrator must configure Vault -with an [auth method](/docs/concepts/auth.html). Authentication is +with an [auth method](/docs/concepts/auth). Authentication is the process by which human or machine-supplied information is verified against an internal or external system. @@ -437,7 +437,7 @@ Note: the only value that can be used with the `*` parameter is `[]`. These parameters can be used to set minimums/maximums on TTLs set by clients when requesting that a response be -[wrapped](/docs/concepts/response-wrapping.html), with a granularity of a +[wrapped](/docs/concepts/response-wrapping), with a granularity of a second. These can either be specified as a number of seconds or a string with a `s`, `m`, or `h` suffix indicating seconds, minutes, and hours respectively. @@ -540,8 +540,8 @@ $ curl \ For more information, please read: -- [Production Hardening](/guides/operations/production.html) -- [Generating a Root Token](/guides/operations/generate-root.html) +- [Production Hardening](/guides/operations/production) +- [Generating a Root Token](/guides/operations/generate-root) ## Managing Policies diff --git a/website/pages/docs/concepts/response-wrapping.mdx b/website/pages/docs/concepts/response-wrapping.mdx index e4819b8ce..b816e4f47 100644 --- a/website/pages/docs/concepts/response-wrapping.mdx +++ b/website/pages/docs/concepts/response-wrapping.mdx @@ -26,7 +26,7 @@ in persistent storage, you cannot encrypt this key in transit. To help address this problem, Vault includes a feature called _response wrapping_. When requested, Vault can take the response it would have sent to an HTTP client and instead insert it into the -[`cubbyhole`](/docs/secrets/cubbyhole/index.html) of a single-use token, +[`cubbyhole`](/docs/secrets/cubbyhole) of a single-use token, returning that single-use token instead. Logically speaking, the response is wrapped by the token, and retrieving it requires an unwrap operation against this token. @@ -132,7 +132,7 @@ If a client requests wrapping: 5. The new response is returned to the caller Note that policies can control minimum/maximum wrapping TTLs; see the [policies -concepts page](https://www.vaultproject.io/docs/concepts/policies.html) for +concepts page](/docs/concepts/policies) for more information. ## Response-Wrapping Token Validation diff --git a/website/pages/docs/concepts/seal.mdx b/website/pages/docs/concepts/seal.mdx index 768665073..9000271f4 100644 --- a/website/pages/docs/concepts/seal.mdx +++ b/website/pages/docs/concepts/seal.mdx @@ -59,7 +59,7 @@ Once a Vault is unsealed, it remains unsealed until one of two things happens: difficult. Automated tools can easily install, configure, and start Vault, but unsealing it is a very manual process. We have plans in the future to make it easier. For the time being, the best method is to manually unseal -multiple Vault servers in [HA mode](/docs/concepts/ha.html). Use a tool such +multiple Vault servers in [HA mode](/docs/concepts/ha). Use a tool such as Consul to make sure you only query Vault servers that are unsealed. ## Sealing @@ -87,7 +87,7 @@ During the initialization process, a set of Shamir keys are generated that are c Recovery Keys and are used for these operations. For a list of examples and supported providers, please see the -[seal documentation](/docs/configuration/seal/index.html). +[seal documentation](/docs/configuration/seal). ## Seal Migration @@ -99,7 +99,7 @@ which type of seal is being migrated from/to, may not work correctly. We plan to support this officially in a future release. To migrate from Shamir keys to Auto Unseal, take your server cluster offline and update -the [seal configuration](/docs/configuration/seal/index.html) with the appropriate seal +the [seal configuration](/docs/configuration/seal) with the appropriate seal configuration. Bring your server back up and leave the rest of the nodes offline if using multi-server mode, then run the unseal process with the `-migrate` flag and bring the rest of the cluster online. @@ -112,7 +112,7 @@ $ vault operator unseal -migrate ``` To migrate from Auto Unseal to Shamir keys, take your server cluster offline and update -the [seal configuration](/docs/configuration/seal/index.html) and add `disabled = "true"` +the [seal configuration](/docs/configuration/seal) and add `disabled = "true"` to the seal block. This allows the migration to use this information to decrypt the key but will not unseal Vault. When you bring your server back up, run the unseal process with the `-migrate` flag and use the Recovery Keys to perform the migration. All unseal diff --git a/website/pages/docs/concepts/tokens.mdx b/website/pages/docs/concepts/tokens.mdx index 55b19a950..9e6dce7dd 100644 --- a/website/pages/docs/concepts/tokens.mdx +++ b/website/pages/docs/concepts/tokens.mdx @@ -8,7 +8,7 @@ description: Tokens are a core auth method in Vault. Concepts and important feat # Tokens Tokens are the core method for _authentication_ within Vault. Tokens -can be used directly or [auth methods](/docs/concepts/auth.html) +can be used directly or [auth methods](/docs/concepts/auth) can be used to dynamically generate tokens based on external identities. If you've gone through the getting started guide, you probably noticed that @@ -16,14 +16,14 @@ If you've gone through the getting started guide, you probably noticed that initial "root token." This is the first method of authentication for Vault. It is also the only auth method that cannot be disabled. -As stated in the [authentication concepts](/docs/concepts/auth.html), +As stated in the [authentication concepts](/docs/concepts/auth), all external authentication mechanisms, such as GitHub, map down to dynamically created tokens. These tokens have all the same properties as a normal manually created token. Within Vault, tokens map to information. The most important information mapped to a token is a set of one or more attached -[policies](/docs/concepts/policies.html). These policies control what the token +[policies](/docs/concepts/policies). These policies control what the token holder is allowed to do within Vault. Other mapped information includes metadata that can be viewed and is added to the audit log, creation time, last renewal time, and more. @@ -46,7 +46,7 @@ their applicability to batch tokens is discussed later. Often in documentation or in help channels, the "token store" is referenced. This is the same as the [`token` authentication -backend](/docs/auth/token.html). This is a special +backend](/docs/auth/token). This is a special backend in that it is responsible for creating and storing tokens, and cannot be disabled. It is also the only auth method that has no login capability -- all actions require existing authenticated tokens. @@ -63,7 +63,7 @@ there are only three ways to create root tokens: expiration 2. By using another root token; a root token with an expiration cannot create a root token that never expires -3. By using `vault operator generate-root` ([example](/guides/operations/generate-root.html)) +3. By using `vault operator generate-root` ([example](/guides/operations/generate-root)) with the permission of a quorum of unseal key holders Root tokens are useful in development but should be extremely carefully guarded @@ -72,7 +72,7 @@ used for just enough initial setup (usually, setting up auth methods and policies necessary to allow administrators to acquire more limited tokens) or in emergencies, and are revoked immediately after they are no longer needed. If a new root token is needed, the `operator generate-root` command and associated -[API endpoint](/api/system/generate-root.html) can be used to generate one on-the-fly. +[API endpoint](/api/system/generate-root) can be used to generate one on-the-fly. It is also good security practice for there to be multiple eyes on a terminal whenever a root token is live. This way multiple people can verify as to the @@ -161,7 +161,7 @@ token's information is looked up. It is based on a combination of factors: 1. The system max TTL, which is 32 days but can be changed in Vault's configuration file. 2. The max TTL set on a mount using [mount - tuning](/api/system/mounts.html). This value + tuning](/api/system/mounts). This value is allowed to override the system max TTL -- it can be longer or shorter, and if set this value will be respected. 3. A value suggested by the auth method that issued the token. This diff --git a/website/pages/docs/configuration/entropy-augmentation/index.mdx b/website/pages/docs/configuration/entropy-augmentation/index.mdx index 0d85250eb..b5dca2c3a 100644 --- a/website/pages/docs/configuration/entropy-augmentation/index.mdx +++ b/website/pages/docs/configuration/entropy-augmentation/index.mdx @@ -11,8 +11,8 @@ description: >- Entropy augmentation enables Vault to sample entropy from external cryptographic modules. Sourcing external entropy is done by configuring a supported [Seal](/docs/configuration/seal) type which - include: [PKCS11 seal](/docs/configuration/seal/pkcs11), [AWS KMS](/docs/configuration/seal/awskms), and - [Vault Transit](/docs/configuration/seal/transit). +include: [PKCS11 seal](/docs/configuration/seal/pkcs11), [AWS KMS](/docs/configuration/seal/awskms), and +[Vault Transit](/docs/configuration/seal/transit). Vault Enterprises's external entropy support is activated by the presence of an `entropy "seal"` block in Vault's configuration file. diff --git a/website/pages/docs/configuration/index.mdx b/website/pages/docs/configuration/index.mdx index 4b52ddf0a..bd04b37e9 100644 --- a/website/pages/docs/configuration/index.mdx +++ b/website/pages/docs/configuration/index.mdx @@ -88,7 +88,7 @@ to specify where the configuration is. sudo setcap cap_ipc_lock=+ep $(readlink -f $(which vault)) ``` - Note: Since each plugin runs as a separate process, you need to do the same for each plugin in your [plugins directory](https://www.vaultproject.io/docs/internals/plugins.html#plugin-directory). + Note: Since each plugin runs as a separate process, you need to do the same for each plugin in your [plugins directory](/docs/internals/plugins#plugin-directory). If you use a Linux distribution with a modern version of systemd, you can add the following directive to the "[Service]" configuration section: @@ -134,7 +134,7 @@ to specify where the configuration is. listeners (address + port) at the `/ui` path. Browsers accessing the standard Vault API address will automatically redirect there. This can also be provided via the environment variable `VAULT_UI`. For more information, please see the - [ui configuration documentation](/docs/configuration/ui/index.html). + [ui configuration documentation](/docs/configuration/ui). - `pid_file` `(string: "")` - Path to the file in which the Vault server's Process ID (PID) should be stored. @@ -172,10 +172,10 @@ The following parameters are only used with Vault Enterprise node will disable this feature when this node is Active or Standby. It's recommended to sync this setting across all nodes in the cluster. -[storage-backend]: /docs/configuration/storage/index.html -[listener]: /docs/configuration/listener/index.html -[seal]: /docs/configuration/seal/index.html -[sealwrap]: /docs/enterprise/sealwrap/index.html -[telemetry]: /docs/configuration/telemetry.html -[high-availability]: /docs/concepts/ha.html -[plugins]: /docs/plugin/index.html +[storage-backend]: /docs/configuration/storage +[listener]: /docs/configuration/listener +[seal]: /docs/configuration/seal +[sealwrap]: /docs/enterprise/sealwrap +[telemetry]: /docs/configuration/telemetry +[high-availability]: /docs/concepts/ha +[plugins]: /docs/plugin diff --git a/website/pages/docs/configuration/listener/index.mdx b/website/pages/docs/configuration/listener/index.mdx index 5aa12e75c..97d9f517b 100644 --- a/website/pages/docs/configuration/listener/index.mdx +++ b/website/pages/docs/configuration/listener/index.mdx @@ -12,4 +12,4 @@ description: |- The `listener` stanza configures the addresses and ports on which Vault will respond to requests. At this time, there is only one listener - [TCP][tcp]. -[tcp]: /docs/configuration/listener/tcp.html +[tcp]: /docs/configuration/listener/tcp diff --git a/website/pages/docs/configuration/listener/tcp.mdx b/website/pages/docs/configuration/listener/tcp.mdx index e68c183c8..86af4e4fe 100644 --- a/website/pages/docs/configuration/listener/tcp.mdx +++ b/website/pages/docs/configuration/listener/tcp.mdx @@ -189,5 +189,5 @@ listener "tcp" { ``` [golang-tls]: https://golang.org/src/crypto/tls/cipher_suites.go -[api-addr]: /docs/configuration/index.html#api_addr -[cluster-addr]: /docs/configuration/index.html#cluster_addr +[api-addr]: /docs/configuration#api_addr +[cluster-addr]: /docs/configuration#cluster_addr diff --git a/website/pages/docs/configuration/seal/index.mdx b/website/pages/docs/configuration/seal/index.mdx index 561a1631c..5749876d8 100644 --- a/website/pages/docs/configuration/seal/index.mdx +++ b/website/pages/docs/configuration/seal/index.mdx @@ -44,4 +44,4 @@ seal "pkcs11" { For configuration options which also read an environment variable, the environment variable will take precedence over values in the configuration file. -[sealwrap]: /docs/enterprise/sealwrap/index.html +[sealwrap]: /docs/enterprise/sealwrap diff --git a/website/pages/docs/configuration/seal/ocikms.mdx b/website/pages/docs/configuration/seal/ocikms.mdx index da034e837..6af9ba9f8 100644 --- a/website/pages/docs/configuration/seal/ocikms.mdx +++ b/website/pages/docs/configuration/seal/ocikms.mdx @@ -53,7 +53,7 @@ These parameters apply to the `seal` stanza in the Vault configuration file: Authentication-related values must be provided, either as environment variables or as configuration parameters. -If you want to use Instance Principal, add section configuration below and add further configuration settings as detailed at https://www.vaultproject.io/docs/configuration/. +If you want to use Instance Principal, add section configuration below and add further configuration settings as detailed in the [configuration docs](/docs/configuration/). ```hcl seal "ocikms" { diff --git a/website/pages/docs/configuration/seal/transit.mdx b/website/pages/docs/configuration/seal/transit.mdx index bd46419ff..753a7c4e9 100644 --- a/website/pages/docs/configuration/seal/transit.mdx +++ b/website/pages/docs/configuration/seal/transit.mdx @@ -113,7 +113,7 @@ path "/decrypt/" { ## Key Rotation This seal supports key rotation using the Transit Secret Engine's key rotation endpoints. See -[doc](/api/secret/transit/index.html#rotate-key). Old keys must not be disabled or deleted and are +[doc](/api/secret/transit#rotate-key). Old keys must not be disabled or deleted and are used to decrypt older data. ## Learn diff --git a/website/pages/docs/configuration/service-registration/index.mdx b/website/pages/docs/configuration/service-registration/index.mdx index 5e2a38a5c..c1b8bf09b 100644 --- a/website/pages/docs/configuration/service-registration/index.mdx +++ b/website/pages/docs/configuration/service-registration/index.mdx @@ -61,6 +61,6 @@ file. [consul]: https://www.consul.io/ [consul-discovery]: https://www.consul.io/discovery.html -[storage-backend]: /docs/configuration/storage/index.html -[consul-backend]: /docs/configuration/storage/consul.html -[raft-backend]: /docs/configuration/storage/raft.html +[storage-backend]: /docs/configuration/storage +[consul-backend]: /docs/configuration/storage/consul +[raft-backend]: /docs/configuration/storage/raft diff --git a/website/pages/docs/configuration/storage/consul.mdx b/website/pages/docs/configuration/storage/consul.mdx index 65686464a..5c77f99a1 100644 --- a/website/pages/docs/configuration/storage/consul.mdx +++ b/website/pages/docs/configuration/storage/consul.mdx @@ -273,6 +273,6 @@ storage "consul" { [consul-translate-wan-addrs]: https://www.consul.io/docs/agent/options.html#translate_wan_addrs 'Consul Configuration' [consul-token]: https://www.consul.io/docs/commands/acl/set-agent-token.html#token-lt-value-gt- 'Consul Token' [consul-session-ttl]: https://www.consul.io/docs/agent/options.html#session_ttl_min 'Consul Configuration' -[api-addr]: /docs/configuration/index.html#api_addr -[cluster-addr]: /docs/configuration/index.html#cluster_addr -[listener-example]: /docs/configuration/listener/tcp.html#listening-on-multiple-interfaces +[api-addr]: /docs/configuration#api_addr +[cluster-addr]: /docs/configuration#cluster_addr +[listener-example]: /docs/configuration/listener/tcp#listening-on-multiple-interfaces diff --git a/website/pages/docs/configuration/telemetry.mdx b/website/pages/docs/configuration/telemetry.mdx index 172c8894d..939bc4845 100644 --- a/website/pages/docs/configuration/telemetry.mdx +++ b/website/pages/docs/configuration/telemetry.mdx @@ -11,7 +11,7 @@ description: |- The `telemetry` stanza specifies various configurations for Vault to publish metrics to upstream systems. Available Vault metrics can be found in the -[Telemetry internals documentation](/docs/internals/telemetry.html). +[Telemetry internals documentation](/docs/internals/telemetry). ```hcl telemetry { diff --git a/website/pages/docs/configuration/ui/index.mdx b/website/pages/docs/configuration/ui/index.mdx index b6125f46d..cbfd58d54 100644 --- a/website/pages/docs/configuration/ui/index.mdx +++ b/website/pages/docs/configuration/ui/index.mdx @@ -31,7 +31,7 @@ listener "tcp" { ``` For more information, please see the -[Vault configuration options](/docs/configuration/index.html). +[Vault configuration options](/docs/configuration). ## Accessing the Vault UI diff --git a/website/pages/docs/enterprise/control-groups/index.mdx b/website/pages/docs/enterprise/control-groups/index.mdx index fe1dcf016..d401b7275 100644 --- a/website/pages/docs/enterprise/control-groups/index.mdx +++ b/website/pages/docs/enterprise/control-groups/index.mdx @@ -77,7 +77,7 @@ satisfied. ## Control Groups in Sentinel Control Groups are also supported in Sentinel policies using the `controlgroup` -import. See [Sentinel Documentation](/docs/enterprise/sentinel/index.html) for more +import. See [Sentinel Documentation](/docs/enterprise/sentinel) for more details on available properties. ### Sample Sentinel Policy @@ -118,4 +118,4 @@ guide for a step-by-step tutorial. ## API Control Groups can be managed over the HTTP API. Please see -[Control Groups API](/api/system/control-group.html) for more details. +[Control Groups API](/api/system/control-group) for more details. diff --git a/website/pages/docs/enterprise/hsm/behavior.mdx b/website/pages/docs/enterprise/hsm/behavior.mdx index 64a169672..dc13445a5 100644 --- a/website/pages/docs/enterprise/hsm/behavior.mdx +++ b/website/pages/docs/enterprise/hsm/behavior.mdx @@ -16,7 +16,7 @@ effect when using Vault with an HSM. Normally, Vault uses a single set of unseal keys to perform both decryption of the cryptographic barrier and to authorize recovery operations, such as the -[`generate-root`](/api/system/generate-root.html) +[`generate-root`](/api/system/generate-root) functionality. When using an HSM, because the HSM automatically unseals the barrier but @@ -29,7 +29,7 @@ Vault usually generates a master key and splits it using [Shamir's Secret Sharing](https://en.wikipedia.org/wiki/Shamir%27s_Secret_Sharing) to prevent a single operator from being able to modify and unseal Vault (see more information about Vault's security model -[here](/docs/internals/security.html)). +[here](/docs/internals/security)). When using an HSM, Vault instead stores the master key, encrypted by the HSM, into its internal storage. As a result, during an `init` command, the number of @@ -56,7 +56,7 @@ keys for this purpose, rather than the barrier unseal keys, is automatic. When initializing, the split is performed according to the following CLI flags and their API equivalents in the -[/sys/init](/api/system/init.html) endpoint: +[/sys/init](/api/system/init) endpoint: - `recovery-shares`: The number of shares into which to split the recovery key. This value is equivalent to the `recovery_shares` value in the API @@ -71,7 +71,7 @@ and their API equivalents in the Additionally, Vault will refuse to initialize if the option has not been set to generate a key but no key is found. See -[Configuration](/docs/configuration/seal/pkcs11.html) for more details. +[Configuration](/docs/configuration/seal/pkcs11) for more details. ### Rekeying @@ -91,6 +91,6 @@ this is performed by using the `-target=recovery` flag to `vault operator rekey` Via the API, the rekey operation is performed with the same parameters as the [normal `/sys/rekey` -endpoint](/api/system/rekey.html); however, the +endpoint](/api/system/rekey); however, the API prefix for this operation is at `/sys/rekey-recovery-key` rather than `/sys/rekey`. diff --git a/website/pages/docs/enterprise/hsm/index.mdx b/website/pages/docs/enterprise/hsm/index.mdx index 7a651cd0e..4a4924fe7 100644 --- a/website/pages/docs/enterprise/hsm/index.mdx +++ b/website/pages/docs/enterprise/hsm/index.mdx @@ -10,16 +10,16 @@ description: >- # Vault Enterprise HSM Support HSM support is a feature of [Vault -Enterprise](https://www.hashicorp.com/vault.html) that takes advantage of HSMs +Enterprise](https://www.hashicorp.com/vault) that takes advantage of HSMs to provide three pieces of special functionality: - Master Key Wrapping: Vault protects its master key by transiting it through the HSM for encryption rather than splitting into key shares - Automatic Unsealing: Vault stores its HSM-wrapped master key in storage, allowing for automatic unsealing -- [Seal Wrapping](/docs/enterprise/sealwrap/index.html) to provide FIPS +- [Seal Wrapping](/docs/enterprise/sealwrap) to provide FIPS KeyStorage-conforming functionality for Critical Security Parameters -- [Entropy Augmentation](/docs/enterprise/entropy-augmentation/index.html) to +- [Entropy Augmentation](/docs/enterprise/entropy-augmentation) to allow Vault to sample entropy from an external cryptographic module. HSM support is available for devices that support PKCS#11 version 2.20+ @@ -34,11 +34,11 @@ within PKCS#11 vary depending on HSM model and configuration. Consult your HSM's documentation for more details. Some parts of Vault work differently when using an HSM. Please see the -[Behavioral Changes](/docs/enterprise/hsm/behavior.html) page for +[Behavioral Changes](/docs/enterprise/hsm/behavior) page for important information on these differences. -The [Configuration](/docs/configuration/seal/pkcs11.html) page contains +The [Configuration](/docs/configuration/seal/pkcs11) page contains configuration information. -Finally, the [Security](/docs/enterprise/hsm/security.html) page contains +Finally, the [Security](/docs/enterprise/hsm/security) page contains information about deploying Vault's HSM support in a secure fashion. diff --git a/website/pages/docs/enterprise/hsm/security.mdx b/website/pages/docs/enterprise/hsm/security.mdx index f90088ff0..225bc7367 100644 --- a/website/pages/docs/enterprise/hsm/security.mdx +++ b/website/pages/docs/enterprise/hsm/security.mdx @@ -21,7 +21,7 @@ stored in Vault's configuration file, read access to the file should be tightly controlled to appropriate users. (Vault's configuration file should always have tight write controls.) Rather than storing these values into Vault's configuration file, they can also be supplied via the environment; see the -[Configuration](/docs/configuration/seal/pkcs11.html) page for more details. +[Configuration](/docs/configuration/seal/pkcs11) page for more details. The attack surface of stolen PKCS#11 credentials depends highly on the individual HSM, but generally speaking, it should be assumed that if an diff --git a/website/pages/docs/enterprise/index.mdx b/website/pages/docs/enterprise/index.mdx index 935ae3057..42c6e0abe 100644 --- a/website/pages/docs/enterprise/index.mdx +++ b/website/pages/docs/enterprise/index.mdx @@ -13,4 +13,4 @@ Vault Enterprise includes a number of features that may be useful in specific workflows. Please use the sidebar navigation on the left to choose a specific topic. -These features are part of [Vault Enterprise](https://www.hashicorp.com/vault.html?utm_source=oss&utm_medium=docs&utm_campaign=vault&_ga=1.201793489.1956619674.1489356624). +These features are part of [Vault Enterprise](https://www.hashicorp.com/vault?utm_source=oss&utm_medium=docs&utm_campaign=vault&_ga=1.201793489.1956619674.1489356624). diff --git a/website/pages/docs/enterprise/mfa/index.mdx b/website/pages/docs/enterprise/mfa/index.mdx index 534a7a191..b94a89d13 100644 --- a/website/pages/docs/enterprise/mfa/index.mdx +++ b/website/pages/docs/enterprise/mfa/index.mdx @@ -40,7 +40,7 @@ MFA in Vault can be of the following types. ## Configuring MFA Methods MFA methods are globally managed within the `System Backend` using the HTTP API. -Please see [MFA API](/api/system/mfa.html) for details on how to configure an MFA +Please see [MFA API](/api/system/mfa) for details on how to configure an MFA method. ## MFA Methods In Policies @@ -67,7 +67,7 @@ referenced from ACL and Sentinel policies in any namespace via the method name and can be tied to a mount accessor in any namespace. When using [Sentinel -EGPs](/docs/enterprise/sentinel/index.html#endpoint-governing-policies-egps-), +EGPs](/docs/enterprise/sentinel#endpoint-governing-policies-egps-), any MFA configuration specified must be satisfied by all requests affected by the policy, which can be difficult if the configured paths spread across namespaces. One way to address this is to use a policy similar to the @@ -111,4 +111,4 @@ $ curl \ ### API -MFA can be managed entirely over the HTTP API. Please see [MFA API](/api/system/mfa.html) for more details. +MFA can be managed entirely over the HTTP API. Please see [MFA API](/api/system/mfa) for more details. diff --git a/website/pages/docs/enterprise/performance-standby/index.mdx b/website/pages/docs/enterprise/performance-standby/index.mdx index ff02d92a7..a22277968 100644 --- a/website/pages/docs/enterprise/performance-standby/index.mdx +++ b/website/pages/docs/enterprise/performance-standby/index.mdx @@ -10,7 +10,7 @@ description: Performance Standby Nodes - Vault Enterprise Vault supports a multi-server mode for high availability. This mode protects against outages by running multiple Vault servers. High availability mode is automatically enabled when using a data store that supports it. You can -learn more about HA mode on the [Concepts](/docs/concepts/ha.html) page. +learn more about HA mode on the [Concepts](/docs/concepts/ha) page. Vault Enterprise offers additional features that allow HA nodes to service read-only requests on the local standby node. Read-only requests are requests @@ -19,7 +19,7 @@ that do not modify Vault's storage. ## Server-to-Server Communication Performance Standbys require the request forwarding method described in the [HA -Server-to-Server](/docs/concepts/ha.html#server-to-server-communication) docs. +Server-to-Server](/docs/concepts/ha#server-to-server-communication) docs. A performance standby will connect to the active node over the existing request forwarding connection. If selected by the active node to be promoted to a @@ -52,7 +52,7 @@ based on consul configuration). Additionally, if you wish to point your load balancers at performance standby nodes, the `sys/health` endpoint can be used to determine if a node is a -performance standby. See the [sys/health API](/api/system/health.html) docs for +performance standby. See the [sys/health API](/api/system/health) docs for more info. ## Disabling Performance Standbys diff --git a/website/pages/docs/enterprise/replication/index.mdx b/website/pages/docs/enterprise/replication/index.mdx index ff1317be5..4b122f77a 100644 --- a/website/pages/docs/enterprise/replication/index.mdx +++ b/website/pages/docs/enterprise/replication/index.mdx @@ -75,14 +75,12 @@ They do not forward service read or write requests until they are elected and be | Mirrors the tokens and leases for applications and users interacting with the primary cluster | Yes | No. Secondaries keep track of their own tokens and leases. When the secondary is promoted, applications must reauthenticate and obtain new leases from the newly-promoted primary. | | Allows the secondary cluster to handle client requests | No | Yes | -For more information on the capabilities of performance and disaster recovery replication, see the Vault Replication [API Documentation](/api/system/replication.html). +For more information on the capabilities of performance and disaster recovery replication, see the Vault Replication [API Documentation](/api/system/replication). ## Internals Details on the internal design of the replication feature can be found in the -[replication -internals](/docs/internals/replication.html) -document. +[replication internals](/docs/internals/replication) document. ## Security Model @@ -147,5 +145,5 @@ Refer to the following tutorials replication setup and best practices: ## API The Vault replication component has a full HTTP API. Please see the -[Vault Replication API](/api/system/replication.html) for more +[Vault Replication API](/api/system/replication) for more details. diff --git a/website/pages/docs/enterprise/sealwrap/index.mdx b/website/pages/docs/enterprise/sealwrap/index.mdx index 56c775ef4..cae54c752 100644 --- a/website/pages/docs/enterprise/sealwrap/index.mdx +++ b/website/pages/docs/enterprise/sealwrap/index.mdx @@ -10,7 +10,7 @@ description: |- # Seal Wrap Vault Enterprise features a mechanism to wrap values with an extra layer of -encryption for supporting [seals](/docs/configuration/seal/index.html). This adds an +encryption for supporting [seals](/docs/configuration/seal). This adds an extra layer of protection and is useful in some compliance and regulatory environments, including FIPS 140-2 environments. @@ -107,4 +107,4 @@ certified FIPS 140-2 TLS (such as [stunnel](https://www.stunnel.org/index.html)) can be used for replication traffic if meeting KeyTransit requirements for replication is necessary. -[configuration]: /docs/configuration/index.html +[configuration]: /docs/configuration diff --git a/website/pages/docs/enterprise/sentinel/index.mdx b/website/pages/docs/enterprise/sentinel/index.mdx index f734d5041..5a0609f0d 100644 --- a/website/pages/docs/enterprise/sentinel/index.mdx +++ b/website/pages/docs/enterprise/sentinel/index.mdx @@ -18,7 +18,7 @@ the form of multiple types of policies and a fixed evaluation order. Vault's policy system has been expanded to support three types of policies: - `ACLs` - These are the [traditional Vault - policies](/docs/concepts/policies.html) and remain unchanged. + policies](/docs/concepts/policies) and remain unchanged. - `Role Governing Policies (RGPs)` - RGPs are Sentinel policies that are tied to particular tokens, Identity entities, or Identity groups. They have access @@ -34,7 +34,7 @@ to root token generation cannot support EGPs because it's already the mechanism of last resort if, for instance, all clients are locked out of Vault due to misconfigured EGPs. -Like with ACLs, [root tokens](/docs/concepts/tokens.html#root-tokens) tokens +Like with ACLs, [root tokens](/docs/concepts/tokens#root-tokens) tokens are not subject to Sentinel policy checks. Sentinel execution should be considered to be significantly slower than normal @@ -70,7 +70,7 @@ logged as warnings in Vault's server logs. ## MFA Sentinel policies support the [Identity-based MFA -system](/docs/enterprise/mfa/index.html) in Vault Enterprise. Within a single +system](/docs/enterprise/mfa) in Vault Enterprise. Within a single request, multiple checks of any named MFA method will only trigger authentication behavior for that method once, regardless of whether its validity is checked via ACLs, RGPs, or EGPs. @@ -88,7 +88,7 @@ able to glean from the original request alone. Sentinel policies can be configured via the `sys/policies/rgp/` and `sys/policies/egp/` endpoints; see [the -documentation](/api/system/policies.html) for more information. +documentation](/api/system/policies) for more information. Once set, RGPs can be assigned to Identity entities and groups or to tokens just like ACL policies. As a result, they cannot share names with ACL policies. @@ -104,9 +104,9 @@ effect on all requests. ## Properties and Examples -See the [Examples](/docs/enterprise/sentinel/examples.html) page for examples +See the [Examples](/docs/enterprise/sentinel/examples) page for examples of Sentinel in action, and the -[Properties](/docs/enterprise/sentinel/properties.html) page for detailed +[Properties](/docs/enterprise/sentinel/properties) page for detailed property documentation. ## Learn diff --git a/website/pages/docs/install/index.mdx b/website/pages/docs/install/index.mdx index 5b91332e1..27af44ee5 100644 --- a/website/pages/docs/install/index.mdx +++ b/website/pages/docs/install/index.mdx @@ -21,7 +21,7 @@ with the SHA256 sums that can be verified. ## Precompiled Binaries -To install the precompiled binary, [download](/downloads.html) the appropriate +To install the precompiled binary, [download](/downloads) the appropriate package for your system. Vault is currently packaged as a zip file. We do not have any near term plans to provide system packages. diff --git a/website/pages/docs/internals/plugins.mdx b/website/pages/docs/internals/plugins.mdx index 6984e2659..730a72925 100644 --- a/website/pages/docs/internals/plugins.mdx +++ b/website/pages/docs/internals/plugins.mdx @@ -42,7 +42,7 @@ when enabling it. Vault creates a mutually authenticated TLS connection for communication with the plugin's RPC server. While invoking the plugin process, Vault passes a [wrapping -token](https://www.vaultproject.io/docs/concepts/response-wrapping.html) to the +token](/docs/concepts/response-wrapping) to the plugin process' environment. This token is single use and has a short TTL. Once unwrapped, it provides the plugin with a uniquely generated TLS certificate and private key for it to use to talk to the original Vault process. @@ -65,7 +65,7 @@ plugin directory and the plugin catalog entry. ### Plugin Directory The plugin directory is a configuration option of Vault, and can be specified in -the [configuration file](https://www.vaultproject.io/docs/configuration/index.html). +the [configuration file](/docs/configuration). This setting specifies a directory in which all plugin binaries must live; _this value cannot be a symbolic link_. A plugin can not be added to Vault unless it exists in the plugin directory. There is no @@ -86,7 +86,7 @@ make sure the executable referenced in the command exists in the plugin directory. When added to the catalog the plugin is not automatically executed, it instead becomes visible to backends and can be executed by them. For more information on the plugin catalog please see the [Plugin Catalog API -docs](/api/system/plugins-catalog.html). +docs](/api/system/plugins-catalog). An example plugin submission looks like: @@ -103,7 +103,7 @@ When a backend wants to run a plugin, it first looks up the plugin, by name, in the catalog. It then checks the executable's SHA256 sum against the one configured in the plugin catalog. Finally Vault runs the command configured in the catalog, sending along the JWT formatted response wrapping token and mlock -settings (like Vault, plugins support [the use of mlock when available](https://www.vaultproject.io/docs/configuration/index.html#disable_mlock)). +settings (like Vault, plugins support [the use of mlock when available](/docs/configuration#disable_mlock)). # Plugin Development @@ -164,4 +164,4 @@ func main() { And that's basically it! You would just need to change `myPlugin` to your actual plugin. For more information on how to register and enable your plugin, check out the [Building Plugin Backends](https://learn.hashicorp.com/vault/developer/plugin-backends) tutorial. -[api_addr]: /docs/configuration/index.html#api_addr +[api_addr]: /docs/configuration#api_addr diff --git a/website/pages/docs/internals/rotation.mdx b/website/pages/docs/internals/rotation.mdx index 28150fe8a..7f42ccf71 100644 --- a/website/pages/docs/internals/rotation.mdx +++ b/website/pages/docs/internals/rotation.mdx @@ -10,7 +10,7 @@ description: Learn about the details of key rotation within Vault. Vault has multiple encryption keys that are used for various purposes. These keys support rotation so that they can be periodically changed or in response to a potential leak or compromise. It is useful to first understand the -[high-level architecture](/docs/internals/architecture.html) before learning about key rotation. +[high-level architecture](/docs/internals/architecture) before learning about key rotation. As a review, Vault starts in a _sealed_ state. Vault is unsealed by providing the unseal keys. By default, Vault uses a technique known as [Shamir's secret sharing algorithm](https://en.wikipedia.org/wiki/Shamir's_Secret_Sharing) diff --git a/website/pages/docs/internals/telemetry.mdx b/website/pages/docs/internals/telemetry.mdx index 933a0f9cd..0bb6178cf 100644 --- a/website/pages/docs/internals/telemetry.mdx +++ b/website/pages/docs/internals/telemetry.mdx @@ -176,7 +176,7 @@ These metrics relate to internal operations on Merkle Trees and Write Ahead Logs ## Replication Metrics -These metrics relate to [Vault Enterprise Replication](https://www.vaultproject.io/docs/enterprise/replication/index.html). The following metrics are not available in telemetry unless replication is in an unhealthy state: `replication.fetchRemoteKeys`, `replication.merkleDiff`, and `replication.merkleSync`. +These metrics relate to [Vault Enterprise Replication](/docs/enterprise/replication). The following metrics are not available in telemetry unless replication is in an unhealthy state: `replication.fetchRemoteKeys`, `replication.merkleDiff`, and `replication.merkleSync`. | Metric | Description | Unit | Type | | :------------------------------------------------------ | :----------------------------------------------------------------------------------------------------------------------------------------- | :-------------- | :------ | @@ -321,25 +321,25 @@ These metrics relate to the supported [storage backends][storage-backends]. | `vault.zookeeper.delete` | Duration of a DELETE operation against the [ZooKeeper storage backend][zookeeper-storage-backend] | ms | summary | | `vault.zookeeper.list` | Duration of a LIST operation against the [ZooKeeper storage backend][zookeeper-storage-backend] | ms | summary | -[secrets-engines]: /docs/secrets/index.html -[storage-backends]: /docs/configuration/storage/index.html -[telemetry-stanza]: /docs/configuration/telemetry.html -[cubbyhole-secrets-engine]: /docs/secrets/cubbyhole/index.html -[kv-secrets-engine]: /docs/secrets/kv/index.html -[ldap-auth-backend]: /docs/auth/ldap.html -[token-auth-backend]: /docs/auth/token.html -[azure-storage-backend]: /docs/configuration/storage/azure.html -[cassandra-storage-backend]: /docs/configuration/storage/cassandra.html -[cockroachdb-storage-backend]: /docs/configuration/storage/cockroachdb.html -[consul-storage-backend]: /docs/configuration/storage/consul.html -[couchdb-storage-backend]: /docs/configuration/storage/couchdb.html -[dynamodb-storage-backend]: /docs/configuration/storage/dynamodb.html -[etcd-storage-backend]: /docs/configuration/storage/etcd.html -[gcs-storage-backend]: /docs/configuration/storage/google-cloud-storage.html -[spanner-storage-backend]: /docs/configuration/storage/google-cloud-spanner.html -[mssql-storage-backend]: /docs/configuration/storage/mssql.html -[mysql-storage-backend]: /docs/configuration/storage/mysql.html -[postgresql-storage-backend]: /docs/configuration/storage/postgresql.html -[s3-storage-backend]: /docs/configuration/storage/s3.html -[swift-storage-backend]: /docs/configuration/storage/swift.html -[zookeeper-storage-backend]: /docs/configuration/storage/zookeeper.html +[secrets-engines]: /docs/secrets +[storage-backends]: /docs/configuration/storage +[telemetry-stanza]: /docs/configuration/telemetry +[cubbyhole-secrets-engine]: /docs/secrets/cubbyhole +[kv-secrets-engine]: /docs/secrets/kv +[ldap-auth-backend]: /docs/auth/ldap +[token-auth-backend]: /docs/auth/token +[azure-storage-backend]: /docs/configuration/storage/azure +[cassandra-storage-backend]: /docs/configuration/storage/cassandra +[cockroachdb-storage-backend]: /docs/configuration/storage/cockroachdb +[consul-storage-backend]: /docs/configuration/storage/consul +[couchdb-storage-backend]: /docs/configuration/storage/couchdb +[dynamodb-storage-backend]: /docs/configuration/storage/dynamodb +[etcd-storage-backend]: /docs/configuration/storage/etcd +[gcs-storage-backend]: /docs/configuration/storage/google-cloud-storage +[spanner-storage-backend]: /docs/configuration/storage/google-cloud-spanner +[mssql-storage-backend]: /docs/configuration/storage/mssql +[mysql-storage-backend]: /docs/configuration/storage/mysql +[postgresql-storage-backend]: /docs/configuration/storage/postgresql +[s3-storage-backend]: /docs/configuration/storage/s3 +[swift-storage-backend]: /docs/configuration/storage/swift +[zookeeper-storage-backend]: /docs/configuration/storage/zookeeper diff --git a/website/pages/docs/partnerships/index.mdx b/website/pages/docs/partnerships/index.mdx index 08aa43b44..adcbf80f1 100644 --- a/website/pages/docs/partnerships/index.mdx +++ b/website/pages/docs/partnerships/index.mdx @@ -24,11 +24,11 @@ Main Vault categories for partners to integrate with include: **Authentication Methods**: Authentication (or Auth) methods are components in Vault that perform authentication and are responsible for assigning identity along with a set of policies to a user. Vault supports multiple auth methods/identity models to better support your business use case. You can find more information about Vault Auth Methods [here](/docs/auth/). -**Runtime Integrations**: Plugin backends are components in Vault that can be implemented separately from Vault's built-in features. Runtime integrations are sometimes referred to a Direct Application Integration. These backends can be either authentication, secrets engines or other security features. You can find more information about Vault Direct Application Integration [here]("https://learn.hashicorp.com/vault/developer/sm-app-integration"). +**Runtime Integrations**: Plugin backends are components in Vault that can be implemented separately from Vault's built-in features. Runtime integrations are sometimes referred to a Direct Application Integration. These backends can be either authentication, secrets engines or other security features. You can find more information about Vault Direct Application Integration [here](https://learn.hashicorp.com/vault/developer/sm-app-integration). **Audit/Monitoring & Compliance**: Audit/Monitoring and Compliance are components in Vault that keep a detailed log of all requests and response to Vault. Because every operation with Vault is an API request/response, the audit log contains every authenticated interaction with Vault, including errors. Vault supports multiple audit devices to support your business use case. You can find more information about Vault Audit Devices [here](/docs/audit/). -HSM (Hardware Security Module) integrations provide an added level of security and compliance. The HSM communicates with Vault using the PKCS#11 protocol thereby resulting in the integration to primarily involve verification of the operation of the functionality. You can find more information about Vault HSM [here](/docs/enterprise/hsm/index.html). +HSM (Hardware Security Module) integrations provide an added level of security and compliance. The HSM communicates with Vault using the PKCS#11 protocol thereby resulting in the integration to primarily involve verification of the operation of the functionality. You can find more information about Vault HSM [here](/docs/enterprise/hsm). **Secrets Engines**: Secrets engine are components which store, generate, or encrypt data. Secrets engines are provided some set of data, that take some action on that data, and then return a result. Some secrets engines store and read data, like encrypted in-memory data structure, other secrets engines connect to other services. Examples of secrets engines include Identity modules of Cloud providers like AWS, Azure IAM models, Cloud (LDAP), database or key management. You can find more information about Vault Secrets Engines here. @@ -47,7 +47,7 @@ The Vault integration development process is divided into six steps. By followin ### 1. Engage -Please begin by providing some basic information about the integration that is being built via a simple [webform]("https://docs.google.com/forms/d/e/1FAIpQLSfQL1uj-mL59bd2EyCPI31LT9uvVT-xKyoHAb5FKIwWwwJ1qQ/viewform"). +Please begin by providing some basic information about the integration that is being built via a simple [webform](https://docs.google.com/forms/d/e/1FAIpQLSfQL1uj-mL59bd2EyCPI31LT9uvVT-xKyoHAb5FKIwWwwJ1qQ/viewform). This information is recorded and used by HashiCorp to track the integration through various stages. The information is also used to notify the integration developer of any overlapping work, perhaps coming from the community so you may better focus resources. @@ -59,48 +59,48 @@ While not mandatory, HashiCorp encourages vendors to sign and MNDA (Mutual Non-D In an effort to support our self-serve model we’ve included links to resources, documentation, examples and best practices to guide you through the Vault integration development and testing process. -- [Writing vendor extension guide]("https://learn.hashicorp.com/vault#operations-and-development") -- Sample development implemented by a [partner]("https://www.hashicorp.com/integrations/venafi/vault/") -- Example vendor extensions for reference: [Aqua]("https://www.hashicorp.com/integrations/aqua-security/vault/"), [Demisto]("https://www.demisto.com/integrations/?_sf_s=hashicorp") -- Contributing to Vault [guidelines]("https://github.com/hashicorp/vault/blob/master/CONTRIBUTING.md") -- [Vault Community Forum]("https://discuss.hashicorp.com/c/vault") -- [Vault's source code]("https://github.com/hashicorp/vault") +- [Writing vendor extension guide](https://learn.hashicorp.com/vault#operations-and-development) +- Sample development implemented by a [partner](https://www.hashicorp.com/integrations/venafi/vault/) +- Example vendor extensions for reference: [Aqua](https://www.hashicorp.com/integrations/aqua-security/vault/), [Demisto](https://www.demisto.com/integrations/?_sf_s=hashicorp) +- Contributing to Vault [guidelines](https://github.com/hashicorp/vault/blob/master/CONTRIBUTING.md) +- [Vault Community Forum](https://discuss.hashicorp.com/c/vault) +- [Vault's source code](https://github.com/hashicorp/vault) We encourage vendors to closely follow the above guidance. Adopting the same structure and coding patterns helps expedite the review and release cycles. ### 3. Develop and Test -Vault requires all code-level integrations to be written in the [Go]("https://golang.org/") programming language and contain an [MPL-2.0]("https://en.wikipedia.org/wiki/Mozilla_Public_License") open source license. The only knowledge necessary to write a plugin is basic command-line skills and knowledge of the Go programming language. When writing in Go-Language, HashiCorp has found the integration development process to be straightforward and simple when vendors pay close attention and follow the resources and by adopting the same structure and coding patterns helps expedite the review and release cycles. Please remember that all integration major steps should contain acceptance testing and the appropriate documentation. +Vault requires all code-level integrations to be written in the [Go](https://golang.org/) programming language and contain an [MPL-2.0](https://en.wikipedia.org/wiki/Mozilla_Public_License) open source license. The only knowledge necessary to write a plugin is basic command-line skills and knowledge of the Go programming language. When writing in Go-Language, HashiCorp has found the integration development process to be straightforward and simple when vendors pay close attention and follow the resources and by adopting the same structure and coding patterns helps expedite the review and release cycles. Please remember that all integration major steps should contain acceptance testing and the appropriate documentation. Auth Methods -- [Auth Methods documentation](/docs/auth/index.html) -- [Example of how to build, install, and maintain auth method plugins plugin]("https://www.hashicorp.com/blog/building-a-vault-secure-plugin") -- [Sample plugin code]("https://github.com/hashicorp/vault-auth-plugin-example") +- [Auth Methods documentation](/docs/auth) +- [Example of how to build, install, and maintain auth method plugins plugin](https://www.hashicorp.com/blog/building-a-vault-secure-plugin) +- [Sample plugin code](https://github.com/hashicorp/vault-auth-plugin-example) Runtime Integration -- [Plugins documentation](/docs/internals/plugins.html) -- [Guide to building Vault plugin backends]("https://www.vaultproject.io/guides/operations/plugin-backends.html") -- [Vault Direct Application Integration]("https://learn.hashicorp.com/vault?track=getting-started#getting-started") +- [Plugins documentation](/docs/internals/plugins) +- [Guide to building Vault plugin backends](/guides/operations/plugin-backends) +- [Vault Direct Application Integration](https://learn.hashicorp.com/vault?track=getting-started#getting-started) Audit, Monitoring & Compliance Integration -- [HSM documentation](/docs/enterprise/hsm/index.html) -- [Configuration information](/docs/configuration/seal/pkcs11.html) -- [Audit devices documentation](/docs/audit/index.html) +- [HSM documentation](/docs/enterprise/hsm) +- [Configuration information](/docs/configuration/seal/pkcs11) +- [Audit devices documentation](/docs/audit) Secrets Engine Integration -- [Secret engine documentation](/docs/secrets/index.html) -- There is currently no empty sample secrets plugin; however, the [AliCloud Secrets Plugin]("https://github.com/hashicorp/vault-plugin-secrets-alicloud") was written recently and is fairly simple -- [Storage configuration documentation](/docs/configuration/storage/index.html) +- [Secret engine documentation](/docs/secrets) +- There is currently no empty sample secrets plugin; however, the [AliCloud Secrets Plugin](https://github.com/hashicorp/vault-plugin-secrets-alicloud) was written recently and is fairly simple +- [Storage configuration documentation](/docs/configuration/storage) ### 4. Review During the review process, HashiCorp will provide feedback on the newly developed integration. This is an important step to allow HashiCorp to review and verify your Vault integration. Please send the integration code and other relevant logs for verification to: vault-integration-dev@hashicorp.com. -For Auth, Secret and Storage plugins please submit a GitHub pull request (PR) against the [Vault project]("https://github.com/hashicorp/vault"). In some cases the vendor may need to provide HashiCorp with a permanent test account so that the integration can be verified on an ongoing basis. +For Auth, Secret and Storage plugins please submit a GitHub pull request (PR) against the [Vault project](https://github.com/hashicorp/vault). In some cases the vendor may need to provide HashiCorp with a permanent test account so that the integration can be verified on an ongoing basis. The review process can take a while to complete and may require some iterations through the code to address and problems identified by the HashiCorp team. diff --git a/website/pages/docs/platform/aws-mp/index.mdx b/website/pages/docs/platform/aws-mp/index.mdx index cf795957d..3ba2c4f08 100644 --- a/website/pages/docs/platform/aws-mp/index.mdx +++ b/website/pages/docs/platform/aws-mp/index.mdx @@ -22,4 +22,4 @@ The AWS Marketplace listings can be found below. The Vault AMIs listed in the AWS Marketplace are intended to serve as an easy starting point for a Vault installation. Vault AMIs are built on top of a minimal Ubuntu distribution and contain up to date packages for both Vault and the underlying operating system dependencies. -The Open Source Vault AMI is intended for development and test use cases. This listing will launch a non-HA Vault instance with Vault running and the Vault UI available. For production use cases, please see the [Architecture](/docs/platform/aws-mp/run.html#Architecture) section of this documentation. +The Open Source Vault AMI is intended for development and test use cases. This listing will launch a non-HA Vault instance with Vault running and the Vault UI available. For production use cases, please see the [Architecture](/docs/platform/aws-mp/run#Architecture) section of this documentation. diff --git a/website/pages/docs/platform/aws-mp/run.mdx b/website/pages/docs/platform/aws-mp/run.mdx index 4641a5b00..f7bfe67c7 100644 --- a/website/pages/docs/platform/aws-mp/run.mdx +++ b/website/pages/docs/platform/aws-mp/run.mdx @@ -11,11 +11,11 @@ description: >- ## Launching the Vault AMI -When Vault is first launched from an official Marketplace AMI, it will come up in an uninitialized state and must be initialized via the [API](https://www.vaultproject.io/api/system/init.html), [CLI](/docs/commands/operator/init.html), or UI. The Marketplace AMI listens on port 8200 by default. It is recommended to restrict ingress networking to the Vault instance as much as possible when initially deploying Vault (through EC2 security groups or otherwise) because anyone with network access to Vault will be able to initialize it. To learn more about the default listener configuration, or to make changes, please see the [Vault Deployment Guide](https://learn.hashicorp.com/vault/operations/ops-deployment-guide#listener-stanza). +When Vault is first launched from an official Marketplace AMI, it will come up in an uninitialized state and must be initialized via the [API](/api/system/init), [CLI](/docs/commands/operator/init), or UI. The Marketplace AMI listens on port 8200 by default. It is recommended to restrict ingress networking to the Vault instance as much as possible when initially deploying Vault (through EC2 security groups or otherwise) because anyone with network access to Vault will be able to initialize it. To learn more about the default listener configuration, or to make changes, please see the [Vault Deployment Guide](https://learn.hashicorp.com/vault/operations/ops-deployment-guide#listener-stanza). -Additionally on first launch, a new self-signed [certificate](/docs/configuration/listener/tcp.html#tls_cert_file) and [key](/docs/configuration/listener/tcp.html#tls_key_file) (unique to the EC2 instance) will be generated to secure Vault traffic using TLS. This is provided as a “more secure” (vs. unencrypted TCP traffic) temporary solution, but it is strongly recommended to replace these with your own certificate and key. Please note that when using a self-signed certificate, Vault clients will need to [skip](/docs/commands/#vault_skip_verify) the verification of Vault’s certificate, which voids Vault’s [security model](/docs/internals/security.html). +Additionally on first launch, a new self-signed [certificate](/docs/configuration/listener/tcp#tls_cert_file) and [key](/docs/configuration/listener/tcp#tls_key_file) (unique to the EC2 instance) will be generated to secure Vault traffic using TLS. This is provided as a “more secure” (vs. unencrypted TCP traffic) temporary solution, but it is strongly recommended to replace these with your own certificate and key. Please note that when using a self-signed certificate, Vault clients will need to [skip](/docs/commands/#vault_skip_verify) the verification of Vault’s certificate, which voids Vault’s [security model](/docs/internals/security). -In order to begin using a newly launched Vault instance or cluster, it must be [unsealed](/docs/concepts/seal.html) first. HashiCorp generally recommends using the [AWS KMS Seal](/docs/configuration/seal/awskms.html) when running Vault on AWS. +In order to begin using a newly launched Vault instance or cluster, it must be [unsealed](/docs/concepts/seal) first. HashiCorp generally recommends using the [AWS KMS Seal](/docs/configuration/seal/awskms) when running Vault on AWS. ## Viewing the Vault UI @@ -25,11 +25,11 @@ The Vault UI is enabled by default. You can view the UI by navigating to `https: New Vault AMIs are added to the AWS Marketplace listing regularly and contain the latest versions of Vault and updated operating system packages. However, new AMIs are not built and tested to support in-place upgrades of your existing Vault installation. -To upgrade a Vault instance launched from an official AWS Marketplace AMI, please follow the normal upgrade instructions for a [non-HA installation](https://www.vaultproject.io/docs/upgrading/index.html#non-ha-installations). +To upgrade a Vault instance launched from an official AWS Marketplace AMI, please follow the normal upgrade instructions for a [non-HA installation](/docs/upgrading#non-ha-installations). # Architecture -HashiCorp’s AWS Marketplace offerings provide an easy way to deploy Vault in a single-instance configuration using the [Filesystem storage backend](/docs/configuration/storage/filesystem.html), but for production use, we recommend running Vault on AWS with the same [general architecture](/docs/internals/architecture.html) as running it anywhere else. While the Filesystem storage backend is officially supported by HashiCorp, it does not support High Availability. Because Vault data is stored on disk in this configuration, it is subject to the durability and availability of Amazon Elastic Block Store (EBS) and should be backed up accordingly. +HashiCorp’s AWS Marketplace offerings provide an easy way to deploy Vault in a single-instance configuration using the [Filesystem storage backend](/docs/configuration/storage/filesystem), but for production use, we recommend running Vault on AWS with the same [general architecture](/docs/internals/architecture) as running it anywhere else. While the Filesystem storage backend is officially supported by HashiCorp, it does not support High Availability. Because Vault data is stored on disk in this configuration, it is subject to the durability and availability of Amazon Elastic Block Store (EBS) and should be backed up accordingly. For additional guidance on best practices for running Vault in production, please refer to the [production hardening guide](https://learn.hashicorp.com/vault/day-one/production-hardening). diff --git a/website/pages/docs/platform/k8s/helm/configuration.mdx b/website/pages/docs/platform/k8s/helm/configuration.mdx index c5dbd0abf..0ea6d1f07 100644 --- a/website/pages/docs/platform/k8s/helm/configuration.mdx +++ b/website/pages/docs/platform/k8s/helm/configuration.mdx @@ -135,7 +135,7 @@ and consider if they're appropriate for your deployment. * `authDelegator` - Values that configure the Cluster Role Binding attached to the Vault service account. - - `enabled` (`boolean: true`) - When set to `true`, a Cluster Role Binding will be bound to the Vault service account. This Cluster Role Binding has the necessary privileges for Vault to use the [Kubernetes Auth Method](/docs/auth/kubernetes.html). + - `enabled` (`boolean: true`) - When set to `true`, a Cluster Role Binding will be bound to the Vault service account. This Cluster Role Binding has the necessary privileges for Vault to use the [Kubernetes Auth Method](/docs/auth/kubernetes). * `readinessProbe` - Values that configure the readiness probe for the Vault pods. @@ -363,7 +363,7 @@ and consider if they're appropriate for your deployment. Enables `standalone` mode for the Vault server. This mode uses the `file` storage backend and requires a volume for persistence (`dataStorage`). - `config` (`string: "{}"`) - - A raw string of extra HCL or JSON [configuration](https://www.vaultproject.io/docs/configuration/index.html) for Vault servers. + A raw string of extra HCL or JSON [configuration](/docs/configuration) for Vault servers. This will be saved as-is into a ConfigMap that is read by the Vault servers. This can be used to add additional configuration that isn't directly exposed by the chart. diff --git a/website/pages/docs/platform/k8s/helm/index.mdx b/website/pages/docs/platform/k8s/helm/index.mdx index 672bc0a56..9ab814ced 100644 --- a/website/pages/docs/platform/k8s/helm/index.mdx +++ b/website/pages/docs/platform/k8s/helm/index.mdx @@ -29,7 +29,7 @@ may still change significantly over time. Please always run Helm with of Vault. This provides a less complicated out-of-box experience for new users, but is not appropriate for a production setup. It is highly recommended to use a [properly secured Kubernetes cluster](https://kubernetes.io/docs/tasks/administer-cluster/securing-a-cluster/). -See the [architecture reference](/docs/platform/k8s/run.html#architecture) +See the [architecture reference](/docs/platform/k8s/run#architecture) for a Vault Helm production deployment checklist. ## Using the Helm Chart diff --git a/website/pages/docs/platform/k8s/helm/run.mdx b/website/pages/docs/platform/k8s/helm/run.mdx index e514fd7ad..b4c0e1d07 100644 --- a/website/pages/docs/platform/k8s/helm/run.mdx +++ b/website/pages/docs/platform/k8s/helm/run.mdx @@ -43,7 +43,7 @@ it is highly recommended that you of Vault. This provides a less complicated out-of-box experience for new users, but is not appropriate for a production setup. It is highly recommended to use a [properly secured Kubernetes cluster](https://kubernetes.io/docs/tasks/administer-cluster/securing-a-cluster/). -See the [architecture reference](/docs/platform/k8s/run.html#architecture) +See the [architecture reference](/docs/platform/k8s/run#architecture) for a production deployment checklist. ## How-To @@ -103,14 +103,14 @@ $ kubectl port-forward vault-0 8200:8200 ``` The UI can also be exposed via a Kubernetes Service. To do this, configure -the [`ui.service` chart values](/docs/platform/k8s/helm.html#v-ui). +the [`ui.service` chart values](/docs/platform/k8s/helm#v-ui). ### Upgrading Vault on Kubernetes To upgrade Vault on Kubernetes, we follow the same pattern as -[generally upgrading Vault](/docs/upgrading.html), except we can use +[generally upgrading Vault](/docs/upgrading), except we can use the Helm chart to update the Vault server Statefulset. It is important to understand -how to [generally upgrade Vault](/docs/upgrading.html) before reading this +how to [generally upgrade Vault](/docs/upgrading) before reading this section. The Vault Statefulset uses `OnDelete` update strategy. It is critical to use `OnDelete` instead @@ -241,7 +241,7 @@ helm install --name=vault \ #### Google KMS Auto Unseal The following example demonstrates configuring Vault Helm to use -[Google KMS for Auto Unseal](/docs/configuration/seal/gcpckms.html). +[Google KMS for Auto Unseal](/docs/configuration/seal/gcpckms). In order to authenticate and use KMS in Google Cloud, Vault Helm needs credentials. The `credentials.json` file will need to be mounted as a secret to the Vault container. @@ -307,7 +307,7 @@ server: #### Amazon EKS Auto Unseal The following example demonstrates configuring Vault Helm to use -[AWS EKS for Auto Unseal](/docs/configuration/seal/awskms.html). +[AWS EKS for Auto Unseal](/docs/configuration/seal/awskms). In order to authenticate and use EKS in AWS, Vault Helm needs credentials. The AWS access key ID and key will be mounted as secret environment variables in the Vault pods. @@ -368,7 +368,7 @@ server: ## Architecture We recommend running Vault on Kubernetes with the same -[general architecture](/docs/internals/architecture.html) +[general architecture](/docs/internals/architecture) as running it anywhere else. There are some benefits Kubernetes can provide that eases operating a Vault cluster and we document those below. The standard [production deployment guide](https://learn.hashicorp.com/vault/day-one/production-hardening) is still an @@ -380,14 +380,14 @@ _End-to-End TLS._ Vault should always be used with TLS in production. If intermediate load balancers or reverse proxies are used to front Vault, they should not terminate TLS. This way traffic is always encrypted in transit to Vault and minimizes risks introduced by intermediate layers. See the -[official documentation](/docs/platform/k8s/helm.html#standalone-server-with-tls) +[official documentation](/docs/platform/k8s/helm#standalone-server-with-tls) for example on configuring Vault Helm to use TLS. _Single Tenancy._ Vault should be the only main process running on a machine. This reduces the risk that another process running on the same machine is compromised and can interact with Vault. This can be accomplished by using Vault Helm's `affinity` configurable. See the -[official documentation](/docs/platform/k8s/helm.html#highly-available-vault-cluster-with-consul) +[official documentation](/docs/platform/k8s/helm#highly-available-vault-cluster-with-consul) for example on configuring Vault Helm to use affinity rules. _Enable Auditing._ Vault supports several auditing backends. Enabling auditing @@ -396,7 +396,7 @@ trail in the case of misuse or compromise. Audit logs securely hash any sensitiv data, but access should still be restricted to prevent any unintended disclosures. Vault Helm includes a configurable `auditStorage` option that will provision a persistent volume to store audit logs. See the -[official documentation](/docs/platform/k8s/helm.html#standalone-server-with-audit-storage) +[official documentation](/docs/platform/k8s/helm#standalone-server-with-audit-storage) for an example on configuring Vault Helm to use auditing. _Immutable Upgrades._ Vault relies on an external storage backend for persistence, @@ -405,7 +405,7 @@ When upgrading to new versions, new servers with the upgraded version of Vault are brought online. They are attached to the same shared storage backend and unsealed. Then the old servers are destroyed. This reduces the need for remote access and upgrade orchestration which may introduce security gaps. See the -[upgrade section](/docs/platform/k8s/run.html#how-to) for instructions +[upgrade section](/docs/platform/k8s/run#how-to) for instructions on upgrading Vault on Kubernetes. _Upgrade Frequently._ Vault is actively developed, and updating frequently is diff --git a/website/pages/docs/platform/k8s/index.mdx b/website/pages/docs/platform/k8s/index.mdx index 4a67d0452..9b9e1ffa0 100644 --- a/website/pages/docs/platform/k8s/index.mdx +++ b/website/pages/docs/platform/k8s/index.mdx @@ -25,7 +25,7 @@ Kubernetes can access and store secrets from Vault using a number of different [secret engines](/docs/secrets) and [authentication methods](/docs/auth). **Running a Highly Available Vault Service:** By using pod affinities, highly available -backend storage (such as Consul) and [auto-unseal](/docs/concepts/seal.html#auto-unseal), +backend storage (such as Consul) and [auto-unseal](/docs/concepts/seal#auto-unseal), Vault can become a highly available service in Kubernetes. **Encryption as a Service:** Applications using the Vault service running in Kubernetes diff --git a/website/pages/docs/platform/k8s/injector/examples.mdx b/website/pages/docs/platform/k8s/injector/examples.mdx index 02624f74a..af288b6cb 100644 --- a/website/pages/docs/platform/k8s/injector/examples.mdx +++ b/website/pages/docs/platform/k8s/injector/examples.mdx @@ -25,7 +25,7 @@ should be satisfied: - the service account should be bound to a Vault role with a policy enabling access to desired secrets. For more information on configuring the Vault Kubernetes auth method, -[see the official documentation](/docs/auth/kubernetes.html#configuration). +[see the official documentation](/docs/auth/kubernetes#configuration). ## Debugging @@ -129,7 +129,7 @@ spec: The following example creates a deployment that mounts a Kubernetes ConfigMap containing Vault Agent configuration files. For a complete list of the Vault -Agent configuration settings, [see the Agent documentation](/docs/agent/template/index.html#vault-agent-templates). +Agent configuration settings, [see the Agent documentation](/docs/agent/template#vault-agent-templates). ```yaml --- diff --git a/website/pages/docs/platform/k8s/injector/index.mdx b/website/pages/docs/platform/k8s/injector/index.mdx index 15769fe9c..3fce9b1c1 100644 --- a/website/pages/docs/platform/k8s/injector/index.mdx +++ b/website/pages/docs/platform/k8s/injector/index.mdx @@ -11,7 +11,7 @@ description: >- The Vault Agent Injector alters pod specifications to include Vault Agent containers that render Vault secrets to a shared memory volume using -[Vault Agent Templates](/docs/agent/template/index.html). +[Vault Agent Templates](/docs/agent/template). By rendering secrets to a shared volume, containers within the pod can consume Vault secrets without being Vault aware. @@ -180,7 +180,7 @@ The configuration map must contain either one or both of the following files: - `config-init.hcl` used by the init container. This must have `exit_after_auth` set to `true`. - `config.hcl` used by the sidecar container. This must have `exit_after_auth` set to `false`. -An example of mounting a Vault Agent configmap [can be found here](/docs/platform/k8s/injector/examples.html#configmap-example). +An example of mounting a Vault Agent configmap [can be found here](/docs/platform/k8s/injector/examples#configmap-example). ## Annotations diff --git a/website/pages/docs/platform/k8s/injector/installation.mdx b/website/pages/docs/platform/k8s/injector/installation.mdx index 9a709ab3b..7c41429e8 100644 --- a/website/pages/docs/platform/k8s/injector/installation.mdx +++ b/website/pages/docs/platform/k8s/injector/installation.mdx @@ -13,7 +13,7 @@ Kubernetes. ~> The Vault Agent Injector requires Vault 1.3.1. To install the Vault Agent injector, enable the injection feature using -[Helm values](/docs/platform/k8s/helm/configuration.html) and +[Helm values](/docs/platform/k8s/helm/configuration) and upgrade the installation using `helm upgrade` for existing installs or `helm install` for a fresh install. @@ -51,7 +51,7 @@ The following is required to configure TLS manually: - Server certificate/key - Base64 PEM encoded Certificate Authority bundle -For more information on configuring manual TLS, see the [Vault Helm cert values](/docs/platform/k8s/helm/configuration.html#certs). +For more information on configuring manual TLS, see the [Vault Helm cert values](/docs/platform/k8s/helm/configuration#certs). ## Namespace Selector @@ -60,4 +60,4 @@ the system namespaces `kube-system` and `kube-public`. To limit what namespaces the injector can work in a namespace selector can be defined to match labels attached to namespaces. -For more information on configuring namespace selection, see the [Vault Helm namespaceSelector value](/docs/platform/k8s/helm/configuration.html#namespaceselector). +For more information on configuring namespace selection, see the [Vault Helm namespaceSelector value](/docs/platform/k8s/helm/configuration#namespaceselector). diff --git a/website/pages/docs/plugin/index.mdx b/website/pages/docs/plugin/index.mdx index 400847f78..8045dc3ae 100644 --- a/website/pages/docs/plugin/index.mdx +++ b/website/pages/docs/plugin/index.mdx @@ -18,12 +18,12 @@ has HA enabled and supports automatic host address detection (e.g. Consul), Vault will automatically attempt to determine the `api_addr` as well. Detailed information regarding the plugin system can be found in the -[internals documentation](https://www.vaultproject.io/docs/internals/plugins.html). +[internals documentation](/docs/internals/plugins). # Enabling/Disabling Plugin Backends Before a plugin backend can be mounted, it needs to be registered via the -[plugin catalog](https://www.vaultproject.io/docs/internals/plugins.html#plugin-catalog). After +[plugin catalog](/docs/internals/plugins#plugin-catalog). After the plugin is registered, it can be mounted by specifying the registered plugin name: ```text @@ -51,5 +51,5 @@ $ vault secrets disable my-secrets Upgrade instructions can be found in the [Upgrading Plugins - Guides][upgrading_plugins] page. -[api_addr]: /docs/configuration/index.html#api_addr -[upgrading_plugins]: /docs/upgrading/plugins.html +[api_addr]: /docs/configuration#api_addr +[upgrading_plugins]: /docs/upgrading/plugins diff --git a/website/pages/docs/secrets/ad/index.mdx b/website/pages/docs/secrets/ad/index.mdx index 1876d485e..111098cc0 100644 --- a/website/pages/docs/secrets/ad/index.mdx +++ b/website/pages/docs/secrets/ad/index.mdx @@ -19,7 +19,7 @@ This is designed for a high-load environment where many instances may be accessi a shared password simultaneously. With a simple set up and a simple creds API, it doesn't require instances to be manually registered in advance to gain access. As long as access has been granted to the creds path via a method like -[AppRole](https://www.vaultproject.io/api/auth/approle/index.html), they're available. Passwords are +[AppRole](/api/auth/approle), they're available. Passwords are lazily rotated based on preset TTLs and can have a length configured to meet your needs. The second feature (service account check-out) is where a library of service accounts can @@ -115,7 +115,7 @@ management tool. ``` 4. Grant "my-application" access to its creds at `ad/creds/my-application` using an - auth method like [AppRole](https://www.vaultproject.io/api/auth/approle/index.html). + auth method like [AppRole](/api/auth/approle). ### FAQ @@ -343,5 +343,5 @@ for a step-by-step tutorial. ## API The Active Directory secrets engine has a full HTTP API. Please see the -[Active Directory secrets engine API](/api/secret/ad/index.html) for more +[Active Directory secrets engine API](/api/secret/ad) for more details. diff --git a/website/pages/docs/secrets/alicloud/index.mdx b/website/pages/docs/secrets/alicloud/index.mdx index ea13ac514..f5d34157d 100644 --- a/website/pages/docs/secrets/alicloud/index.mdx +++ b/website/pages/docs/secrets/alicloud/index.mdx @@ -208,5 +208,5 @@ the proper permission, it can generate credentials. ## API The AliCloud secrets engine has a full HTTP API. Please see the -[AliCloud secrets engine API](/api/secret/alicloud/index.html) for more +[AliCloud secrets engine API](/api/secret/alicloud) for more details. diff --git a/website/pages/docs/secrets/aws/index.mdx b/website/pages/docs/secrets/aws/index.mdx index 50cebcc64..65bb93504 100644 --- a/website/pages/docs/secrets/aws/index.mdx +++ b/website/pages/docs/secrets/aws/index.mdx @@ -453,5 +453,5 @@ errors for exceeding the AWS limit of 32 characters on STS token names. ## API The AWS secrets engine has a full HTTP API. Please see the -[AWS secrets engine API](/api/secret/aws/index.html) for more +[AWS secrets engine API](/api/secret/aws) for more details. diff --git a/website/pages/docs/secrets/azure/index.mdx b/website/pages/docs/secrets/azure/index.mdx index 08fb6b925..891522c4f 100644 --- a/website/pages/docs/secrets/azure/index.mdx +++ b/website/pages/docs/secrets/azure/index.mdx @@ -256,6 +256,6 @@ for a step-by-step tutorial. The Azure secrets engine has a full HTTP API. Please see the [Azure secrets engine API docs][api] for more details. -[api]: /api/secret/azure/index.html -[config]: /api/secret/azure/index.html#configure +[api]: /api/secret/azure +[config]: /api/secret/azure#configure [repo]: https://github.com/hashicorp/vault-plugin-secrets-azure diff --git a/website/pages/docs/secrets/cassandra/index.mdx b/website/pages/docs/secrets/cassandra/index.mdx index 553172252..683f7c5f7 100644 --- a/website/pages/docs/secrets/cassandra/index.mdx +++ b/website/pages/docs/secrets/cassandra/index.mdx @@ -12,7 +12,7 @@ description: >- ~> **Deprecation Note:** This secrets engine is deprecated in favor of the combined databases secrets engine added in v0.7.1. See the documentation for the new implementation of this secrets engine at -[Cassandra database plugin](/docs/secrets/databases/cassandra.html). +[Cassandra database plugin](/docs/secrets/databases/cassandra). The Cassandra secrets engine for Vault generates database credentials dynamically based on configured roles. This means that services that need @@ -100,5 +100,5 @@ subpath for interactive help output. ## API The Cassandra secrets engine has a full HTTP API. Please see the -[Cassandra secrets engine API](/api/secret/cassandra/index.html) for more +[Cassandra secrets engine API](/api/secret/cassandra) for more details. diff --git a/website/pages/docs/secrets/consul/index.mdx b/website/pages/docs/secrets/consul/index.mdx index 203a9e4ab..b750d0af3 100644 --- a/website/pages/docs/secrets/consul/index.mdx +++ b/website/pages/docs/secrets/consul/index.mdx @@ -121,7 +121,7 @@ token bc7a42c0-9c59-23b4-8a09-7173c474dc42 ## API The Consul secrets engine has a full HTTP API. Please see the -[Consul secrets engine API](/api/secret/consul/index.html) for more +[Consul secrets engine API](/api/secret/consul) for more details. [consul-mgmt-token]: https://www.consul.io/docs/agent/http/acl.html#acl_create diff --git a/website/pages/docs/secrets/cubbyhole/index.mdx b/website/pages/docs/secrets/cubbyhole/index.mdx index 1d522e60d..8d5af007e 100644 --- a/website/pages/docs/secrets/cubbyhole/index.mdx +++ b/website/pages/docs/secrets/cubbyhole/index.mdx @@ -60,5 +60,5 @@ guide for a step-by-step tutorial. ## API The Cubbyhole secrets engine has a full HTTP API. Please see the -[Cubbyhole secrets engine API](/api/secret/cubbyhole/index.html) for more +[Cubbyhole secrets engine API](/api/secret/cubbyhole) for more details. diff --git a/website/pages/docs/secrets/databases/cassandra.mdx b/website/pages/docs/secrets/databases/cassandra.mdx index d507fa330..aa615a97a 100644 --- a/website/pages/docs/secrets/databases/cassandra.mdx +++ b/website/pages/docs/secrets/databases/cassandra.mdx @@ -14,7 +14,7 @@ Cassandra is one of the supported plugins for the database secrets engine. This plugin generates database credentials dynamically based on configured roles for the Cassandra database. -See the [database secrets engine](/docs/secrets/databases/index.html) docs for +See the [database secrets engine](/docs/secrets/databases) docs for more information about setting up the database secrets engine. ## Setup @@ -75,8 +75,6 @@ the proper permission, it can generate credentials. ## API -The full list of configurable options can be seen in the [Cassandra database -plugin API](/api/secret/databases/cassandra.html) page. +The full list of configurable options can be seen in the [Cassandra database plugin API](/api/secret/databases/cassandra) page. -For more information on the database secrets engine's HTTP API please see the [Database secret -secrets engine API](/api/secret/databases/index.html) page. +For more information on the database secrets engine's HTTP API please see the [Database secret secrets engine API](/api/secret/databases) page. diff --git a/website/pages/docs/secrets/databases/custom.mdx b/website/pages/docs/secrets/databases/custom.mdx index 5f57abab8..03dc94df6 100644 --- a/website/pages/docs/secrets/databases/custom.mdx +++ b/website/pages/docs/secrets/databases/custom.mdx @@ -22,7 +22,7 @@ while keeping Vault itself statically linked. and is not required knowledge for day-to-day usage. If you don't plan on writing any plugins, we recommend not reading this section of the documentation. -Please read the [Plugins internals](/docs/internals/plugins.html) docs for more +Please read the [Plugins internals](/docs/internals/plugins) docs for more information about the plugin system before getting started building your Database plugin. @@ -95,7 +95,7 @@ plugin. We also recommend if you are planning on distributing your plugin to build with [gox](https://github.com/mitchellh/gox) for cross platform builds. To use your plugin with the database secrets engine you need to place the binary in the -plugin directory as specified in the [plugin internals](/docs/internals/plugins.html) docs. +plugin directory as specified in the [plugin internals](/docs/internals/plugins) docs. You should now be able to register your plugin into the vault catalog. To do this your token will need sudo permissions. diff --git a/website/pages/docs/secrets/databases/elasticdb.mdx b/website/pages/docs/secrets/databases/elasticdb.mdx index 91936afda..4830cfd98 100644 --- a/website/pages/docs/secrets/databases/elasticdb.mdx +++ b/website/pages/docs/secrets/databases/elasticdb.mdx @@ -17,7 +17,7 @@ Elasticsearch is one of the supported plugins for the database secrets engine. T plugin generates database credentials dynamically based on configured roles for Elasticsearch. -See the [database secrets engine](/docs/secrets/databases/index.html) docs for +See the [database secrets engine](/docs/secrets/databases) docs for more information about setting up the database secrets engine. ## Getting Started @@ -170,8 +170,7 @@ the proper permission, it can generate credentials. ## API -The full list of configurable options can be seen in the [Elasticsearch database -plugin API](/api/secret/databases/elasticdb.html) page. +The full list of configurable options can be seen in the [Elasticsearch database plugin API](/api/secret/databases/elasticdb.html) page. For more information on the database secrets engine's HTTP API please see the -[Database secrets engine API](/api/secret/databases/index.html) page. +[Database secrets engine API](/api/secret/databases) page. diff --git a/website/pages/docs/secrets/databases/hanadb.mdx b/website/pages/docs/secrets/databases/hanadb.mdx index b91fa1cd3..13524b0eb 100644 --- a/website/pages/docs/secrets/databases/hanadb.mdx +++ b/website/pages/docs/secrets/databases/hanadb.mdx @@ -14,7 +14,7 @@ HANA is one of the supported plugins for the database secrets engine. This plugin generates database credentials dynamically based on configured roles for the HANA database. -See the [database secrets engine](/docs/secrets/databases/index.html) docs for +See the [database secrets engine](/docs/secrets/databases) docs for more information about setting up the database secrets engine. ## Setup @@ -74,8 +74,7 @@ the proper permission, it can generate credentials. ## API -The full list of configurable options can be seen in the [HANA database -plugin API](/api/secret/databases/hanadb.html) page. +The full list of configurable options can be seen in the [HANA database plugin API](/api/secret/databases/hanadb) page. For more information on the database secrets engine's HTTP API please see the -[Database secrets engine API](/api/secret/databases/index.html) page. +[Database secrets engine API](/api/secret/databases) page. diff --git a/website/pages/docs/secrets/databases/index.mdx b/website/pages/docs/secrets/databases/index.mdx index 8cf8f455d..79ebfa15c 100644 --- a/website/pages/docs/secrets/databases/index.mdx +++ b/website/pages/docs/secrets/databases/index.mdx @@ -109,8 +109,7 @@ the proper permission, it can generate credentials. ## Custom Plugins This secrets engine allows custom database types to be run through the exposed -plugin interface. Please see the [custom database -plugin](/docs/secrets/databases/custom.html) for more information. +plugin interface. Please see the [custom database plugin](/docs/secrets/databases/custom) for more information. ## Password Generation @@ -129,4 +128,4 @@ Refer to the following step-by-step tutorials for more information: ## API The database secrets engine has a full HTTP API. Please see the [Database secret -secrets engine API](/api/secret/databases/index.html) for more details. +secrets engine API](/api/secret/databases) for more details. diff --git a/website/pages/docs/secrets/databases/influxdb.mdx b/website/pages/docs/secrets/databases/influxdb.mdx index e438ace04..e9a49475c 100644 --- a/website/pages/docs/secrets/databases/influxdb.mdx +++ b/website/pages/docs/secrets/databases/influxdb.mdx @@ -14,7 +14,7 @@ Influxdb is one of the supported plugins for the database secrets engine. This plugin generates database credentials dynamically based on configured roles for the Influxdb database. -See the [database secrets engine](/docs/secrets/databases/index.html) docs for +See the [database secrets engine](/docs/secrets/databases) docs for more information about setting up the database secrets engine. ## Setup @@ -75,7 +75,7 @@ the proper permission, it can generate credentials. ## API The full list of configurable options can be seen in the [Influxdb database -plugin API](/api/secret/databases/influxdb.html) page. +plugin API](/api/secret/databases/influxdb) page. For more information on the database secrets engine's HTTP API please see the [Database secret -secrets engine API](/api/secret/databases/index.html) page. +secrets engine API](/api/secret/databases) page. diff --git a/website/pages/docs/secrets/databases/mongodb.mdx b/website/pages/docs/secrets/databases/mongodb.mdx index 68fddbb3d..82f8e84d8 100644 --- a/website/pages/docs/secrets/databases/mongodb.mdx +++ b/website/pages/docs/secrets/databases/mongodb.mdx @@ -14,7 +14,7 @@ MongoDB is one of the supported plugins for the database secrets engine. This plugin generates database credentials dynamically based on configured roles for the MongoDB database. -See the [database secrets engine](/docs/secrets/databases/index.html) docs for +See the [database secrets engine](/docs/secrets/databases) docs for more information about setting up the database secrets engine. ## Setup @@ -74,7 +74,7 @@ the proper permission, it can generate credentials. ## API The full list of configurable options can be seen in the [MongoDB database -plugin API](/api/secret/databases/mongodb.html) page. +plugin API](/api/secret/databases/mongodb) page. For more information on the database secrets engine's HTTP API please see the -[Database secrets engine API](/api/secret/databases/index.html) page. +[Database secrets engine API](/api/secret/databases) page. diff --git a/website/pages/docs/secrets/databases/mssql.mdx b/website/pages/docs/secrets/databases/mssql.mdx index 44bbf41ab..09587d07a 100644 --- a/website/pages/docs/secrets/databases/mssql.mdx +++ b/website/pages/docs/secrets/databases/mssql.mdx @@ -15,7 +15,7 @@ MSSQL is one of the supported plugins for the database secrets engine. This plugin generates database credentials dynamically based on configured roles for the MSSQL database. -See the [database secrets engine](/docs/secrets/databases/index.html) docs for +See the [database secrets engine](/docs/secrets/databases) docs for more information about setting up the database secrets engine. ## Setup @@ -154,7 +154,7 @@ vault write database/roles/my-role revocation_statements="\ ## API The full list of configurable options can be seen in the [MSSQL database -plugin API](/api/secret/databases/mssql.html) page. +plugin API](/api/secret/databases/mssql) page. For more information on the database secrets engine's HTTP API please see the -[Database secrets engine API](/api/secret/databases/index.html) page. +[Database secrets engine API](/api/secret/databases) page. diff --git a/website/pages/docs/secrets/databases/mysql-maria.mdx b/website/pages/docs/secrets/databases/mysql-maria.mdx index 2e4b60865..22e23dcb6 100644 --- a/website/pages/docs/secrets/databases/mysql-maria.mdx +++ b/website/pages/docs/secrets/databases/mysql-maria.mdx @@ -13,7 +13,7 @@ description: |- MySQL is one of the supported plugins for the database secrets engine. This plugin generates database credentials dynamically based on configured roles for the MySQL database, and also supports [Static -Roles](/docs/secrets/databases/index.html#static-roles). +Roles](/docs/secrets/databases#static-roles). This plugin has a few different instances built into vault, each instance is for a slightly different MySQL driver. The only difference between these plugins is @@ -25,7 +25,7 @@ accept different lengths. The available plugins are: - mysql-rds-database-plugin - mysql-legacy-database-plugin -See the [database secrets engine](/docs/secrets/databases/index.html) docs for +See the [database secrets engine](/docs/secrets/databases) docs for more information about setting up the database secrets engine. ## Setup @@ -115,7 +115,7 @@ $ vault write database/roles/my-role \ The default root rotation setup for MySQL uses the `ALTER USER` syntax present in MySQL 5.7 and up. For MySQL 5.6, the [root rotation -statements](/api/secret/databases/index.html#root_rotation_statements) +statements](/api/secret/databases#root_rotation_statements) must be configured to use the old `SET PASSWORD` syntax. For example: ```text @@ -129,12 +129,12 @@ $ vault write database/config/my-mysql-database \ ``` For a guide in root credential rotation, see [Database Root Credential -Rotation](/guides/secret-mgmt/db-root-rotation.html). +Rotation](/guides/secret-mgmt/db-root-rotation). ## API The full list of configurable options can be seen in the [MySQL database plugin -API](/api/secret/databases/mysql-maria.html) page. +API](/api/secret/databases/mysql-maria) page. For more information on the database secrets engine's HTTP API please see the -[Database secrets engine API](/api/secret/databases/index.html) page. +[Database secrets engine API](/api/secret/databases) page. diff --git a/website/pages/docs/secrets/databases/oracle.mdx b/website/pages/docs/secrets/databases/oracle.mdx index edc08b218..075603580 100644 --- a/website/pages/docs/secrets/databases/oracle.mdx +++ b/website/pages/docs/secrets/databases/oracle.mdx @@ -18,7 +18,7 @@ The Oracle database plugin is not bundled in the core Vault code tree and can be found at its own git repository here: [hashicorp/vault-plugin-database-oracle](https://github.com/hashicorp/vault-plugin-database-oracle) -See the [Database Backend](/docs/secrets/databases/index.html) docs for more +See the [Database Backend](/docs/secrets/databases) docs for more information about setting up the Database Backend. ## Setup @@ -32,7 +32,7 @@ Before running the plugin you will need to have the the Oracle Instant Client library installed. These can be downloaded from Oracle. The libraries will need to be placed in the default library search path or defined in the ld.so.conf configuration files. -If you are running Vault with [mlock enabled](/docs/configuration/index.html#disable_mlock), +If you are running Vault with [mlock enabled](/docs/configuration#disable_mlock), you will need to enable ipc_lock capabilities for the plugin binary. 1. Enable the database secrets engine if it is not already enabled: @@ -96,7 +96,7 @@ the proper permission, it can generate credentials. ## API The full list of configurable options can be seen in the [Oracle database plugin -API](/api/secret/databases/oracle.html) page. +API](/api/secret/databases/oracle) page. For more information on the database secrets engine's HTTP API please see the -[Database secrets engine API](/api/secret/databases/index.html) page. +[Database secrets engine API](/api/secret/databases) page. diff --git a/website/pages/docs/secrets/databases/postgresql.mdx b/website/pages/docs/secrets/databases/postgresql.mdx index f331bb3e2..1c378069a 100644 --- a/website/pages/docs/secrets/databases/postgresql.mdx +++ b/website/pages/docs/secrets/databases/postgresql.mdx @@ -13,9 +13,9 @@ description: |- PostgreSQL is one of the supported plugins for the database secrets engine. This plugin generates database credentials dynamically based on configured roles for the PostgreSQL database, and also supports [Static -Roles](/docs/secrets/databases/index.html#static-roles). +Roles](/docs/secrets/databases#static-roles). -See the [database secrets engine](/docs/secrets/databases/index.html) docs for +See the [database secrets engine](/docs/secrets/databases) docs for more information about setting up the database secrets engine. ## Setup @@ -76,7 +76,7 @@ the proper permission, it can generate credentials. ## API The full list of configurable options can be seen in the [PostgreSQL database -plugin API](/api/secret/databases/postgresql.html) page. +plugin API](/api/secret/databases/postgresql) page. For more information on the database secrets engine's HTTP API please see the -[Database secrets engine API](/api/secret/databases/index.html) page. +[Database secrets engine API](/api/secret/databases) page. diff --git a/website/pages/docs/secrets/gcp/index.mdx b/website/pages/docs/secrets/gcp/index.mdx index 2f6604a6c..4e853628a 100644 --- a/website/pages/docs/secrets/gcp/index.mdx +++ b/website/pages/docs/secrets/gcp/index.mdx @@ -465,7 +465,7 @@ Please report issues, add feature requests, and submit contributions to the The GCP secrets engine has a full HTTP API. Please see the [GCP secrets engine API docs][api] for more details. -[api]: https://vaultproject.io/api/secret/gcp/index.html +[api]: /api/secret/gcp [cloud-creds]: https://cloud.google.com/docs/authentication/production#providing_credentials_to_your_application [custom-roles]: https://cloud.google.com/iam/docs/creating-custom-roles [gce]: https://cloud.google.com/compute/ diff --git a/website/pages/docs/secrets/gcpkms/index.mdx b/website/pages/docs/secrets/gcpkms/index.mdx index b2a314f4d..74f75c1af 100644 --- a/website/pages/docs/secrets/gcpkms/index.mdx +++ b/website/pages/docs/secrets/gcpkms/index.mdx @@ -436,7 +436,7 @@ Please report issues, add feature requests, and submit contributions to the The Google Cloud KMS secrets engine has a full HTTP API. Please see the [Google Cloud KMS secrets engine API docs][api] for more details. -[api]: /api/secret/gcpkms/index.html +[api]: /api/secret/gcpkms [cloud-creds]: https://cloud.google.com/docs/authentication/production#providing_credentials_to_your_application [gce]: https://cloud.google.com/compute/ [gke]: https://cloud.google.com/kubernetes-engine/ @@ -445,4 +445,4 @@ The Google Cloud KMS secrets engine has a full HTTP API. Please see the [kms-pricing]: https://cloud.google.com/kms/pricing [repo]: https://github.com/hashicorp/vault-plugin-secrets-gcpkms [service-accounts]: https://cloud.google.com/compute/docs/access/service-accounts -[vault-transit]: /docs/secrets/transit/index.html +[vault-transit]: /docs/secrets/transit diff --git a/website/pages/docs/secrets/identity/index.mdx b/website/pages/docs/secrets/identity/index.mdx index 383174a06..9689e5a6e 100644 --- a/website/pages/docs/secrets/identity/index.mdx +++ b/website/pages/docs/secrets/identity/index.mdx @@ -190,11 +190,11 @@ Identity tokens will always contain, at a minimum, the claims required by OIDC: In addition, the operator may configure per-role templates that allow a variety of other entity information to be added to the token. The templates are structured as JSON with replaceable parameters. The parameter syntax is the same -as that used for [ACL Path Templating](/docs/concepts/policies.html). +as that used for [ACL Path Templating](/docs/concepts/policies). For example: -```json +```jsx { "color": {{identity.entity.metadata.color}}, "userinfo": { @@ -261,13 +261,13 @@ The full list of template parameters is shown below: | `identity.entity.aliases.<>.metadata` | Metadata associated with the alias for the given mount | | `identity.entity.aliases.<>.metadata.<>` | Metadata associated with the alias for the given mount and metadata key | | `time.now` | Current time as integral seconds since the Epoch | -| `time.now.plus.<>` | Current time plus a Go-parsable [duration](https://golang.org/pkg/time/#ParseDuration) | | -| `time.now.minus.<>` | Current time minus a Go-parsable [duration](https://golang.org/pkg/time/#ParseDuration) | | +| `time.now.plus.` | Current time plus a Go-parsable [duration](https://golang.org/pkg/time/#ParseDuration) | | +| `time.now.minus.` | Current time minus a Go-parsable [duration](https://golang.org/pkg/time/#ParseDuration) | | ### Token Generation An authenticated client may request a token using the [token generation -endpoint](api/secret/identity/tokens.html#generate-a-signed-id-token). The token +endpoint](api/secret/identity/tokens#generate-a-signed-id-token). The token will be generated per the requested role's specifications, for the requester's entity. It is not possible to generate tokens for an arbitrary entity. @@ -285,7 +285,7 @@ only requiring _access_ to Vault, not _authorization_, as the .well-known endpoints are unauthenticated. Alternatively, the token may be sent to Vault for verification via an -[introspection endpoint](api/secret/identity/tokens.html#introspect-a-signed-id-token). +[introspection endpoint](/api/secret/identity/tokens#introspect-a-signed-id-token). The response will indicate whether the token is "active" or not, as well as any errors that occurred during validation. Beyond simply allowing the client to delegate verification to Vault, using this endpoint incorporates the additional @@ -299,15 +299,15 @@ authorization. The identity token system has one configurable parameter: issuer. The issuer `iss` claim is particularly important for proper validation of the token by clients, and special consideration should be given when using Identity Tokens -with [performance replication](docs/enterprise/replication/index.html). +with [performance replication](/docs/enterprise/replication). Consumers of the token will request public keys from Vault using the issuer URL, so it must be network reachable. Furthermore, the returned set of keys will include an issuer that must match the request. By default Vault will set the issuer to the Vault instance's -[`api_addr`](docs/configuration/index.html#api_addr). This means that tokens +[`api_addr`](/docs/configuration#api_addr). This means that tokens issued in a given cluster should be validated within that same cluster. -Alternatively, the [`issuer`](api/secret/identity/tokens.html#issuer) parameter +Alternatively, the [`issuer`](/api/secret/identity/tokens#issuer) parameter may be configured explicitly. This address must point to the identity/oidc path for the Vault instance (e.g. `https://vault-1.example.com:8200/v1/identity/oidc`) and should be @@ -316,5 +316,5 @@ reachable by any client trying to validate identity tokens. ## API The Identity secrets engine has a full HTTP API. Please see the -[Identity secrets engine API](/api/secret/identity/index.html) for more +[Identity secrets engine API](/api/secret/identity) for more details. diff --git a/website/pages/docs/secrets/kv/index.mdx b/website/pages/docs/secrets/kv/index.mdx index 23f62a408..6815702e7 100644 --- a/website/pages/docs/secrets/kv/index.mdx +++ b/website/pages/docs/secrets/kv/index.mdx @@ -23,7 +23,7 @@ more performant because for any given request there will be fewer storage calls and no locking. More information about running in this mode can be found in the [K/V Version 1 -Docs](/docs/secrets/kv/kv-v1.html) +Docs](/docs/secrets/kv/kv-v1) ## KV Version 2 @@ -40,4 +40,4 @@ command or API endpoint. Each of these operations can be ACL'ed differently, restricting who has permissions to soft delete, undelete, or fully remove data. More information about running in this mode can be found in the [K/V Version 2 -Docs](/docs/secrets/kv/kv-v2.html) +Docs](/docs/secrets/kv/kv-v2) diff --git a/website/pages/docs/secrets/kv/kv-v1.mdx b/website/pages/docs/secrets/kv/kv-v1.mdx index b134a1a4f..b04e8865d 100644 --- a/website/pages/docs/secrets/kv/kv-v1.mdx +++ b/website/pages/docs/secrets/kv/kv-v1.mdx @@ -108,5 +108,5 @@ guide for a step-by-step tutorial. ## API The KV secrets engine has a full HTTP API. Please see the -[KV secrets engine API](/api/secret/kv/kv-v1.html) for more +[KV secrets engine API](/api/secret/kv/kv-v1) for more details. diff --git a/website/pages/docs/secrets/kv/kv-v2.mdx b/website/pages/docs/secrets/kv/kv-v2.mdx index 817824ca1..a3d8015b2 100644 --- a/website/pages/docs/secrets/kv/kv-v2.mdx +++ b/website/pages/docs/secrets/kv/kv-v2.mdx @@ -44,7 +44,7 @@ different paths. Each instance of the KV secrets engine is isolated and unique. An existing version 1 kv store can be upgraded to a version 2 kv store via the CLI or API, as shown below. This will start an upgrade process to upgrade the existing key/value data to a versioned format. The mount will be inaccessible during this process. This process could take a long time, so plan accordingly. -Once upgraded to version 2, the former paths at which the data was accessible will no longer suffice. You will need to adjust user policies to add access to the version 2 paths as detailed in the [ACL Rules section below](/docs/secrets/kv/kv-v2.html#acl-rules). Similarly, users/applications will need to update the paths at which they interact with the kv data once it has been upgraded to version 2. +Once upgraded to version 2, the former paths at which the data was accessible will no longer suffice. You will need to adjust user policies to add access to the version 2 paths as detailed in the [ACL Rules section below](/docs/secrets/kv/kv-v2#acl-rules). Similarly, users/applications will need to update the paths at which they interact with the kv data once it has been upgraded to version 2. An existing version 1 kv can be upgraded to a version 2 KV store with the CLI command: @@ -151,7 +151,7 @@ path "secret/metadata/dev/team-1/*" { } ``` -See the [API Specification](/api/secret/kv/kv-v2.html) for more +See the [API Specification](/api/secret/kv/kv-v2) for more information. ## Usage @@ -402,5 +402,5 @@ guide for a step-by-step tutorial. ## API The KV secrets engine has a full HTTP API. Please see the -[KV secrets engine API](/api/secret/kv/kv-v2.html) for more +[KV secrets engine API](/api/secret/kv/kv-v2) for more details. diff --git a/website/pages/docs/secrets/mongodb/index.mdx b/website/pages/docs/secrets/mongodb/index.mdx index 8cfb32c72..d72ef0491 100644 --- a/website/pages/docs/secrets/mongodb/index.mdx +++ b/website/pages/docs/secrets/mongodb/index.mdx @@ -12,7 +12,7 @@ description: >- ~> **Deprecation Note:** This secrets engine is deprecated in favor of the combined databases secrets engine added in v0.7.1. See the documentation for the new implementation of this secrets engine at -[MongoDB database plugin](/docs/secrets/databases/mongodb.html). +[MongoDB database plugin](/docs/secrets/databases/mongodb). The `mongodb` secrets engine for Vault generates MongoDB database credentials dynamically based on configured roles. This means that services that need @@ -125,5 +125,5 @@ applications are restricted in the credentials they are allowed to read. ## API The MongoDB secrets engine has a full HTTP API. Please see the -[MongoDB secrets engine API](/api/secret/mongodb/index.html) for more +[MongoDB secrets engine API](/api/secret/mongodb) for more details. diff --git a/website/pages/docs/secrets/mssql/index.mdx b/website/pages/docs/secrets/mssql/index.mdx index 48d19b510..f6cc37d5c 100644 --- a/website/pages/docs/secrets/mssql/index.mdx +++ b/website/pages/docs/secrets/mssql/index.mdx @@ -12,7 +12,7 @@ description: >- ~> **Deprecation Note:** This secrets engine is deprecated in favor of the combined databases secrets engine added in v0.7.1. See the documentation for the new implementation of this secrets engine at -[MSSQL database plugin](/docs/secrets/databases/mssql.html). +[MSSQL database plugin](/docs/secrets/databases/mssql). The MSSQL secrets engine for Vault generates database credentials dynamically based on configured roles. This means that services that need @@ -116,5 +116,5 @@ allowed to read. ## API The MSSQL secrets engine has a full HTTP API. Please see the -[MSSQL secrets engine API](/api/secret/mssql/index.html) for more +[MSSQL secrets engine API](/api/secret/mssql) for more details. diff --git a/website/pages/docs/secrets/mysql/index.mdx b/website/pages/docs/secrets/mysql/index.mdx index 067e0835d..d086382fa 100644 --- a/website/pages/docs/secrets/mysql/index.mdx +++ b/website/pages/docs/secrets/mysql/index.mdx @@ -14,7 +14,7 @@ Name: `mysql` ~> **Deprecation Note:** This secrets engine is deprecated in favor of the combined databases secrets engine added in v0.7.1. See the documentation for the new implementation of this secrets engine at -[MySQL/MariaDB database plugin](/docs/secrets/databases/mysql-maria.html). +[MySQL/MariaDB database plugin](/docs/secrets/databases/mysql-maria). The MySQL secrets engine for Vault generates database credentials dynamically based on configured roles. This means that services that need @@ -127,5 +127,5 @@ the default on versions prior to that. ## API The MySQL secrets engine has a full HTTP API. Please see the -[MySQL secrets engine API](/api/secret/mysql/index.html) for more +[MySQL secrets engine API](/api/secret/mysql) for more details. diff --git a/website/pages/docs/secrets/nomad/index.mdx b/website/pages/docs/secrets/nomad/index.mdx index bbbf5ced5..b2c894b69 100644 --- a/website/pages/docs/secrets/nomad/index.mdx +++ b/website/pages/docs/secrets/nomad/index.mdx @@ -114,5 +114,5 @@ Modify Index = 138 ## API The Nomad secret backend has a full HTTP API. Please see the -[Nomad secret backend API](/api/secret/nomad/index.html) for more +[Nomad secret backend API](/api/secret/nomad) for more details. diff --git a/website/pages/docs/secrets/pki/index.mdx b/website/pages/docs/secrets/pki/index.mdx index 251dfd323..085688c3f 100644 --- a/website/pages/docs/secrets/pki/index.mdx +++ b/website/pages/docs/secrets/pki/index.mdx @@ -679,5 +679,5 @@ guide for a step-by-step tutorial. ## API The PKI secrets engine has a full HTTP API. Please see the -[PKI secrets engine API](/api/secret/pki/index.html) for more +[PKI secrets engine API](/api/secret/pki) for more details. diff --git a/website/pages/docs/secrets/postgresql/index.mdx b/website/pages/docs/secrets/postgresql/index.mdx index fca0c243e..9bd157d65 100644 --- a/website/pages/docs/secrets/postgresql/index.mdx +++ b/website/pages/docs/secrets/postgresql/index.mdx @@ -14,7 +14,7 @@ Name: `postgresql` ~> **Deprecation Note:** This secrets engine is deprecated in favor of the combined databases secrets engine added in v0.7.1. See the documentation for the new implementation of this secrets engine at -[PostgreSQL database plugin](/docs/secrets/databases/postgresql.html). +[PostgreSQL database plugin](/docs/secrets/databases/postgresql). The PostgreSQL secrets engine for Vault generates database credentials dynamically based on configured roles. This means that services that need @@ -117,5 +117,5 @@ subpath for interactive help output. ## API The PostgreSQL secrets engine has a full HTTP API. Please see the -[PostgreSQL secrets engine API](/api/secret/postgresql/index.html) for more +[PostgreSQL secrets engine API](/api/secret/postgresql) for more details. diff --git a/website/pages/docs/secrets/rabbitmq/index.mdx b/website/pages/docs/secrets/rabbitmq/index.mdx index 51460ccf2..007c9ec7d 100644 --- a/website/pages/docs/secrets/rabbitmq/index.mdx +++ b/website/pages/docs/secrets/rabbitmq/index.mdx @@ -95,7 +95,7 @@ the proper permission, it can generate credentials. ## API The RabbitMQ secrets engine has a full HTTP API. Please see the -[RabbitMQ secrets engine API](/api/secret/rabbitmq/index.html) for more +[RabbitMQ secrets engine API](/api/secret/rabbitmq) for more details. [rmq-perms]: https://www.rabbitmq.com/management.html#permissions diff --git a/website/pages/docs/secrets/ssh/dynamic-ssh-keys.mdx b/website/pages/docs/secrets/ssh/dynamic-ssh-keys.mdx index 8b4358f0f..5f7e36d63 100644 --- a/website/pages/docs/secrets/ssh/dynamic-ssh-keys.mdx +++ b/website/pages/docs/secrets/ssh/dynamic-ssh-keys.mdx @@ -190,5 +190,5 @@ username@:~$ ## API The SSH secret secrets engine has a full HTTP API. Please see the -[SSH secret secrets engine API](/api/secret/ssh/index.html) for more +[SSH secret secrets engine API](/api/secret/ssh) for more details. diff --git a/website/pages/docs/secrets/ssh/index.mdx b/website/pages/docs/secrets/ssh/index.mdx index be05eeddd..3405d3052 100644 --- a/website/pages/docs/secrets/ssh/index.mdx +++ b/website/pages/docs/secrets/ssh/index.mdx @@ -21,14 +21,14 @@ credentials. The Vault SSH secrets engine supports the following modes. Each mode is individually documented on its own page. -- [Signed SSH Certificates](/docs/secrets/ssh/signed-ssh-certificates.html) -- [One-time SSH Passwords](/docs/secrets/ssh/one-time-ssh-passwords.html) -- [Dynamic SSH Keys](/docs/secrets/ssh/dynamic-ssh-keys.html) DEPRECATED +- [Signed SSH Certificates](/docs/secrets/ssh/signed-ssh-certificates) +- [One-time SSH Passwords](/docs/secrets/ssh/one-time-ssh-passwords) +- [Dynamic SSH Keys](/docs/secrets/ssh/dynamic-ssh-keys) DEPRECATED All guides assume a basic familiarity with the SSH protocol. ## API The SSH secrets engine has a full HTTP API. Please see the -[SSH secrets engine API](/api/secret/ssh/index.html) for more +[SSH secrets engine API](/api/secret/ssh) for more details. diff --git a/website/pages/docs/secrets/ssh/one-time-ssh-passwords.mdx b/website/pages/docs/secrets/ssh/one-time-ssh-passwords.mdx index c0514f945..1fd82906a 100644 --- a/website/pages/docs/secrets/ssh/one-time-ssh-passwords.mdx +++ b/website/pages/docs/secrets/ssh/one-time-ssh-passwords.mdx @@ -117,5 +117,5 @@ for a step-by-step tutorial. ## API The SSH secrets engine has a full HTTP API. Please see the -[SSH secrets engine API](/api/secret/ssh/index.html) for more +[SSH secrets engine API](/api/secret/ssh) for more details. diff --git a/website/pages/docs/secrets/ssh/signed-ssh-certificates.mdx b/website/pages/docs/secrets/ssh/signed-ssh-certificates.mdx index eff848ade..32897e3b2 100644 --- a/website/pages/docs/secrets/ssh/signed-ssh-certificates.mdx +++ b/website/pages/docs/secrets/ssh/signed-ssh-certificates.mdx @@ -484,5 +484,5 @@ forwarding. See [no prompt after login](#no-prompt-after-login) for examples. ## API The SSH secrets engine has a full HTTP API. Please see the -[SSH secrets engine API](/api/secret/ssh/index.html) for more +[SSH secrets engine API](/api/secret/ssh) for more details. diff --git a/website/pages/docs/secrets/totp/index.mdx b/website/pages/docs/secrets/totp/index.mdx index e5bb20e2d..4dbc9111b 100644 --- a/website/pages/docs/secrets/totp/index.mdx +++ b/website/pages/docs/secrets/totp/index.mdx @@ -121,5 +121,5 @@ management tool. ## API The TOTP secrets engine has a full HTTP API. Please see the -[TOTP secrets engine API](/api/secret/totp/index.html) for more +[TOTP secrets engine API](/api/secret/totp) for more details. diff --git a/website/pages/docs/secrets/transit/index.mdx b/website/pages/docs/secrets/transit/index.mdx index 6fb08e9d6..cf5a08ed1 100644 --- a/website/pages/docs/secrets/transit/index.mdx +++ b/website/pages/docs/secrets/transit/index.mdx @@ -159,7 +159,7 @@ the proper permission, it can use this secrets engine. !> Vault HTTP API imposes a maximum request size of 32MB to prevent a denial of service attack. This can be tuned per [`listener` - block](/docs/configuration/listener/tcp.html) in the Vault server + block](/docs/configuration/listener/tcp) in the Vault server configuration. 1. Decrypt a piece of data using the `/decrypt` endpoint with a named key: @@ -229,5 +229,5 @@ guide for a step-by-step tutorial. ## API The Transit secrets engine has a full HTTP API. Please see the -[Transit secrets engine API](/api/secret/transit/index.html) for more +[Transit secrets engine API](/api/secret/transit) for more details. diff --git a/website/pages/docs/upgrading/index.mdx b/website/pages/docs/upgrading/index.mdx index 703e92ad3..75ee72236 100644 --- a/website/pages/docs/upgrading/index.mdx +++ b/website/pages/docs/upgrading/index.mdx @@ -76,7 +76,7 @@ active duty. To do this: If you kill Vault without letting it release the lock, a standby node will not be able to take over until the lock's timeout period has expired. This is backend-specific but could be ten seconds or more. -2. Replace the Vault binary with the new version; ensure that `mlock()` capability is added to the new binary with [setcap](https://www.vaultproject.io/docs/configuration/index.html#disable_mlock) +2. Replace the Vault binary with the new version; ensure that `mlock()` capability is added to the new binary with [setcap](/docs/configuration#disable_mlock) 3. Start the node 4. Unseal the node (it will now be a standby) @@ -91,7 +91,7 @@ upgrade notes. -> **Note:** Prior to any upgrade, be sure to also read and follow any instructions in the version-specific upgrade notes which are found in the navigation menu for this documentation. -Upgrading installations of Vault which participate in [Enterprise Replication](/docs/enterprise/replication/index.html) requires the following basic order of operations: +Upgrading installations of Vault which participate in [Enterprise Replication](/docs/enterprise/replication) requires the following basic order of operations: - **Upgrade the replication secondary instances first** using appropriate guidance from the previous sections depending on whether each secondary diff --git a/website/pages/docs/upgrading/plugins.mdx b/website/pages/docs/upgrading/plugins.mdx index 9f74e8fac..d04c63ce5 100644 --- a/website/pages/docs/upgrading/plugins.mdx +++ b/website/pages/docs/upgrading/plugins.mdx @@ -38,4 +38,4 @@ performed on each Vault instance. Performing a plugin upgrade on a single instance or through a load balancer can result in mismatched plugin binaries within a cluster. -[plugin_reload_api]: /api/system/plugins-reload-backend.html +[plugin_reload_api]: /api/system/plugins-reload-backend diff --git a/website/pages/docs/upgrading/upgrade-to-0.10.2.mdx b/website/pages/docs/upgrading/upgrade-to-0.10.2.mdx index 1fdd16dc1..35a8ffcb3 100644 --- a/website/pages/docs/upgrading/upgrade-to-0.10.2.mdx +++ b/website/pages/docs/upgrading/upgrade-to-0.10.2.mdx @@ -16,9 +16,9 @@ for Vault 0.10.2 compared to 0.10.1. Please read it carefully. If you are using `transit`'s convergent encryption feature, which prior to this release was at version 2, we recommend -[rotating](https://www.vaultproject.io/api/secret/transit/index.html#rotate-key) +[rotating](/api/secret/transit#rotate-key) your encryption key (the new key will use version 3) and -[rewrapping](https://www.vaultproject.io/api/secret/transit/index.html#rewrap-data) +[rewrapping](/api/secret/transit#rewrap-data) your data to mitigate the chance of offline plaintext-confirmation attacks. ### PKI duration return types diff --git a/website/pages/docs/upgrading/upgrade-to-0.11.0.mdx b/website/pages/docs/upgrading/upgrade-to-0.11.0.mdx index e0411efb0..c69215c5f 100644 --- a/website/pages/docs/upgrading/upgrade-to-0.11.0.mdx +++ b/website/pages/docs/upgrading/upgrade-to-0.11.0.mdx @@ -31,7 +31,7 @@ a future release. ### Common Mount Prefixes Before running the upgrade, users should run `vault secrets list` and `vault auth list` -to check their mount table to ensure that mounts do not have common prefix "folders". +to check their mount table to ensure that mounts do not have common prefix "folders". For example, if there is a mount with path `team1/` and a mount with path `team1/secrets`, Vault will fail to unseal. Before upgrade, these mounts must be remounted at a path that does not share a common prefix. @@ -137,9 +137,9 @@ allowing it to be set manually didn't make sense. If you are using `transit`'s convergent encryption feature, which prior to this release was at version 2, we recommend -[rotating](https://www.vaultproject.io/api/secret/transit/index.html#rotate-key) +[rotating](/api/secret/transit#rotate-key) your encryption key (the new key will use version 3) and -[rewrapping](https://www.vaultproject.io/api/secret/transit/index.html#rewrap-data) +[rewrapping](/api/secret/transit#rewrap-data) your data to mitigate the chance of offline plaintext-confirmation attacks. ### PKI duration return types diff --git a/website/pages/docs/upgrading/upgrade-to-0.6.0.mdx b/website/pages/docs/upgrading/upgrade-to-0.6.0.mdx index a81efd5c0..f2aae1b28 100644 --- a/website/pages/docs/upgrading/upgrade-to-0.6.0.mdx +++ b/website/pages/docs/upgrading/upgrade-to-0.6.0.mdx @@ -51,5 +51,5 @@ If using the Consul HA storage backend, Vault will now automatically register itself as the `vault` service and perform its own health checks/lifecycle status management. This behavior can be adjusted or turned off in Vault's configuration; see the -[documentation](/docs/configuration/index.html#check_timeout) +[documentation](/docs/configuration#check_timeout) for details. diff --git a/website/pages/docs/upgrading/upgrade-to-0.6.1.mdx b/website/pages/docs/upgrading/upgrade-to-0.6.1.mdx index 24458557a..d02af7c3d 100644 --- a/website/pages/docs/upgrading/upgrade-to-0.6.1.mdx +++ b/website/pages/docs/upgrading/upgrade-to-0.6.1.mdx @@ -16,7 +16,7 @@ carefully. Once an active node is running 0.6.1, only standby nodes running 0.6.1+ will be able to form an HA cluster. If following our [general upgrade -instructions](/guides/upgrading/index.html) this will +instructions](/guides/upgrading) this will not be an issue. ## Health Endpoint Status Code Changes @@ -39,7 +39,7 @@ each status code (including `500`). Root tokens (tokens with the `root` policy) can no longer be created except by another root token or the -[`generate-root`](/api/system/generate-root.html) +[`generate-root`](/api/system/generate-root) endpoint or CLI command. ## PKI Backend Certificates Will Contain Default Key Usages @@ -50,14 +50,14 @@ compatibility with some software that requires strict adherence to RFCs, such as OpenVPN. This behavior is fully adjustable; see the [PKI backend -documentation](/docs/secrets/pki/index.html) for +documentation](/docs/secrets/pki) for details. ## DynamoDB Does Not Support HA By Default If using DynamoDB and want to use HA support, you will need to explicitly enable it in Vault's configuration; see the -[documentation](/docs/configuration/index.html#ha_enabled) +[documentation](/docs/configuration#ha_enabled) for details. If you are already using DynamoDB in an HA fashion and wish to keep doing so, @@ -83,7 +83,7 @@ unfortunately has the side effect that `memberOf` is no longer searched for by default, which is a breaking change for many existing setups. `Scenario 2` in the [updated -documentation](/docs/auth/ldap.html) shows an +documentation](/docs/auth/ldap) shows an example of configuring the backend to query `memberOf`. It is recommended that a test Vault server be set up and that successful authentication can be performed using the new configuration before upgrading a primary or production @@ -97,7 +97,7 @@ configuration can be specified successfully. ## App-ID is Deprecated With the addition of of the new [AppRole -backend](/docs/auth/approle.html), App-ID is +backend](/docs/auth/approle), App-ID is deprecated. There are no current plans to remove it, but we encourage using AppRole whenever possible, as it offers enhanced functionality and can accommodate many more types of authentication paradigms. App-ID will receive diff --git a/website/pages/docs/upgrading/upgrade-to-0.6.2.mdx b/website/pages/docs/upgrading/upgrade-to-0.6.2.mdx index 127393524..1c665788a 100644 --- a/website/pages/docs/upgrading/upgrade-to-0.6.2.mdx +++ b/website/pages/docs/upgrading/upgrade-to-0.6.2.mdx @@ -16,7 +16,7 @@ for Vault 0.6.2. Please read it carefully. In 0.6.1 this feature was in beta and required opting-in, but is now enabled by default. This can be disabled via the `"disable_clustering"` parameter in -Vault's [config](/docs/configuration/index.html), or +Vault's [config](/docs/configuration), or per-request with the `X-Vault-No-Request-Forwarding` header. ## AppRole Role Constraints diff --git a/website/pages/docs/upgrading/upgrade-to-0.8.0.mdx b/website/pages/docs/upgrading/upgrade-to-0.8.0.mdx index f221c5306..920379254 100644 --- a/website/pages/docs/upgrading/upgrade-to-0.8.0.mdx +++ b/website/pages/docs/upgrading/upgrade-to-0.8.0.mdx @@ -50,4 +50,4 @@ is performing an explicit reindex. This path was meant to require `sudo` capability but was not implemented this way. It now requires `sudo` capability to run. -[reindex]: https://www.vaultproject.io/api/system/replication.html#reindex-replication +[reindex]: /api/system/replication#reindex-replication diff --git a/website/pages/docs/upgrading/upgrade-to-0.9.0.mdx b/website/pages/docs/upgrading/upgrade-to-0.9.0.mdx index ba93f4d64..4ac6770d1 100644 --- a/website/pages/docs/upgrading/upgrade-to-0.9.0.mdx +++ b/website/pages/docs/upgrading/upgrade-to-0.9.0.mdx @@ -118,5 +118,5 @@ corresponding object containing the `key_type`. Audit request and response entries are still in RFC3339 format but now have a granularity of nanoseconds. -[generate-root]: https://www.vaultproject.io/api/secret/pki/index.html#generate-root -[pkcs11-seal]: https://www.vaultproject.io/docs/configuration/seal/pkcs11.html +[generate-root]: /api/secret/pki#generate-root +[pkcs11-seal]: /docs/configuration/seal/pkcs11 diff --git a/website/pages/docs/upgrading/upgrade-to-0.9.3.mdx b/website/pages/docs/upgrading/upgrade-to-0.9.3.mdx index b04ed1f42..e84e7a599 100644 --- a/website/pages/docs/upgrading/upgrade-to-0.9.3.mdx +++ b/website/pages/docs/upgrading/upgrade-to-0.9.3.mdx @@ -13,4 +13,4 @@ Due to a rapid release following 0.9.2, there are no version-specific upgrade instructions although any upgrade notices for 0.9.2 apply if you are coming from a previous version. -Please see the [0.9.2 upgrade guide](/guides/upgrading/upgrade-to-0.9.2.html) for notes on upgrading to 0.9.3. +Please see the [0.9.2 upgrade guide](/guides/upgrading/upgrade-to-0.9.2) for notes on upgrading to 0.9.3. diff --git a/website/pages/docs/use-cases/index.mdx b/website/pages/docs/use-cases/index.mdx index 54b666990..9a63ba791 100644 --- a/website/pages/docs/use-cases/index.mdx +++ b/website/pages/docs/use-cases/index.mdx @@ -9,7 +9,7 @@ description: >- # Use Cases -Before understanding use cases, it's useful to know [what Vault is](/intro/index.html). +Before understanding use cases, it's useful to know [what Vault is](/intro). This page lists some concrete use cases for Vault, but the possible use cases are much broader than what we cover. diff --git a/website/pages/docs/vs/keywhiz.mdx b/website/pages/docs/vs/keywhiz.mdx index 1d9a49abb..0e854716a 100644 --- a/website/pages/docs/vs/keywhiz.mdx +++ b/website/pages/docs/vs/keywhiz.mdx @@ -18,15 +18,15 @@ through a management web interface. Vault similarly is designed as a comprehensive secret management solution. The client interaction with Vault is flexible both for authentication and usage of -secrets. Vault supports [mTLS authentication](/docs/auth/cert.html) along with -many [other mechanisms](/docs/auth/index.html). The goal is to make it easy +secrets. Vault supports [mTLS authentication](/docs/auth/cert) along with +many [other mechanisms](/docs/auth). The goal is to make it easy to authenticate as a machine for programmatic access and as a human for operator usage. Vault and Keywhiz expose secrets via an API. The Vault [ACL -system](/docs/concepts/policies.html) is used to protect secrets and gate +system](/docs/concepts/policies) is used to protect secrets and gate access, similarly to the Keywhiz ACL system. With Vault, all auditing is done -server side using [audit devices](/docs/audit/index.html). +server side using [audit devices](/docs/audit). Keywhiz focuses on storage and distribution of secrets and supports rotation through secret versioning, which is possible in the Keywhiz UI and command-line diff --git a/website/pages/docs/vs/kms.mdx b/website/pages/docs/vs/kms.mdx index 9f0c493cb..7f7a9d0ce 100644 --- a/website/pages/docs/vs/kms.mdx +++ b/website/pages/docs/vs/kms.mdx @@ -17,7 +17,7 @@ operations (encrypt and decrypt) using those keys. It supports access controls and auditing as well. In contrast, Vault provides a comprehensive secret management solution. The -[`transit` backend](/docs/secrets/transit/index.html) provides similar +[`transit` backend](/docs/secrets/transit) provides similar capabilities as KMS, allowing for encryption keys to be stored and cryptographic operations to be performed. However, Vault goes much further than just key management. diff --git a/website/pages/docs/what-is-vault/index.mdx b/website/pages/docs/what-is-vault/index.mdx index f89638ce0..5b6493475 100644 --- a/website/pages/docs/what-is-vault/index.mdx +++ b/website/pages/docs/what-is-vault/index.mdx @@ -16,7 +16,7 @@ it can solve, how it compares to existing software, and contains a quick start for using Vault. If you are already familiar with the basics of Vault, the -[documentation](/docs/index.html) provides a better reference guide for all +[documentation](/docs) provides a better reference guide for all available features as well as internals. ## What is Vault? @@ -34,7 +34,7 @@ detailed audit logs is almost impossible without a custom solution. This is where Vault steps in. Examples work best to showcase Vault. Please see the -[use cases](/intro/use-cases.html). +[use cases](/intro/use-cases). The key features of Vault are: @@ -68,9 +68,9 @@ The key features of Vault are: ## Next Steps -See the page on [Vault use cases](/intro/use-cases.html) to see the +See the page on [Vault use cases](/intro/use-cases) to see the multiple ways Vault can be used. Then see -[how Vault compares to other software](/intro/vs/index.html) +[how Vault compares to other software](/intro/vs) to see how it fits into your existing infrastructure. Finally, continue onwards with -the [getting started guide](/intro/getting-started/index.html) to use +the [getting started guide](/intro/getting-started) to use Vault to read, write, and create real secrets and see how it works in practice. diff --git a/website/pages/guides/encryption/index.mdx b/website/pages/guides/encryption/index.mdx index 832921910..afab8b877 100644 --- a/website/pages/guides/encryption/index.mdx +++ b/website/pages/guides/encryption/index.mdx @@ -16,19 +16,19 @@ data is encrypted and the attacker would never get a hold of the raw data. This guide walks you through Encryption as a Service topics. -- [Encryption as a Service](/guides/encryption/transit.html) guide walks you +- [Encryption as a Service](/guides/encryption/transit) guide walks you through the usage of the `transit` secrets engine in Vault. Read this guide first before proceeding to the [Transit Secrets - Re-wrapping](/guides/encryption/transit-rewrap.html) guide or [Java Application - Demo](/guides/encryption/spring-demo.html) guide. + Re-wrapping](/guides/encryption/transit-rewrap) guide or [Java Application + Demo](/guides/encryption/spring-demo) guide. -- [Java Application Demo](/guides/encryption/spring-demo.html) guide walks +- [Java Application Demo](/guides/encryption/spring-demo) guide walks through a sample application which relies on Vault to generate database credentials as well as encrypting sensitive data. This guide is for anyone who wishes to reproduce the demo introduced in the [Manage secrets, access, and encryption in the public cloud with Vault](https://www.hashicorp.com/resources/solutions-engineering-webinar-series-episode-2-vault) webinar. -- [Transit Secrets Re-wrapping](/guides/encryption/transit-rewrap.html) guide +- [Transit Secrets Re-wrapping](/guides/encryption/transit-rewrap) guide demonstrates one possible way to re-wrap data after rotating an encryption key in the transit engine in Vault. diff --git a/website/pages/guides/encryption/spring-demo.mdx b/website/pages/guides/encryption/spring-demo.mdx index 159d91d21..780a142c3 100644 --- a/website/pages/guides/encryption/spring-demo.mdx +++ b/website/pages/guides/encryption/spring-demo.mdx @@ -29,13 +29,13 @@ environment. ## Reference Material -- [Encryption as a Service](/guides/encryption/transit.html) +- [Encryption as a Service](/guides/encryption/transit) - [Manage secrets, access, and encryption in the public cloud with Vault](https://www.hashicorp.com/resources/solutions-engineering-webinar-series-episode-2-vault) - [Spring Cloud Vault](https://cloud.spring.io/spring-cloud-vault/) -- [Transit Secrets Engine](/docs/secrets/transit/index.html) -- [Secrets as a Service: Dynamic Secrets](/guides/secret-mgmt/dynamic-secrets.html) +- [Transit Secrets Engine](/docs/secrets/transit) +- [Secrets as a Service: Dynamic Secrets](/guides/secret-mgmt/dynamic-secrets) ## Estimated Time to Complete @@ -62,7 +62,7 @@ Vault. To perform the tasks described in this guide: -- Install [HashiCorp Vagrant](https://www.vagrantup.com/intro/getting-started/install.html) +- Install [HashiCorp Vagrant](https://www.vagrantup.com/intro/getting-started/install) - Clone or download the demo assets from the [hashicorp/vault-guides](https://github.com/hashicorp/vault-guides/tree/master/secrets/spring-cloud-vault) GitHub repository @@ -405,7 +405,7 @@ dynamically created by the database secret engine. ~> **NOTE:** To learn more about the database secret engine, read the [Secrets as a Service: Dynamic -Secrets](/guides/secret-mgmt/dynamic-secrets.html) guide. +Secrets](/guides/secret-mgmt/dynamic-secrets) guide. Enter `\q` to exit out of the `psql` session, or you can open another terminal and SSH into the demo virtual machine. @@ -676,8 +676,8 @@ folder provides you with some guidance. ## Next steps -[AppRole](/docs/auth/approle.html) is an authentication mechanism within Vault +[AppRole](/docs/auth/approle) is an authentication mechanism within Vault to allow machines or apps to acquire a token to interact with Vault. Read the -[AppRole Pull Authentication](/guides/identity/authentication.html) guide +[AppRole Pull Authentication](/guides/identity/authentication) guide which introduces the steps to generate tokens for machines or apps by enabling AppRole auth method. diff --git a/website/pages/guides/encryption/transit-rewrap.mdx b/website/pages/guides/encryption/transit-rewrap.mdx index 11e6e52f2..b4c0cfdd0 100644 --- a/website/pages/guides/encryption/transit-rewrap.mdx +++ b/website/pages/guides/encryption/transit-rewrap.mdx @@ -16,7 +16,7 @@ is stored elsewhere. The primary use of this is to allow applications to encrypt their data while still storing it in their primary data store. Vault does not store the data. -The [`transit` secret engine](/docs/secrets/transit/index.html) handles +The [`transit` secret engine](/docs/secrets/transit) handles cryptographic functions on data-in-transit, and often referred to as **_Encryption as a Service_** (EaaS). Both small amounts of arbitrary data, and large files such as images, can be protected with the transit engine. This EaaS @@ -37,9 +37,9 @@ rotating an encryption key in the transit engine in Vault. ## Reference Material -- [Encryption as a Service](/guides/encryption/transit.html) -- [Transit Secret Engine](/docs/secrets/transit/index.html) -- [Transit Secret Engine API](/api/secret/transit/index.html) +- [Encryption as a Service](/guides/encryption/transit) +- [Transit Secret Engine](/docs/secrets/transit) +- [Transit Secret Engine API](/api/secret/transit) - [Transparent Data Encryption in the Modern Datacenter](https://www.hashicorp.com/blog/transparent-data-encryption-in-the-modern-datacenter) ## Estimated Time to Complete @@ -99,9 +99,9 @@ particular organization or application. To perform the tasks described in this guide, you need to have a Vault environment. Refer to the [Getting -Started](/intro/getting-started/install.html) guide to install Vault. Make sure +Started](/intro/getting-started/install) guide to install Vault. Make sure that your Vault server has been [initialized and -unsealed](/intro/getting-started/deploy.html). +unsealed](/intro/getting-started/deploy). The following tools are required in order to successfully run the sample application provided in this guide: @@ -160,7 +160,7 @@ path "auth/token/create" { ``` If you are not familiar with policies, complete the -[policies](/guides/identity/policies.html) guide. +[policies](/guides/identity/policies) guide. ## Steps @@ -235,7 +235,7 @@ $ curl --header "X-Vault-Token: " \ ``` Where `` is your valid token, and `` holds [configuration -parameters](/api/system/mounts.html#enable-secrets-engine) of the secret engine. +parameters](/api/system/mounts#enable-secrets-engine) of the secret engine. To crate a new encryption key, use the `transit/keys/` endpoint: @@ -247,7 +247,7 @@ $ curl --header "X-Vault-Token: " \ ``` Where `` holds [configuration -parameters](/api/secret/transit/index.html#create-key) to specify the key type. +parameters](/api/secret/transit#create-key) to specify the key type. **Example:** @@ -620,7 +620,7 @@ mysql> SELECT * FROM user_data WHERE dob LIKE "vault:v6%" limit 10; An application similar to this could be scheduled via cron, run periodically as a [Nomad batch -job](https://www.nomadproject.io/docs/job-specification/periodic.html), or +job](https://www.nomadproject.io/docs/job-specification/periodic), or executed in a variety of other ways. You could also modify it to re-wrap a limited number of records at a time so as to not put undue strain on the database. The final implementation should be based upon the needs and design @@ -632,9 +632,9 @@ Since the main focus of this guide was to programmatically rewrap your secrets using the latest encryption key, the token used by the sample application was generated manually. In a production environment, you'll want to pass the token in a more secure manner. Refer to the [Cubbyhole Response -Wrapping](/guides/secret-mgmt/cubbyhole.html) guide to wrap the token so that only the +Wrapping](/guides/secret-mgmt/cubbyhole) guide to wrap the token so that only the expecting app can unwrap to obtain the token. Also, refer to the [AppRole Pull -Authentication](/guides/identity/authentication.html) to generate tokens for +Authentication](/guides/identity/authentication) to generate tokens for apps using the AppRole auth method. diff --git a/website/pages/guides/encryption/transit.mdx b/website/pages/guides/encryption/transit.mdx index c4eba5892..2e09f36e7 100644 --- a/website/pages/guides/encryption/transit.mdx +++ b/website/pages/guides/encryption/transit.mdx @@ -21,8 +21,8 @@ onto the operators of Vault. ## Reference Materials -- [Transit Secret Engine](/docs/secrets/transit/index.html) -- [Transit Secret Engine API](/api/secret/transit/index.html) +- [Transit Secret Engine](/docs/secrets/transit) +- [Transit Secret Engine API](/api/secret/transit) - [Transparent Data Encryption in the Modern Datacenter](https://www.hashicorp.com/blog/transparent-data-encryption-in-the-modern-datacenter) ~> **NOTE:** An [interactive @@ -67,9 +67,9 @@ This guide demonstrates the basics of the `transit` secrets engine. To perform the tasks described in this guide, you need to have a Vault environment. Refer to the [Getting -Started](/intro/getting-started/install.html) guide to install Vault. Make sure +Started](/intro/getting-started/install) guide to install Vault. Make sure that your Vault server has been [initialized and -unsealed](/intro/getting-started/deploy.html). +unsealed](/intro/getting-started/deploy). ### Policy requirements @@ -99,7 +99,7 @@ path "transit/*" { ``` If you are not familiar with policies, complete the -[policies](/guides/identity/policies.html) guide. +[policies](/guides/identity/policies) guide. ## Steps @@ -151,7 +151,7 @@ $ curl --header "X-Vault-Token: " \ ``` Where `` is your valid token, and `` holds [configuration -parameters](/api/system/mounts.html#enable-secrets-engine) of the secret engine. +parameters](/api/system/mounts#enable-secrets-engine) of the secret engine. **Example:** @@ -231,7 +231,7 @@ database) or pass it to another application. #### API call using cURL To encrypt your secret, use the [`transit/encrypt` -endpoint](/api/secret/transit/index.html#encrypt-data). +endpoint](/api/secret/transit#encrypt-data). **Example:** @@ -484,7 +484,7 @@ plaintext with the newest key in the keyring. (**Persona:** operator) The operators can [update the encryption key -configuration](/api/secret/transit/index.html#update-key-configuration) to +configuration](/api/secret/transit#update-key-configuration) to specify the minimum version of ciphertext allowed to be decrypted, the minimum version of the key that can be used to encrypt the plaintext, the key is allowed to be deleted, etc. @@ -615,6 +615,6 @@ versions (`5` and `6`). ## Next steps -[Transit Secrets Re-wrapping](/guides/encryption/transit-rewrap.html) guide +[Transit Secrets Re-wrapping](/guides/encryption/transit-rewrap) guide introduces a sample application which re-wraps data after rotating an encryption key in the transit engine in Vault. diff --git a/website/pages/guides/getting-started/index.mdx b/website/pages/guides/getting-started/index.mdx index e3c6bdb62..d0649a1c6 100644 --- a/website/pages/guides/getting-started/index.mdx +++ b/website/pages/guides/getting-started/index.mdx @@ -8,6 +8,6 @@ description: This section takes you to the Getting Started section. # Vault Getting Started Welcome to the Vault guides section! If you are just getting started with Vault, -please start with the [Vault introduction](/intro/getting-started/install.html) +please start with the [Vault introduction](/intro/getting-started/install) instead and then continue on to the guides. The guides provide examples of common Vault workflows and actions for both beginner and advanced Vault users. diff --git a/website/pages/guides/identity/approle-trusted-entities.mdx b/website/pages/guides/identity/approle-trusted-entities.mdx index 78a0d057e..e83eec449 100644 --- a/website/pages/guides/identity/approle-trusted-entities.mdx +++ b/website/pages/guides/identity/approle-trusted-entities.mdx @@ -12,7 +12,7 @@ description: |- # Vault AppRole with Terraform and Chef Demo In the [AppRole Pull -Authentication](/guides/identity/authentication.html#advanced-features) guide, +Authentication](/guides/identity/authentication#advanced-features) guide, the question of how best to deliver the Role ID and Secret ID were brought up, and the role of trusted entities (Terraform, Chef, Nomad, Kubernetes, etc.) was mentioned. @@ -21,7 +21,7 @@ mentioned. This _intermediate_ Vault guide aims to provide a **simple**, **end-to-end** example of how to use Vault's [AppRole authentication -method](/docs/auth/approle.html), along with Terraform and Chef, to address the +method](/docs/auth/approle), along with Terraform and Chef, to address the challenge of the **_secure introduction_** of an initial token to a target system. @@ -37,7 +37,7 @@ webinar. ## Reference Material -- [AppRole Auth Method](/docs/auth/approle.html) +- [AppRole Auth Method](/docs/auth/approle) - [Authenticating Applications with HashiCorp Vault AppRole](https://www.hashicorp.com/blog/authenticating-applications-with-vault-approle) - [Delivering Secret Zero: Vault AppRole with Terraform and Chef](https://www.hashicorp.com/resources/delivering-secret-zero-vault-approle-terraform-chef) @@ -60,7 +60,7 @@ or deliver the `RoleID` and `SecretID` to our target systems. Use _Trusted Entities_ to deliver the AppRole authentication values. For example, use Terraform to deliver your `RoleID` or embed it into your AMI or Dockerfile. Then you might use Jenkins or Chef to obtain the -[response-wrapped](/guides/secret-mgmt/cubbyhole.html) `SecretID` and deliver it +[response-wrapped](/guides/secret-mgmt/cubbyhole) `SecretID` and deliver it to the target system. AppRole allows us to securely introduce the authentication token to the target @@ -265,7 +265,7 @@ First, initialize and unseal the Vault server using a shortcut. ~> This is a convenient shortcut for demo. **_DO NOT DO THIS IN PRODUCTION!!!_** -Refer to the [online documentation for initializing and unsealing](/intro/getting-started/deploy.html#initializing-the-vault) Vault for more details. +Refer to the [online documentation for initializing and unsealing](/intro/getting-started/deploy#initializing-the-vault) Vault for more details. ```shell # Initialize the Vault server and write out the unseal keys and root token into files @@ -321,8 +321,7 @@ $ curl --silent \ $VAULT_ADDR/v1/sys/policy/app-1-secret-read ``` -
-\*\*CLI command\*\* +**CLI command** ```bash # Policy to apply to AppRole token @@ -358,8 +357,7 @@ $ curl --silent \ $VAULT_ADDR/v1/sys/auth/approle ``` -
-\*\*CLI command\*\* +**CLI command** ```plaintext $ vault auth enable -description="Demo AppRole auth method" approle @@ -398,8 +396,7 @@ $ curl --silent \ $VAULT_ADDR/v1/auth/approle/role/app-1 ``` -
-\*\*CLI command\*\* +**CLI command** ```bash # TTL is set to 10 minutes, and Max TTL to be 30 minutes @@ -507,8 +504,7 @@ $ cat roleid-token.json | jq } ``` -
-\*\*CLI command\*\* +**CLI command** ```bash # Policy file granting to retrieve RoleID from Vault @@ -627,8 +623,7 @@ $ cat secretid-token.json | jq } ``` -
-\*\*CLI command\*\* +**CLI command** ```bash # Policy file granting to retrieve SecretID @@ -759,8 +754,7 @@ $ curl --silent \ } ``` -
-\*\*CLI command\*\* +**CLI command** ```bash # Write some demo secrets diff --git a/website/pages/guides/identity/authentication.mdx b/website/pages/guides/identity/authentication.mdx index 89bc34dee..ffcaed99d 100644 --- a/website/pages/guides/identity/authentication.mdx +++ b/website/pages/guides/identity/authentication.mdx @@ -10,7 +10,7 @@ description: |- # Authentication Before a client can interact with Vault, it must authenticate against an [**auth -method**](/docs/auth/index.html) to acquire a token. This token has policies attached so +method**](/docs/auth) to acquire a token. This token has policies attached so that the behavior of the client can be governed. Since tokens are the core method for authentication within Vault, there is a @@ -22,20 +22,20 @@ auth method responsible for creating and storing tokens. Auth methods perform authentication to verify the user or machine-supplied information. Some of the supported auth methods are targeted towards users while others are targeted toward machines or apps. For example, -[**LDAP**](/docs/auth/ldap.html) auth method enables user authentication using -an existing LDAP server while [**AppRole**](/docs/auth/approle.html) auth +[**LDAP**](/docs/auth/ldap) auth method enables user authentication using +an existing LDAP server while [**AppRole**](/docs/auth/approle) auth method is recommended for machines or apps. -The [Getting Started](/intro/getting-started/authentication.html) guide walks you +The [Getting Started](/intro/getting-started/authentication) guide walks you through how to enable the GitHub auth method for user authentication. This introductory guide focuses on generating tokens for machines or apps by -enabling the [**AppRole**](/docs/auth/approle.html) auth method. +enabling the [**AppRole**](/docs/auth/approle) auth method. ## Reference Material -- [AppRole Auth Method](/docs/auth/approle.html) -- [AppRole Auth Method (API)](/api/auth/approle/index.html) +- [AppRole Auth Method](/docs/auth/approle) +- [AppRole Auth Method (API)](/api/auth/approle) - [Authenticating Applications with HashiCorp Vault AppRole](https://www.hashicorp.com/blog/authenticating-applications-with-vault-approle) ## Estimated Time to Complete @@ -76,9 +76,9 @@ which path. To perform the tasks described in this guide, you need to have a Vault environment. Refer to the [Getting -Started](/intro/getting-started/install.html) guide to install Vault. Make sure +Started](/intro/getting-started/install) guide to install Vault. Make sure that your Vault server has been [initialized and -unsealed](/intro/getting-started/deploy.html). +unsealed](/intro/getting-started/deploy). ### Policy requirements @@ -119,11 +119,11 @@ path "secret/mysql/*" { ``` If you are not familiar with policies, complete the -[policies](/guides/identity/policies.html) guide. +[policies](/guides/identity/policies) guide. ## Steps -[AppRole](/docs/auth/approle.html) is an authentication mechanism within Vault +[AppRole](/docs/auth/approle) is an authentication mechanism within Vault to allow machines or apps to acquire a token to interact with Vault. It uses **Role ID** and **Secret ID** for login. @@ -172,7 +172,7 @@ $ curl --header "X-Vault-Token: " \ ``` Where `` is your valid token, and `` holds [configuration -parameters](/api/system/auth.html#enable-auth-method) of the method. +parameters](/api/system/auth#enable-auth-method) of the method. **Example:** @@ -226,19 +226,19 @@ $ vault write auth/approle/role/ [parameters] ``` > There are a number of -> [parameters](/api/auth/approle/index.html#create-new-approle) that you can set +> [parameters](/api/auth/approle#create-new-approle) that you can set > on a role. If you want to limit the use of the generated secret ID, set > `secret_id_num_uses` or `secret_id_ttl` parameter values. Similarly, you can > specify `token_num_uses` and `token_ttl`. You may never want the app token to > expire. In such a case, specify the `period` so that the token generated by > this AppRole is a periodic token. To learn more about periodic token, refer to -> the [Tokens and Leases](/guides/identity/lease.html#step4) guide. +> the [Tokens and Leases](/guides/identity/lease#step4) guide. **Example:** The following example creates a role named `jenkins` with `jenkins` policy attached. (NOTE: This example creates a role operates in [**pull** -mode](/docs/auth/approle.html).) +mode](/docs/auth/approle).) ```shell $ vault write auth/approle/role/jenkins policies="jenkins" @@ -286,7 +286,7 @@ Now, you are ready to create a role. The following example creates a role named `jenkins` with a `jenkins` policy attached. (NOTE: This example creates a role which operates in [**pull** -mode](/docs/auth/approle.html).) +mode](/docs/auth/approle).) ```shell $ curl --header "X-Vault-Token: ..." --request POST \ @@ -295,13 +295,13 @@ $ curl --header "X-Vault-Token: ..." --request POST \ ``` > There are a number of -> [parameters](/api/auth/approle/index.html#create-new-approle) that you can set +> [parameters](/api/auth/approle#create-new-approle) that you can set > on a role. If you want to limit the use of the generated secret ID, set > `secret_id_num_uses` or `secret_id_ttl` parameter values. Similarly, you can > specify `token_num_uses` and `token_ttl`. You may never want the app token to > expire. In such a case, specify the `period` so that the token generated by > this AppRole is a periodic token. To learn more about periodic tokens, refer to -> the [Tokens and Leases](/guides/identity/lease.html#step4) guide. +> the [Tokens and Leases](/guides/identity/lease#step4) guide. **NOTE:** To attach multiple policies, pass the policy names as a comma separated string. @@ -371,7 +371,7 @@ $ vault write -f auth/approle/role//secret-id NOTE: The `-f` flag forces the `write` operation to continue without any data values specified. Alternatively, you can set -[parameters](/api/auth/approle/index.html#generate-new-secret-id) such as +[parameters](/api/auth/approle#generate-new-secret-id) such as `cidr_list`. **Example:** @@ -412,7 +412,7 @@ $ curl --header "X-Vault-Token:..." \ ``` You can pass -[parameters](/api/auth/approle/index.html#generate-new-secret-id) in the request +[parameters](/api/auth/approle#generate-new-secret-id) in the request payload, or invoke the API with an empty payload. **Example:** @@ -610,7 +610,7 @@ exists on the virtual machine. ![AppRole auth method workflow](/img/vault-approle-workflow2.png) The secret ID can be delivered using [**response -wrapping**](/docs/concepts/response-wrapping.html) to transmit the _reference_ +wrapping**](/docs/concepts/response-wrapping) to transmit the _reference_ to the secret ID rather than the actual value. In [Step 3](#step3), you executed the following command to retrieve the Secret @@ -657,8 +657,8 @@ b07d7a47-1d0d-741d-20b4-ae0de7c6d964 ## Next steps Read the [_AppRole with Terraform and -Chef_](/guides/identity/approle-trusted-entities.html) guide to better +Chef_](/guides/identity/approle-trusted-entities) guide to better understand the role of trusted entities using Terraform and Chef as an example. To learn more about response wrapping, go to the [Cubbyhole Response -Wrapping](/guides/secret-mgmt/cubbyhole.html) guide. +Wrapping](/guides/secret-mgmt/cubbyhole) guide. diff --git a/website/pages/guides/identity/control-groups.mdx b/website/pages/guides/identity/control-groups.mdx index d8ed2ed9a..93b2750d5 100644 --- a/website/pages/guides/identity/control-groups.mdx +++ b/website/pages/guides/identity/control-groups.mdx @@ -14,17 +14,17 @@ description: |- Control Groups add additional authorization factors to be required before processing requests to increase the governance, accountability, and security of your secrets. When a control group is required for a request, the requesting -client receives the [wrapping token](/docs/concepts/response-wrapping.html) in +client receives the [wrapping token](/docs/concepts/response-wrapping) in return. Only when all authorizations are satisfied, the wrapping token can be used to unwrap the requested secrets. ## Reference Material -- [Vault Enterprise Control Group Support](/docs/enterprise/control-groups/index.html) -- [Policies](http://localhost:4567/docs/concepts/policies.html) -- [Identity Groups](/docs/secrets/identity/index.html) -- [Control Group API](/api/system/control-group.html) -- [Sentinel Policies](/docs/enterprise/sentinel/index.html) +- [Vault Enterprise Control Group Support](/docs/enterprise/control-groups) +- [Policies](/docs/concepts/policies) +- [Identity Groups](/docs/secrets/identity) +- [Control Group API](/api/system/control-group) +- [Sentinel Policies](/docs/enterprise/sentinel) ## Estimated Time to Complete @@ -66,12 +66,12 @@ To perform the tasks described in this guide, you need to have a **_Vault Enterprise_** environment. This guide assumes that you have some hands-on experience with [ACL -policies](/docs/concepts/policies.html) as well as -[Identities](/docs/secrets/identity/index.html). If you are not familiar, +policies](/docs/concepts/policies) as well as +[Identities](/docs/secrets/identity). If you are not familiar, go through the following guides first: -- [Policies](/guides/identity/policies.html) -- [Identity - Entities & Groups](/guides/identity/identity.html) +- [Policies](/guides/identity/policies) +- [Identity - Entities & Groups](/guides/identity/identity) ### Policy requirements @@ -281,7 +281,7 @@ then login. -> This step only demonstrates CLI commands and Web UI to create entities and groups. Refer to the [Identity - Entities and -Groups](/guides/identity/identity.html) guide if you need the full details. +Groups](/guides/identity/identity) guide if you need the full details. Now you have policies, let's create a user, **`bob`** and an **`acct_manager`** group with **`ellen`** as a group member. @@ -639,7 +639,7 @@ Deploy this policy as an Endpoint Governing Policy attached to "**`EU_GDPR_data/orders/*`**" path. -> Refer to the [Sentinel -Properties](/docs/enterprise/sentinel/properties.html#control-group-properties) +Properties](/docs/enterprise/sentinel/properties#control-group-properties) documentation for the list of available properties associated with control groups. diff --git a/website/pages/guides/identity/identity.mdx b/website/pages/guides/identity/identity.mdx index c43004c73..e94d112c4 100644 --- a/website/pages/guides/identity/identity.mdx +++ b/website/pages/guides/identity/identity.mdx @@ -22,9 +22,9 @@ maintains the clients who are recognized by Vault. ## Reference Material -- [Identity Secrets Engine](/docs/secrets/identity/index.html) -- [Identity Secrets Engine (API)](/api/secret/identity/index.html) -- [External vs Internal Groups](/docs/secrets/identity/index.html#external-vs-internal-groups) +- [Identity Secrets Engine](/docs/secrets/identity) +- [Identity Secrets Engine (API)](/api/secret/identity) +- [External vs Internal Groups](/docs/secrets/identity#external-vs-internal-groups) ~> **NOTE:** An [interactive tutorial](https://www.katacoda.com/hashicorp/scenarios/vault-identity) is @@ -62,9 +62,9 @@ specific users. To perform the tasks described in this guide, you need to have a Vault environment. Refer to the [Getting -Started](/intro/getting-started/install.html) guide to install Vault. Make sure +Started](/intro/getting-started/install) guide to install Vault. Make sure that your Vault server has been [initialized and -unsealed](/intro/getting-started/deploy.html). +unsealed](/intro/getting-started/deploy). ### Policy requirements @@ -129,7 +129,7 @@ path "identity/*" { ``` If you are not familiar with policies, complete the -[policies](/guides/identity/policies.html) guide. +[policies](/guides/identity/policies) guide. ## Steps @@ -184,7 +184,7 @@ path "secret/team-qa" { } ``` -~> **NOTE:** If you are running [K/V Secrets Engine v2](/api/secret/kv/kv-v2.html) +~> **NOTE:** If you are running [K/V Secrets Engine v2](/api/secret/kv/kv-v2) at `secret`, set the policies path accordingly: `secret/data/training_*`, `secret/data/test`, and `secret/data/team-qa`. @@ -1092,5 +1092,5 @@ $ curl --header "X-Vault-Token: ..." \ Now that you have learned about managing user identity using entities and groups, read the [AppRole Pull -Authentication](/guides/identity/authentication.html) guide to learn how apps or +Authentication](/guides/identity/authentication) guide to learn how apps or machines can authenticate with Vault. diff --git a/website/pages/guides/identity/index.mdx b/website/pages/guides/identity/index.mdx index ece0c29ef..c2c60f84b 100644 --- a/website/pages/guides/identity/index.mdx +++ b/website/pages/guides/identity/index.mdx @@ -15,43 +15,43 @@ description: >- This guide walks you through Identity and Access Management topics. -- [Secure Introduction of Vault Clients](/guides/identity/secure-intro.html) +- [Secure Introduction of Vault Clients](/guides/identity/secure-intro) explains the mechanism of the client authentication against a Vault server. -- [Policies](/guides/identity/policies.html) are used to instrument +- [Policies](/guides/identity/policies) are used to instrument Role-Based Access Control (RBAC) by specifying access privileges. Authoring of policies is probably the first step the Vault administrator performs. This guide walks you through creating example policies for `admin` and `provisioner` users. -- [ACL Policy Path Templating](/guides/identity/policy-templating.html) guide +- [ACL Policy Path Templating](/guides/identity/policy-templating) guide demonstrates templated policy paths to allow non-static paths. -- [AppRole Pull Authentication](/guides/identity/authentication.html) guide +- [AppRole Pull Authentication](/guides/identity/authentication) guide that introduces the steps to generate tokens for machines or apps by enabling AppRole auth method. -- [AppRole with Terraform and Chef](/guides/identity/approle-trusted-entities.html) +- [AppRole with Terraform and Chef](/guides/identity/approle-trusted-entities) guide explains how AppRole auth method integrates with Terraform and Chef. This guide is for anyone who wishes to reproduce the demo introduced during the [Delivering Secret Zero: Vault AppRole with Terraform and Chef](https://www.hashicorp.com/resources/delivering-secret-zero-vault-approle-terraform-chef) webinar. -- [Token and Leases](/guides/identity/lease.html) guide helps you +- [Token and Leases](/guides/identity/lease) guide helps you understand how tokens and leases work in Vault. The understanding of the lease hierarchy and expiration mechanism helps you plan for break glass procedures and more. -- [Identity - Entities & Groups](/guides/identity/identity.html) guide +- [Identity - Entities & Groups](/guides/identity/identity) guide demonstrates the usage of _Entities_ and _Groups_ to manage Vault clients' identity. ## Vault Enterprise -- [Sentinel Policies](/guides/identity/sentinel.html) guide +- [Sentinel Policies](/guides/identity/sentinel) guide walks through the creation and usage of _Role Governing Policies_ (RGPs) and _Endpoint Governing Policies_ (EGPs) in Vault. -- [Control Groups](/guides/identity/control-groups.html) can be used to enforce +- [Control Groups](/guides/identity/control-groups) can be used to enforce additional authorization factors before the request can be completed. This guide walks through the implementation of a Control Group. diff --git a/website/pages/guides/identity/lease.mdx b/website/pages/guides/identity/lease.mdx index 086135844..81fb0f348 100644 --- a/website/pages/guides/identity/lease.mdx +++ b/website/pages/guides/identity/lease.mdx @@ -42,12 +42,12 @@ two hours later, `b519c6aa...` will be revoked and takes its child ## Reference Material -- The [Validation](/guides/secret-mgmt/dynamic-secrets.html#validation) section of the - [Secret as a Service](/guides/secret-mgmt/dynamic-secrets.html) guide demonstrates lease +- The [Validation](/guides/secret-mgmt/dynamic-secrets#validation) section of the + [Secret as a Service](/guides/secret-mgmt/dynamic-secrets) guide demonstrates lease renewal and revocation -- [Tokens documentation](/docs/concepts/tokens.html) -- [Token Auth Method (API)](/api/auth/token/index.html) -- [Lease, Renew, and Revoke](/docs/concepts/lease.html) +- [Tokens documentation](/docs/concepts/tokens) +- [Token Auth Method (API)](/api/auth/token) +- [Lease, Renew, and Revoke](/docs/concepts/lease) ~> **NOTE:** An [interactive tutorial](https://www.katacoda.com/hashicorp/scenarios/vault-tokens) is @@ -94,9 +94,9 @@ This also allows for organizations to plan and train for various To perform the tasks described in this guide, you need to have a Vault environment. Refer to the [Getting -Started](/intro/getting-started/install.html) guide to install Vault. Make sure +Started](/intro/getting-started/install) guide to install Vault. Make sure that your Vault server has been [initialized and -unsealed](/intro/getting-started/deploy.html). +unsealed](/intro/getting-started/deploy). ### Policy requirements @@ -136,7 +136,7 @@ path "sys/mounts/database/tune" { ``` If you are not familiar with policies, complete the -[policies](/guides/identity/policies.html) guide. +[policies](/guides/identity/policies) guide. ## Steps @@ -315,7 +315,7 @@ duration (e.g. "1h"). #### API call using cURL Use the `auth/token/create` endpoint to create a new token. There are a number of -optional [parameters](/api/auth/token/index.html#create-token) that you can pass +optional [parameters](/api/auth/token#create-token) that you can pass in the request payload. **Example:** @@ -631,7 +631,7 @@ are talking about long-running apps that need to be able to renew their token indefinitely. -> For more details about AppRole, read the [AppRole Pull -Authentication](/guides/identity/authentication.html) guide. +Authentication](/guides/identity/authentication) guide. To create AppRole periodic tokens, create your AppRole role with `period` specified. @@ -826,5 +826,5 @@ renewable true ## Next steps Now that you have learned the lifecycle of tokens and leases, read the [AppRole Pull -Authentication](/guides/identity/authentication.html) guide to learn how to generate +Authentication](/guides/identity/authentication) guide to learn how to generate tokens for apps or machines. diff --git a/website/pages/guides/identity/policies.mdx b/website/pages/guides/identity/policies.mdx index 649e6edd8..ac4d0c994 100644 --- a/website/pages/guides/identity/policies.mdx +++ b/website/pages/guides/identity/policies.mdx @@ -12,13 +12,13 @@ Role-Based Access Control (RBAC) by specifying access privileges (_authorization_). When you first initialize Vault, the -[**`root`**](/docs/concepts/policies.html#root-policy) policy gets created by +[**`root`**](/docs/concepts/policies#root-policy) policy gets created by default. The `root` policy is a special policy that gives superuser access to _everything_ in Vault. This allows the superuser to set up initial policies, tokens, etc. In addition, another built-in policy, -[**`default`**](/docs/concepts/policies.html#default-policy), is created. The +[**`default`**](/docs/concepts/policies#default-policy), is created. The `default` policy is attached to all tokens and provides common permissions. Everything in Vault is path based, and admins write policies to grant or forbid @@ -31,7 +31,7 @@ system. Policies written in [HCL](https://github.com/hashicorp/hcl) format are often referred as **_ACL Policies_**. [Sentinel](https://www.hashicorp.com/sentinel) is another framework for policy which is available in [Vault -Enterprise](/docs/enterprise/index.html). Since Sentinel is an enterprise-only +Enterprise](/docs/enterprise). Since Sentinel is an enterprise-only feature, this guide focuses on writing ACL policies as a foundation. **NOTE:** HCL is JSON compatible; therefore, JSON can be used as completely @@ -39,9 +39,9 @@ valid input. ## Reference Material -- [Policies](/docs/concepts/policies.html#default-policy) documentation -- [Policy API](/api/system/policy.html) documentation -- [Getting Started guide](/intro/getting-started/policies.html) on policies +- [Policies](/docs/concepts/policies#default-policy) documentation +- [Policy API](/api/system/policy) documentation +- [Getting Started guide](/intro/getting-started/policies) on policies ~> **NOTE:** An [interactive tutorial](https://www.katacoda.com/hashicorp/scenarios/vault-policies) is @@ -81,9 +81,9 @@ Vault. To perform the tasks described in this guide, you need to have a Vault environment. Refer to the [Getting -Started](/intro/getting-started/install.html) guide to install Vault. Make sure +Started](/intro/getting-started/install) guide to install Vault. Make sure that your Vault server has been [initialized and -unsealed](/intro/getting-started/deploy.html). +unsealed](/intro/getting-started/deploy). ### Policy requirements @@ -193,7 +193,7 @@ path "" { namespacing. For example, "`secret/training_*`" grants permissions on any path starting with "`secret/training_`" (e.g. `secret/training_vault`). -Define one or more [capabilities](/docs/concepts/policies.html#capabilities) on each path to control operations that are +Define one or more [capabilities](/docs/concepts/policies#capabilities) on each path to control operations that are permitted. | Capability | Associated HTTP verbs | @@ -376,7 +376,7 @@ passing your modified policy (`*.hcl`). #### API call using cURL To create a policy, use the -[`sys/policies/acl`](/api/system/policies.html#create-update-acl-policy) +[`sys/policies/acl`](/api/system/policies#create-update-acl-policy) endpoint: ```shell @@ -390,7 +390,7 @@ Where `` is your valid token, and `` includes the policy name an stringified policy. -> **NOTE:** To create ACL policies, you can use the -[`sys/policy`](/api/system/policy.html) endpoint as well. +[`sys/policy`](/api/system/policy) endpoint as well. **Example:** @@ -639,8 +639,8 @@ $ curl --request POST --header "X-Vault-Token: ..." \ ## Next steps In this guide, you learned how to write policies based on given policy -requirements. Next, the [AppRole Pull Authentication](/guides/identity/authentication.html) +requirements. Next, the [AppRole Pull Authentication](/guides/identity/authentication) guide demonstrates how to associate policies to a role. To learn about Sentinel policies, refer to the [Sentinel -Policies](/guides/identity/sentinel.html) guide. +Policies](/guides/identity/sentinel) guide. diff --git a/website/pages/guides/identity/policy-templating.mdx b/website/pages/guides/identity/policy-templating.mdx index b1f29f4db..0d7bd6ed4 100644 --- a/website/pages/guides/identity/policy-templating.mdx +++ b/website/pages/guides/identity/policy-templating.mdx @@ -14,7 +14,7 @@ by specifying access privileges (_authorization_). Since everything in Vault is path based, policy authors must be aware of all existing paths as well as paths to be created. -The [Policies](/guides/identity/policies.html) guide walks you through the +The [Policies](/guides/identity/policies) guide walks you through the creation of ACL policies in Vault. -> This guide highlights the use of ACL templating which was introduced in @@ -22,9 +22,9 @@ creation of ACL policies in Vault. ## Reference Material -- [Templated Policies](/docs/concepts/policies.html#templated-policies) -- [Policy API](/api/system/policy.html) -- [Identity: Entities and Groups](/guides/identity/identity.html) +- [Templated Policies](/docs/concepts/policies#templated-policies) +- [Policy API](/api/system/policy) +- [Identity: Entities and Groups](/guides/identity/identity) - [Streamline Secrets Management with Vault Agent and Vault 0.11](https://youtu.be/zDnIqSB4tyA?t=24m37s) ~> **NOTE:** An [interactive @@ -55,7 +55,7 @@ This makes many management and delegation tasks challenging. For example, allowing a user to change their own password by invoking the `auth/userpass/users//password` endpoint can require either a policy for _every user_ or requires the use of Sentinel which is a part of [Vault -Enterprise](/docs/enterprise/sentinel/index.html). +Enterprise](/docs/enterprise/sentinel). ## Solution @@ -63,14 +63,14 @@ As of **Vault 0.11**, ACL templating capability is available to allow a subset of user information to be used within ACL policy paths. -> **NOTE:** This feature leverages [Vault -Identities](/docs/secrets/identity/index.html) to inject values into ACL policy +Identities](/docs/secrets/identity) to inject values into ACL policy paths. ## Prerequisites To perform the tasks described in this guide, you need to have an environment with **Vault 0.11** or later. Refer to the [Getting -Started](/intro/getting-started/install.html) guide to install Vault. +Started](/intro/getting-started/install) guide to install Vault. Alternately, you can use the [Vault Playground](https://www.katacoda.com/hashicorp/scenarios/vault-playground) @@ -79,13 +79,13 @@ environment. ~> This guide assumes that you know how to create ACL policies. If you don't, go through the interactive [Policy tutorial](https://www.katacoda.com/hashicorp/scenarios/vault-policies) or -[Policies](/guides/identity/policies.html) guide first. +[Policies](/guides/identity/policies) guide first. ### Policy requirements Since this guide demonstrates the creation of an `admin` policy, log in with the `root` token if possible. Otherwise, refer to the policy requirement in the -[Policies](/guides/identity/policies.html#policy-requirements) guide. +[Policies](/guides/identity/policies#policy-requirements) guide. ## Steps @@ -274,7 +274,7 @@ as its group member. -> This step only demonstrates CLI commands and Web UI to create entities and groups. Refer to the [Identity - Entities and -Groups](/guides/identity/identity.html) guide if you need the full details. +Groups](/guides/identity/identity) guide if you need the full details. - [CLI command](#step3-cli) - [Web UI](#step3-ui) @@ -607,4 +607,4 @@ off](/img/vault-acl-templating-3.png) ## Next steps To learn about Sentinel policies to implement finer-grained policies, refer to -the [Sentinel Policies](/guides/identity/sentinel.html) guide. +the [Sentinel Policies](/guides/identity/sentinel) guide. diff --git a/website/pages/guides/identity/secure-intro.mdx b/website/pages/guides/identity/secure-intro.mdx index e3de93c37..35dce373f 100644 --- a/website/pages/guides/identity/secure-intro.mdx +++ b/website/pages/guides/identity/secure-intro.mdx @@ -25,7 +25,7 @@ introduction_** challenge. The Vault authentication process verifies the secret consumer's identity and then generate a **token** to associate with that identity. -[Tokens](/docs/concepts/tokens.html) are the core method for authentication +[Tokens](/docs/concepts/tokens) are the core method for authentication within Vault which means that the secret consumer must first acquire a valid token. @@ -88,9 +88,9 @@ can leverage the corresponding auth method to authenticate with Vault. ### Reference Materials: -- [AWS Auth Method](/docs/auth/aws.html) -- [Azure Auth Method](/docs/auth/azure.html) -- [GCP Auth Method](/docs/auth/gcp.html) +- [AWS Auth Method](/docs/auth/aws) +- [Azure Auth Method](/docs/auth/azure) +- [GCP Auth Method](/docs/auth/gcp) ## Trusted Orchestrator @@ -123,12 +123,12 @@ this model can be applied regardless of where the applications are running. ### Reference Materials: -- [AppRole Auth Method](/docs/auth/approle.html) - - [AppRole Pull Authentication](/guides/identity/authentication.html) - - [AppRole with Terraform and Chef Demo](/guides/identity/approle-trusted-entities.html) -- [TLS Certificates Auth Method](/docs/auth/cert.html) -- [Token Auth Method](/docs/auth/token.html) - - [Cubbyhole Response Wrapping](/guides/secret-mgmt/cubbyhole.html) +- [AppRole Auth Method](/docs/auth/approle) + - [AppRole Pull Authentication](/guides/identity/authentication) + - [AppRole with Terraform and Chef Demo](/guides/identity/approle-trusted-entities) +- [TLS Certificates Auth Method](/docs/auth/cert) +- [Token Auth Method](/docs/auth/token) + - [Cubbyhole Response Wrapping](/guides/secret-mgmt/cubbyhole) ## Vault Agent @@ -139,8 +139,7 @@ orchestrator](#trusted-orchestrator) approaches. #### Vault agent auto-auth: -- Automatically authenticates to Vault for those [supported auth - methods](/docs/agent/autoauth/methods/index.html) +- Automatically authenticates to Vault for those [supported auth methods](/docs/agent/autoauth/methods) - Keeps token renewed (re-authenticates as needed) until the renewal is no longer allowed - Designed with robustness and fault tolerance @@ -148,7 +147,7 @@ orchestrator](#trusted-orchestrator) approaches. ![Vault Agent](/img/vault-secure-intro-5.png) To leverage this feature, run the vault binary in agent mode (`vault agent -config=`) on the client. The agent configuration file must specify -the auth method and [sink](/docs/agent/autoauth/sinks/index.html) locations +the auth method and [sink](/docs/agent/autoauth/sinks) locations where the token to be written. When the agent is started, it will attempt to acquire a Vault token using the @@ -165,8 +164,8 @@ handles the login and token refresh logic. ### Reference Materials: - [Streamline Secrets Management with Vault Agent and Vault 0.11](https://youtu.be/zDnIqSB4tyA) -- [Vault Agent documentation](/docs/agent/index.html) -- [Auto-Auth documentation](/docs/agent/autoauth/index.html) +- [Vault Agent documentation](/docs/agent) +- [Auto-Auth documentation](/docs/agent/autoauth) ## Next steps diff --git a/website/pages/guides/identity/sentinel.mdx b/website/pages/guides/identity/sentinel.mdx index 3e7ec530f..a6c691b8c 100644 --- a/website/pages/guides/identity/sentinel.mdx +++ b/website/pages/guides/identity/sentinel.mdx @@ -23,16 +23,16 @@ Policies (EGPs)** can be defined using Sentinel: - EGPs are tied to particular paths (e.g. `aws/creds/`) > This guide walks you through the authoring of Sentinel policies in Vault. For -> ACL policy authoring, refer to the [Policies](/guides/identity/policies.html) +> ACL policy authoring, refer to the [Policies](/guides/identity/policies) > guide. ## Reference Material - [Sentinel Getting Started Guide](https://docs.hashicorp.com/sentinel/intro/getting-started/first-policy) - [Sentinel](https://docs.hashicorp.com/sentinel/) documentation -- [Vault Sentinel](/docs/enterprise/sentinel/index.html) documentation +- [Vault Sentinel](/docs/enterprise/sentinel) documentation - [Security and Fundamentals at Scale with Vault](https://www.youtube.com/watch?time_continue=121&v=yiPbKICFkvQ) -- [Identity - Entities and Groups](/guides/identity/identity.html) guide +- [Identity - Entities and Groups](/guides/identity/identity) guide ## Estimated Time to Complete @@ -191,7 +191,7 @@ main = rule when precond { > **NOTE:** The **`main`** has conditional rule (`when precond`) to ensure that > the rule gets evaluated only if the request is relevant. -~> Refer to the [Sentinel Properties](/docs/enterprise/sentinel/properties.html) +~> Refer to the [Sentinel Properties](/docs/enterprise/sentinel/properties) documentation for available properties which Vault injects to Sentinel to allow fine-grained controls. @@ -200,7 +200,7 @@ fine-grained controls. You can test the Sentinel policies prior to deployment in orders to validate syntax and to document expected behavior. -1. First, you need to download the [Sentinel simulator](https://docs.hashicorp.com/sentinel/downloads.html). +1. First, you need to download the [Sentinel simulator](https://docs.hashicorp.com/sentinel/downloads). **Example:** @@ -583,6 +583,6 @@ $ curl --header "X-Vault-Token: ..." \ ## Next steps -Refer to the [Sentinel Properties](/docs/enterprise/sentinel/properties.html) +Refer to the [Sentinel Properties](/docs/enterprise/sentinel/properties) documentation for the full list of properties available in Vault to write fine-grained policies to meet your organizational policy requirements. diff --git a/website/pages/guides/index.mdx b/website/pages/guides/index.mdx index b0985b153..7a2095018 100644 --- a/website/pages/guides/index.mdx +++ b/website/pages/guides/index.mdx @@ -20,4 +20,4 @@ procedures can be complex, so our goal is to provide guidance to do them safely. -> Please visit [_Katacoda_](https://www.katacoda.com/hashicorp) where a series of interactive tutorials are waiting for you to get started on learning Vault. -[intro]: /intro/index.html +[intro]: /intro diff --git a/website/pages/guides/operations/autounseal-aws-kms.mdx b/website/pages/guides/operations/autounseal-aws-kms.mdx index 26ce62629..bb5e5d766 100644 --- a/website/pages/guides/operations/autounseal-aws-kms.mdx +++ b/website/pages/guides/operations/autounseal-aws-kms.mdx @@ -13,7 +13,7 @@ description: |- ~> **Enterprise Only:** Vault auto-unseal feature is a part of _Vault Enterprise Pro_. When a Vault server is started, it starts in a -[**_sealed_**](/docs/concepts/seal.html) state and it does not know how to +[**_sealed_**](/docs/concepts/seal) state and it does not know how to decrypt data. Before any operation can be performed on the Vault, it must be unsealed. Unsealing is the process of constructing the master key necessary to decrypt the data encryption key. @@ -26,8 +26,8 @@ instance that can utilize an encryption key from [AWS Key Management Services ## Reference Material -- [Vault Auto Unseal](/docs/configuration/seal/index.html) -- [Configuration: `awskms` Seal](/docs/configuration/seal/awskms.html) +- [Vault Auto Unseal](/docs/configuration/seal) +- [Configuration: `awskms` Seal](/docs/configuration/seal/awskms) ## Estimated Time to Complete @@ -63,7 +63,7 @@ This guide assumes the following: - Access to **Vault Enterprise 0.9.0 or later** - A URL to download Vault Enterprise from (an Amazon S3 bucket will suffice) - AWS account for provisioning cloud resources -- [Terraform installed](https://www.terraform.io/intro/getting-started/install.html) +- [Terraform installed](https://www.terraform.io/intro/getting-started/install) and basic understanding of its usage ### Download demo assets @@ -254,7 +254,7 @@ ui=true ``` Notice the Vault configuration file defines the [`awskms` -stanza](/docs/configuration/seal/awskms.html) which sets the AWS KMS key ID to +stanza](/docs/configuration/seal/awskms) which sets the AWS KMS key ID to use for encryption and decryption. At this point, you should be able to launch the Vault Enterprise UI by entering @@ -276,5 +276,5 @@ $ rm -rf .terraform terraform.tfstate* private.key ## Next steps Once you have a Vault environment setup, the next step is to write policies. -Read [Policies](/guides/identity/policies.html) to learn how to write policies +Read [Policies](/guides/identity/policies) to learn how to write policies to govern the behavior of clients. diff --git a/website/pages/guides/operations/deployment-guide.mdx b/website/pages/guides/operations/deployment-guide.mdx index 95253ddd4..01e8848b0 100644 --- a/website/pages/guides/operations/deployment-guide.mdx +++ b/website/pages/guides/operations/deployment-guide.mdx @@ -10,19 +10,19 @@ ea_version: 1 # Vault Deployment Guide -This deployment guide covers the steps required to install and configure a single HashiCorp Vault cluster as defined in the [Vault Reference Architecture](/guides/operations/reference-architecture.html). +This deployment guide covers the steps required to install and configure a single HashiCorp Vault cluster as defined in the [Vault Reference Architecture](/guides/operations/reference-architecture). Below are instructions for installing and configuring Vault on Linux hosts running the systemd system and service manager. ## Reference Material -This deployment guide is designed to work in combination with the [Vault Reference Architecture](/guides/operations/reference-architecture.html). Although not a strict requirement to follow the Vault Reference Architecture, please ensure you are familiar with the overall architecture design; for example installing Vault on multiple physical or virtual (with correct anti-affinity) hosts for high-availability and using Consul for the HA and storage backend. +This deployment guide is designed to work in combination with the [Vault Reference Architecture](/guides/operations/reference-architecture). Although not a strict requirement to follow the Vault Reference Architecture, please ensure you are familiar with the overall architecture design; for example installing Vault on multiple physical or virtual (with correct anti-affinity) hosts for high-availability and using Consul for the HA and storage backend. -During the installation of Vault you should also review and apply the recommendations provided in the [Vault Production Hardening](/guides/operations/production.html) guide. +During the installation of Vault you should also review and apply the recommendations provided in the [Vault Production Hardening](/guides/operations/production) guide. ## Overview -To provide a highly-available single cluster architecture, we recommend Vault be deployed to more than one host, as shown in the [Vault Reference Architecture](/guides/operations/reference-architecture.html), and connected to a Consul cluster for persistent data storage. +To provide a highly-available single cluster architecture, we recommend Vault be deployed to more than one host, as shown in the [Vault Reference Architecture](/guides/operations/reference-architecture), and connected to a Consul cluster for persistent data storage. ![Reference Diagram](/img/vault-ref-arch-2-02305ae7.png) @@ -39,7 +39,7 @@ The below setup steps should be completed on all Vault hosts. Precompiled Vault binaries are available for download at [https://releases.hashicorp.com/vault/](https://releases.hashicorp.com/vault/) and Vault Enterprise binaries are available for download by following the instructions made available to HashiCorp Vault customers. -You should perform checksum verification of the zip packages using the SHA256SUMS and SHA256SUMS.sig files available for the specific release version. HashiCorp provides [a guide on checksum verification](https://www.hashicorp.com/security.html) for precompiled binaries. +You should perform checksum verification of the zip packages using the SHA256SUMS and SHA256SUMS.sig files available for the specific release version. HashiCorp provides [a guide on checksum verification](https://www.hashicorp.com/security) for precompiled binaries. ```text VAULT_VERSION="0.10.3" @@ -93,7 +93,7 @@ Add the below configuration to the Vault service file: ```text [Unit] Description="HashiCorp Vault - A tool for managing secrets" -Documentation=https://www.vaultproject.io/docs/ +Documentation=https://vaultproject.io/docs/ Requires=network-online.target After=network-online.target ConditionFileNotEmpty=/etc/vault.d/vault.hcl @@ -142,7 +142,7 @@ The following parameters are set for the `[Service]` stanza: - [`ExecReload`](https://www.freedesktop.org/software/systemd/man/systemd.service.html#ExecReload=) - Send vault a HUP signal to trigger a configuration reload in vault - [`KillMode`](https://www.freedesktop.org/software/systemd/man/systemd.kill.html#KillMode=) - Treat vault as a single process - [`KillSignal`](https://www.freedesktop.org/software/systemd/man/systemd.kill.html#KillSignal=) - Send SIGINT signal when shutting down vault -- [`Restart`](https://www.freedesktop.org/software/systemd/man/systemd.service.html#RestartSec=) - Restart vault ([in a sealed state](/docs/concepts/seal.html)) unless it returned a clean exit code +- [`Restart`](https://www.freedesktop.org/software/systemd/man/systemd.service.html#RestartSec=) - Restart vault ([in a sealed state](/docs/concepts/seal)) unless it returned a clean exit code - [`RestartSec`](https://www.freedesktop.org/software/systemd/man/systemd.service.html#RestartSec=) - Restart vault after 5 seconds of it being considered 'failed' - [`TimeoutStopSec`](https://www.freedesktop.org/software/systemd/man/systemd.service.html#TimeoutStopSec=) - Wait 30 seconds for a clean stop before sending a SIGKILL signal - [`StartLimitIntervalSec`, `StartLimitBurst`](https://www.freedesktop.org/software/systemd/man/systemd.unit.html#StartLimitIntervalSec=interval) - Limit vault to three start attempts in 60 seconds @@ -153,7 +153,7 @@ The following parameters are set for the `[Install]` stanza: ## Configure Consul -When using Consul as the storage backend for Vault, we recommend using Consul's [ACL system](https://www.consul.io/docs/guides/acl.html) to restrict access to the path where Vault stores data. This access restriction is an added security measure in addition to the [encryption Vault uses to protect data](/docs/internals/architecture.html) written to the storage backend. +When using Consul as the storage backend for Vault, we recommend using Consul's [ACL system](https://www.consul.io/docs/guides/acl.html) to restrict access to the path where Vault stores data. This access restriction is an added security measure in addition to the [encryption Vault uses to protect data](/docs/internals/architecture) written to the storage backend. The Consul website provides documentation on [bootstrapping the ACL system](https://www.consul.io/docs/guides/acl.html#bootstrapping-acls), generating a management token and using that token to add some initial tokens for Consul agents, UI access etc. You should complete the bootstrapping section of the Consul documentation before continuing with this guide. @@ -226,11 +226,11 @@ listener "tcp" { The following parameters are set for the `tcp` listener stanza: -- [`address`](/docs/configuration/listener/tcp.html#address) `(string: "127.0.0.1:8200")` - Changing from the loopback address to allow external access to the Vault UI -- [`tls_cert_file`](/docs/configuration/listener/tcp.html#tls_cert_file) `(string: , reloads-on-SIGHUP)` - Must be set when using TLS -- [`tls_key_file`](/docs/configuration/listener/tcp.html#tls_key_file) `(string: , reloads-on-SIGHUP)` - Must be set when using TLS +- [`address`](/docs/configuration/listener/tcp#address) `(string: "127.0.0.1:8200")` - Changing from the loopback address to allow external access to the Vault UI +- [`tls_cert_file`](/docs/configuration/listener/tcp#tls_cert_file) `(string: , reloads-on-SIGHUP)` - Must be set when using TLS +- [`tls_key_file`](/docs/configuration/listener/tcp#tls_key_file) `(string: , reloads-on-SIGHUP)` - Must be set when using TLS -[More information about tcp listener configuration](/docs/configuration/listener/tcp.html). +[More information about tcp listener configuration](/docs/configuration/listener/tcp). ~> Vault should always be configured to use TLS to provide secure communication between clients and the Vault cluster. This requires a certificate file and key file be installed on each Linux host running Vault. The certificate file and key file must have permissions allowing the vault user/group to read them. @@ -240,7 +240,7 @@ This is an **ENTERPRISE** feature. If you are deploying [Vault Enterprise](https://www.hashicorp.com/products/vault), you can include `seal` stanza configuration to specify the seal type to use for additional data protection, such as using HSM or Cloud KMS solutions to encrypt and decrypt the Vault master key. This stanza is optional, and if this is not configured, Vault will use the Shamir algorithm to cryptographically split the master key. -If you are deploying Vault Enterprise, you should review the [seal configuration section](/docs/configuration/seal/index.html) of our documentation. +If you are deploying Vault Enterprise, you should review the [seal configuration section](/docs/configuration/seal) of our documentation. An example PKCS #11 compatible HSM example is: @@ -268,9 +268,9 @@ storage "consul" { The following parameters are set for the `consul` storage stanza: -- [`token`](/docs/configuration/storage/consul.html#token) `(string: "")` - Specify the Consul ACL token with permission to read and write from `/vault` in Consul's key-value store +- [`token`](/docs/configuration/storage/consul#token) `(string: "")` - Specify the Consul ACL token with permission to read and write from `/vault` in Consul's key-value store -[More information about consul storage configuration](/docs/configuration/storage/consul.html). +[More information about consul storage configuration](/docs/configuration/storage/consul). ~> Vault should always be configured to use a Consul token with a restrictive ACL policy to read and write from `/vault` in Consul's key-value store. This follows the principal of least privilege, ensuring Vault is unable to access Consul key-value data stored outside of the `/vault` path. @@ -278,7 +278,7 @@ The following parameters are set for the `consul` storage stanza: The `telemetry` stanza specifies various configurations for Vault to publish metrics to upstream systems. -If you decide to configure Vault to publish telemetry data, you should review the [telemetry configuration section](/docs/configuration/telemetry.html) of our documentation. +If you decide to configure Vault to publish telemetry data, you should review the [telemetry configuration section](/docs/configuration/telemetry) of our documentation. ### High Availability Parameters @@ -306,7 +306,7 @@ Optionally, add the below configuration to the Vault configuration file to enabl ui = true ``` -[More information about configuring the Vault UI](/docs/configuration/ui/index.html). +[More information about configuring the Vault UI](/docs/configuration/ui). ## Start Vault @@ -320,5 +320,5 @@ sudo systemctl status vault ## Next Steps -- Read [Production Hardening](/guides/operations/production.html) to learn best +- Read [Production Hardening](/guides/operations/production) to learn best practices for a production hardening deployment of Vault. diff --git a/website/pages/guides/operations/disaster-recovery.mdx b/website/pages/guides/operations/disaster-recovery.mdx index 4d4da3f47..6905f951c 100644 --- a/website/pages/guides/operations/disaster-recovery.mdx +++ b/website/pages/guides/operations/disaster-recovery.mdx @@ -28,16 +28,16 @@ service read or write requests until they are promoted and become a new primary - they essentially act as a warm standby cluster. -The [Mount Filter](/guides/operations/mount-filter.html) guide provides step-by-step +The [Mount Filter](/guides/operations/mount-filter) guide provides step-by-step instructions on setting up performance replication. This guide focuses on DR replication setup. ## Reference Materials -- [Performance Replication and Disaster Recovery (DR) Replication](/docs/enterprise/replication/index.html#performance-replication-and-disaster-recovery-dr-replication) -- [DR Replication API](/api/system/replication-dr.html) -- [Replication Setup & Guidance](/guides/operations/replication.html) -- [Vault HA guide](/guides/operations/vault-ha-consul.html) +- [Performance Replication and Disaster Recovery (DR) Replication](/docs/enterprise/replication#performance-replication-and-disaster-recovery-dr-replication) +- [DR Replication API](/api/system/replication-dr) +- [Replication Setup & Guidance](/guides/operations/replication) +- [Vault HA guide](/guides/operations/vault-ha-consul) ## Estimated Time to Complete @@ -255,7 +255,7 @@ inoperable. Refer to the [_Important Note about Automated DR Failover_](#important) section for more background information. First, you must generate a **DR operation token** which you need to promote the -secondary cluster. The process, outlined below using API calls, is the similar to [_Generating a Root Token (via CLI)_](/guides/operations/generate-root.html). +secondary cluster. The process, outlined below using API calls, is the similar to [_Generating a Root Token (via CLI)_](/guides/operations/generate-root). #### From Terminal @@ -432,7 +432,7 @@ secondary cluster. The process, outlined below using API calls, is the similar t > Once the secondary cluster was successfully promoted, you should be able to > log in using the original primary cluster's root token or via configured > authentication method. If desired, generate a [new root -> token](/guides/operations/generate-root.html). +> token](/guides/operations/generate-root). ### Step 4: Demote DR Primary to Secondary @@ -585,11 +585,11 @@ which allows the customer to write their own logic about automating some of these operations based on experience within their own environments. You can review the available replication APIs at the following links: -- [Vault Replication API](/api/system/replication.html) -- [DR Replication API](/api/system/replication-dr.html) -- [Performance Replication API](/api/system/replication-performance.html) +- [Vault Replication API](/api/system/replication) +- [DR Replication API](/api/system/replication-dr) +- [Performance Replication API](/api/system/replication-performance) ## Next steps -Read [Production Hardening](/guides/operations/production.html) to learn more +Read [Production Hardening](/guides/operations/production) to learn more about the guidance on hardening the production deployments of Vault. diff --git a/website/pages/guides/operations/generate-root.mdx b/website/pages/guides/operations/generate-root.mdx index 20107151f..b963543f1 100644 --- a/website/pages/guides/operations/generate-root.mdx +++ b/website/pages/guides/operations/generate-root.mdx @@ -154,4 +154,4 @@ In this method, an OTP is XORed with the generated token on final output. d0f71e9b-ebff-6d8a-50ae-b8859f2e5671 ``` -[root-tokens]: /docs/concepts/tokens.html#root-tokens +[root-tokens]: /docs/concepts/tokens#root-tokens diff --git a/website/pages/guides/operations/index.mdx b/website/pages/guides/operations/index.mdx index 5aa232487..f6d5aa2ad 100644 --- a/website/pages/guides/operations/index.mdx +++ b/website/pages/guides/operations/index.mdx @@ -13,69 +13,69 @@ Vault Operations guides address Vault infrastructure discussions. These guides are designed to help the operations team to plan and install a Vault cluster that meets your organization's needs. -- [Vault Reference Architecture](/guides/operations/reference-architecture.html) +- [Vault Reference Architecture](/guides/operations/reference-architecture) guide provides guidance in the best practices of _Vault Enterprise_ implementations through use of a reference architecture. This example is to convey a general architecture, which is likely to be adapted to accommodate the specific needs of each implementation. -- [Vault Deployment Guide](/guides/operations/deployment-guide.html) covers the +- [Vault Deployment Guide](/guides/operations/deployment-guide) covers the steps required to install and configure a single HashiCorp Vault cluster as defined in the Vault Reference Architecture. -- [Vault HA with Consul](/guides/operations/vault-ha-consul.html) guide +- [Vault HA with Consul](/guides/operations/vault-ha-consul) guide walks you through a simple Vault HA cluster implementation which is backed by - [HashiCorp Consul](https://www.consul.io/intro/index.html). + [HashiCorp Consul](https://www.consul.io/intro/index). -- [Production Hardening](/guides/operations/production.html) guide provides +- [Production Hardening](/guides/operations/production) guide provides guidance on best practices for a production hardened deployment of Vault. - The recommendations are based on the [security model](/docs/internals/security.html) + The recommendations are based on the [security model](/docs/internals/security) and focus on defense in depth. -- [Root Token Generation](/guides/operations/generate-root.html) guide +- [Root Token Generation](/guides/operations/generate-root) guide demonstrates the workflow of regenerating root tokens. It is considered to be a best practice not to persist the initial **root** token. If a root token needs to be regenerated, this guide helps you walk through the task. -- [Rekeying & Rotating](/guides/operations/rekeying-and-rotating.html) guide +- [Rekeying & Rotating](/guides/operations/rekeying-and-rotating) guide provides a high-level overview of Shamir's Secret Sharing Algorithm, and how to perform _rekey_ and _rotate_ operations in Vault. -- [Building Plugin Backends](/guides/operations/plugin-backends.html) guide +- [Building Plugin Backends](/guides/operations/plugin-backends) guide provides steps to build, register, and mount non-database external plugin backends. ## Vault Enterprise -- [Replication Setup & Guidance](/guides/operations/replication.html) +- [Replication Setup & Guidance](/guides/operations/replication) walks you through the commands to activate the Vault servers in replication mode. - Please note that [Vault Replication](/docs/vault-enterprise/replication/index.html) + Please note that [Vault Replication](/docs/vault-enterprise/replication) is a Vault Enterprise feature. -- [Disaster Recovery Replication Setup](/guides/operations/disaster-recovery.html) +- [Disaster Recovery Replication Setup](/guides/operations/disaster-recovery) guide provides step-by-step instruction of setting up a disaster recovery (DR) cluster. -- [Mount Filter](/guides/operations/mount-filter.html) +- [Mount Filter](/guides/operations/mount-filter) guide demonstrates how to selectively filter out secret engines from being replicated across clusters. This feature can help organizations to comply with **_General Data Protection Regulation (GDPR)_**. -- [Performance Standby Nodes](/guides/operations/performance-nodes.html) guide +- [Performance Standby Nodes](/guides/operations/performance-nodes) guide describes how Vault HA works with performance standby nodes. -- [Multi-Tenant Pattern with Namespaces](/guides/operations/multi-tenant.html) +- [Multi-Tenant Pattern with Namespaces](/guides/operations/multi-tenant) guide discuss a pattern to isolate secrets using ACL Namespaces. -- [Vault Auto-unseal using AWS Key Management Service (KMS)](/guides/operations/autounseal-aws-kms.html) guide demonstrates an example of +- [Vault Auto-unseal using AWS Key Management Service (KMS)](/guides/operations/autounseal-aws-kms) guide demonstrates an example of how to use Terraform to provision an instance that utilizes an encryption key from AWS Key Management Service (KMS). -- [Seal Wrap / FIPS 140-2](/guides/operations/seal-wrap.html) +- [Seal Wrap / FIPS 140-2](/guides/operations/seal-wrap) guide demonstrates how Vault's seal wrap feature works to encrypt your secrets leveraging FIPS 140-2 certified HSM. -- [Vault Cluster Monitoring Guide](/guides/operations/monitoring.html) walks +- [Vault Cluster Monitoring Guide](/guides/operations/monitoring) walks you through Vault cluster monitoring with telemetry collected by [Telegraf](https://www.influxdata.com/time-series-platform/telegraf/) and forwarded to diff --git a/website/pages/guides/operations/monitoring.mdx b/website/pages/guides/operations/monitoring.mdx index 877b5bcf9..50c30a20b 100644 --- a/website/pages/guides/operations/monitoring.mdx +++ b/website/pages/guides/operations/monitoring.mdx @@ -22,6 +22,6 @@ The guide walks you through: ## Reference Materials -- [Vault Deployment Reference Architecture](/guides/operations/reference-architecture.html) -- [Vault High Availability](/guides/operations/vault-ha-consul.html) -- [Production Hardening](/guides/operations/production.html) +- [Vault Deployment Reference Architecture](/guides/operations/reference-architecture) +- [Vault High Availability](/guides/operations/vault-ha-consul) +- [Production Hardening](/guides/operations/production) diff --git a/website/pages/guides/operations/mount-filter.mdx b/website/pages/guides/operations/mount-filter.mdx index d95dd6deb..c4b822535 100644 --- a/website/pages/guides/operations/mount-filter.mdx +++ b/website/pages/guides/operations/mount-filter.mdx @@ -27,8 +27,8 @@ control the movement of secrets across their infrastructure. - Preparing for GDPR Compliance with HashiCorp Vault [webinar](https://www.hashicorp.com/resources/preparing-for-gdpr-compliance-with-hashicorp-vault) - Preparing for GDPR Compliance with HashiCorp Vault [blog post](https://www.hashicorp.com/blog/preparing-for-gdpr-compliance-with-hashicorp-vault) -- [Create Mounts Filter (API)](/api/system/replication-performance.html#create-mounts-filter) -- [Performance Replication and Disaster Recovery (DR) Replication](/docs/enterprise/replication/index.html#performance-replication-and-disaster-recovery-dr-replication) +- [Create Mounts Filter (API)](/api/system/replication-performance#create-mounts-filter) +- [Performance Replication and Disaster Recovery (DR) Replication](/docs/enterprise/replication#performance-replication-and-disaster-recovery-dr-replication) ## Estimated Time to Complete @@ -310,7 +310,7 @@ $ vault auth enable userpass $ vault write auth/userpass/users/james password="passw0rd" policy="admin" ``` --> Alternatively, you can [generate a new root token](/guides/operations/generate-root.html) +-> Alternatively, you can [generate a new root token](/guides/operations/generate-root) using the primary cluster's unseal key. However, it is recommended that root tokens are only used for just enough initial setup or in emergencies. @@ -501,5 +501,5 @@ you won't be able to see it from the primary cluster. ## Next steps Read [Vault Deployment Reference -Architecture](/guides/operations/reference-architecture.html) to learn more +Architecture](/guides/operations/reference-architecture) to learn more about the recommended deployment practices. diff --git a/website/pages/guides/operations/multi-tenant.mdx b/website/pages/guides/operations/multi-tenant.mdx index 1e7b3c712..8e042bcea 100644 --- a/website/pages/guides/operations/multi-tenant.mdx +++ b/website/pages/guides/operations/multi-tenant.mdx @@ -17,10 +17,10 @@ isolation and ensure teams can self-manage their own environments. ## Reference Material -- [Namespaces](/docs/enterprise/namespaces/index.html) +- [Namespaces](/docs/enterprise/namespaces) - [Streamline Secrets Management with Vault Agent and Vault 0.11](https://youtu.be/zDnIqSB4tyA) -- [Vault Deployment Reference Architecture](/guides/operations/reference-architecture.html) -- [Policies](/guides/identity/policies.html) guide +- [Vault Deployment Reference Architecture](/guides/operations/reference-architecture) +- [Policies](/guides/identity/policies) guide ## Estimated Time to Complete @@ -440,7 +440,7 @@ over. -> This step only demonstrates CLI commands and Web UI to create entities and groups. Refer to the [Identity - Entities and -Groups](/guides/identity/identity.html) guide if you need the full details. +Groups](/guides/identity/identity) guide if you need the full details. Also, read the [Additional Discussion](#additional-discussion) section for an example of setting up external groups. @@ -990,6 +990,6 @@ isolated from one another to ensure a secure multi-tenant environment. ## Next steps -Refer to the [Sentinel Policies](/guides/identity/sentinel.html) guide if you +Refer to the [Sentinel Policies](/guides/identity/sentinel) guide if you need to write policies that allow you to embed finer control over the user access across those namespaces. diff --git a/website/pages/guides/operations/performance-nodes.mdx b/website/pages/guides/operations/performance-nodes.mdx index c35e26b00..7a4f9cd6a 100644 --- a/website/pages/guides/operations/performance-nodes.mdx +++ b/website/pages/guides/operations/performance-nodes.mdx @@ -12,7 +12,7 @@ description: |- ~> **Enterprise Only:** Performance Standby Nodes feature is a part of _Vault Enterprise_. -In [Vault High Availability](/guides/operations/vault-ha-consul.html) guide, it +In [Vault High Availability](/guides/operations/vault-ha-consul) guide, it was explained that only one Vault server will be _active_ in a cluster and handles **all** requests (reads and writes). The rest of the servers become the _standby_ nodes and simply forward requests to the _active_ node. @@ -22,7 +22,7 @@ _standby_ nodes and simply forward requests to the _active_ node. If you are running **_Vault Enterprise_ 0.11** or later with the Consul storage backend, those standby nodes can handle most read-only requests. For example, performance standbys can handle encryption/decryption of data using -[transit](/docs/secrets/transit/index.html) keys, GET requests of key/value +[transit](/docs/secrets/transit) keys, GET requests of key/value secrets and other requests that do not change underlying storage. This can provide considerable improvements in throughput for traffic of this type, resulting in aggregate performance increase linearly correlated to the number @@ -30,17 +30,17 @@ of performance standby nodes deployed in a cluster. ## Reference Materials -- [Performance Standby Nodes](/docs/enterprise/performance-standby/index.html) -- [High Availability Mode](/docs/concepts/ha.html) -- [Consul Storage Backend](/docs/configuration/storage/consul.html) -- [Vault Reference Architecture](/guides/operations/reference-architecture.html) +- [Performance Standby Nodes](/docs/enterprise/performance-standby) +- [High Availability Mode](/docs/concepts/ha) +- [Consul Storage Backend](/docs/configuration/storage/consul) +- [Vault Reference Architecture](/guides/operations/reference-architecture) ## Server Configuration Performance standbys are enabled by default when the Vault Enterprise license includes this feature. If you wish to disable the performance standbys, you can do so by setting the -[`disable_performance_standby`](/docs/configuration/index.html#vault-enterprise-parameters) +[`disable_performance_standby`](/docs/configuration#vault-enterprise-parameters) flag to `true`. Since any of the nodes in a cluster can get elected as active, it is recommended @@ -79,5 +79,5 @@ process read-only requests. However, the _standby_ nodes running on VM 6 and VM ## Next steps -Read [Production Hardening](/guides/operations/production.html) to learn best +Read [Production Hardening](/guides/operations/production) to learn best practices for a production hardening deployment of Vault. diff --git a/website/pages/guides/operations/plugin-backends.mdx b/website/pages/guides/operations/plugin-backends.mdx index 84d354ea7..0de35c33f 100644 --- a/website/pages/guides/operations/plugin-backends.mdx +++ b/website/pages/guides/operations/plugin-backends.mdx @@ -120,5 +120,5 @@ $ vault secrets disable my-secrets-plugin Success! Disabled the secrets engine (if it existed) at: my-secrets-plugin/ ``` -[plugin-system]: /docs/internals/plugins.html -[database-backend]: /docs/secrets/databases/index.html +[plugin-system]: /docs/internals/plugins +[database-backend]: /docs/secrets/databases diff --git a/website/pages/guides/operations/production.mdx b/website/pages/guides/operations/production.mdx index ae4c20cba..91bebc915 100644 --- a/website/pages/guides/operations/production.mdx +++ b/website/pages/guides/operations/production.mdx @@ -11,7 +11,7 @@ description: >- This guide provides guidance on best practices for a production hardened deployment of Vault. The recommendations are based on the [security -model](/docs/internals/security.html) and focus on defense in depth. +model](/docs/internals/security) and focus on defense in depth. ~> **Apply When Possible!** This guide is meant to provide guidance for an _ideal_ deployment of Vault, not to document requirements. It is entirely @@ -50,7 +50,7 @@ and practical. still have sensitive data in memory to function. Risk of exposure should be minimized by disabling swap to prevent the operating system from paging sensitive data to disk. Vault attempts to ["memory lock" to physical memory - automatically](/docs/configuration/index.html#disable_mlock), but disabling + automatically](/docs/configuration#disable_mlock), but disabling swap adds another layer of defense. - **Don't Run as Root**. Vault is designed to run as an unprivileged user, and @@ -82,13 +82,13 @@ and practical. code](https://www.hashicorp.com/blog/codifying-vault-policies-and-configuration/), and using version control to manage policies. Once setup, the root token should be revoked to eliminate the risk of exposure. Root tokens can be - [generated when needed](/guides/operations/generate-root.html), and should be + [generated when needed](/guides/operations/generate-root), and should be revoked as soon as possible. - **Enable Auditing**. Vault supports several auditing backends. Enabling auditing provides a history of all operations performed by Vault and provides a forensics trail in the case of misuse or compromise. Audit logs [securely - hash](/docs/audit/index.html) any sensitive data, but access should still be + hash](/docs/audit) any sensitive data, but access should still be restricted to prevent any unintended disclosures. - **Upgrade Frequently**. Vault is actively developed, and updating frequently @@ -105,18 +105,18 @@ and practical. - **Restrict Storage Access**. Vault encrypts all data at rest, regardless of which storage backend is used. Although the data is encrypted, an [attacker - with arbitrary control](/docs/internals/security.html) can cause data + with arbitrary control](/docs/internals/security) can cause data corruption or loss by modifying or deleting keys. Access to the storage backend should be restricted to only Vault to avoid unauthorized access or operations. - **Disable Shell Command History**. You may want the `vault` command itself to - not appear in history at all. Refer to [additional methods](/guides/secret-mgmt/static-secrets.html#additional-discussion) + not appear in history at all. Refer to [additional methods](/guides/secret-mgmt/static-secrets#additional-discussion) for guidance. - **Tweak ulimits**. It is possible that your Linux distribution has strict process `ulimits`. Consider to review `ulimits` for maximum amount of open files, connections, etc. before going into production; they may need increasing. -- **Docker Containers**. To leverage the ["memory lock"](/docs/configuration/index.html#disable_mlock) +- **Docker Containers**. To leverage the ["memory lock"](/docs/configuration#disable_mlock) feature inside the Vault container you will likely need to use the `overlayfs2` or another supporting driver. diff --git a/website/pages/guides/operations/reference-architecture.mdx b/website/pages/guides/operations/reference-architecture.mdx index c628d1d13..685e1d9a8 100644 --- a/website/pages/guides/operations/reference-architecture.mdx +++ b/website/pages/guides/operations/reference-architecture.mdx @@ -27,7 +27,7 @@ The following topics are addressed in this guide: - [Additional References](#additional-references) -> This document assumes Vault uses Consul as the [storage -backend](/docs/internals/architecture.html) since that is the recommended +backend](/docs/internals/architecture) since that is the recommended storage backend for production deployments. ## Deployment Topology within One Datacenter @@ -38,7 +38,7 @@ cluster replication. ### Reference Diagram -Eight Nodes with [Consul Storage Backend](/docs/configuration/storage/consul.html) +Eight Nodes with [Consul Storage Backend](/docs/configuration/storage/consul) ![Reference diagram](/img/vault-ref-arch-2.png) #### Design Summary @@ -60,7 +60,7 @@ such as an AWS Region. The diagram below shows Vault and Consul spread between AZs, with Consul servers in Redundancy Zone configurations, promoting a single voting member per AZ, providing both Zone and Node level failure protection. --> Refer to the online documentation to learn more about the [Consul leader election process](https://www.consul.io/docs/guides/leader-election.html). +-> Refer to the online documentation to learn more about the [Consul leader election process](https://www.consul.io/docs/guides/leader-election). ![Failure tolerance|40%](/img/vault-ref-arch-3.png) @@ -143,7 +143,7 @@ in some cloud providers. ### Other Considerations -[Vault Production Hardening Recommendations](/guides/operations/production.html) +[Vault Production Hardening Recommendations](/guides/operations/production) provides guidance on best practices for a production hardened deployment of Vault. @@ -200,8 +200,8 @@ listen vault There are two supported methods for handling client IP addressing behind a proxy or load balancer; -[X-Forwarded-For Headers](https://www.vaultproject.io/docs/configuration/listener/tcp.html#x_forwarded_for_authorized_addrs) -and [PROXY v1](https://www.vaultproject.io/docs/configuration/listener/tcp.html#proxy_protocol_authorized_addrs). Both require a trusted load balancer and require IP address whitelisting to +[X-Forwarded-For Headers](/docs/configuration/listener/tcp#x_forwarded_for_authorized_addrs) +and [PROXY v1](/docs/configuration/listener/tcp#proxy_protocol_authorized_addrs). Both require a trusted load balancer and require IP address whitelisting to adhere to security best practices. ### High Availability @@ -212,10 +212,10 @@ backend. With this configuration, during a Vault server outage, failover is handled immediately without human intervention. To learn more about setting up your Vault servers in HA mode, read [_Vault HA -with Consul_](/guides/operations/vault-ha-consul.html) guide. +with Consul_](/guides/operations/vault-ha-consul) guide. > High-availability with [Performance Standby -> Nodes](/guides/operations/performance-nodes.html) and data-locality across +> Nodes](/guides/operations/performance-nodes) and data-locality across > datacenters requires Vault Enterprise. ## Deployment Topology for Multiple Datacenters @@ -227,9 +227,7 @@ with Consul_](/guides/operations/vault-ha-consul.html) guide. ~> **Enterprise Only:** Vault replication feature is a part of _Vault Enterprise_. HashiCorp Vault Enterprise provides two modes of replication, **performance** -and **disaster recovery**. The [Vault -documentation](/docs/enterprise/replication/index.html) provides more detailed -information on the replication capabilities within Vault Enterprise. +and **disaster recovery**. The [Vault documentation](/docs/enterprise/replication) provides more detailed information on the replication capabilities within Vault Enterprise. ![Replication Pattern](/img/vault-ref-arch-8.png) @@ -239,7 +237,7 @@ Vault performance replication allows for secrets management across many sites. Secrets, authentication methods, authorization policies and other details are replicated to be active and available in multiple locations. --> Refer to the [Vault Mount Filter](/guides/operations/mount-filter.html) guide +-> Refer to the [Vault Mount Filter](/guides/operations/mount-filter) guide about filtering out secret engines from being replicated across regions. #### Disaster Recovery Replication @@ -272,7 +270,7 @@ scenario. ![Replication Pattern](/img/vault-ref-arch-7.png) --> Refer to the [Vault Disaster Recovery Setup](/guides/operations/disaster-recovery.html) guide for additional information. +-> Refer to the [Vault Disaster Recovery Setup](/guides/operations/disaster-recovery) guide for additional information. #### Corruption or Sabotage Disaster Recovery @@ -319,12 +317,12 @@ HSM. ## Additional References -- Vault [architecture](/docs/internals/architecture.html) documentation explains +- Vault [architecture](/docs/internals/architecture) documentation explains each Vault component - To integrate Vault with existing LDAP server, refer to - [LDAP Auth Method](/docs/auth/ldap.html) documentation + [LDAP Auth Method](/docs/auth/ldap) documentation - Refer to the [AppRole Pull - Authentication](/guides/identity/authentication.html) guide to programmatically + Authentication](/guides/identity/authentication) guide to programmatically generate a token for a machine or app - Consul is an integral part of running a resilient Vault cluster, regardless of location. Refer to the online [Consul documentation](https://www.consul.io/intro/getting-started/install.html) to @@ -332,8 +330,8 @@ HSM. ## Next steps -- Read [Production Hardening](/guides/operations/production.html) to learn best +- Read [Production Hardening](/guides/operations/production) to learn best practices for a production hardening deployment of Vault. -- Read [Deployment Guide](/guides/operations/deployment-guide.html) to learn +- Read [Deployment Guide](/guides/operations/deployment-guide) to learn the steps required to install and configure a single HashiCorp Vault cluster. diff --git a/website/pages/guides/operations/rekeying-and-rotating.mdx b/website/pages/guides/operations/rekeying-and-rotating.mdx index e87445e77..a0f0ffe27 100644 --- a/website/pages/guides/operations/rekeying-and-rotating.mdx +++ b/website/pages/guides/operations/rekeying-and-rotating.mdx @@ -20,7 +20,7 @@ In order to prevent no one person from having complete access to the system, Vault employs [Shamir's Secret Sharing Algorithm][shamir]. Under this process, a secret is divided into a subset of parts such that a subset of those parts are needed to reconstruct the original secret. Vault makes heavy use of this -algorithm as part of the [unsealing process](/docs/concepts/seal.html). +algorithm as part of the [unsealing process](/docs/concepts/seal). When a Vault server is first initialized, Vault generates a master key and immediately splits this master key into a series of key shares following diff --git a/website/pages/guides/operations/replication.mdx b/website/pages/guides/operations/replication.mdx index c397d8707..86e4f76fb 100644 --- a/website/pages/guides/operations/replication.mdx +++ b/website/pages/guides/operations/replication.mdx @@ -10,12 +10,12 @@ description: Learn how to set up and manage Vault Enterprise Performance Replica ~> **Enterprise Only:** Vault replication feature is a part of _Vault Enterprise_. If you're unfamiliar with Vault Replication concepts, please first look at the -[general information page](/docs/vault-enterprise/replication/index.html). More +[general information page](/docs/vault-enterprise/replication). More details can be found in the -[replication internals](/docs/internals/replication.html) document. +[replication internals](/docs/internals/replication) document. Vault replication also includes a complete API. For more information, please see -the [Vault Replication API documentation](/api/system/replication.html) +the [Vault Replication API documentation](/api/system/replication) ## Activating Performance Replication @@ -91,7 +91,7 @@ working with both clusters. Vault’s performance replication model is intended to allow horizontally scaling Vault’s functions rather than to act in a strict Disaster Recovery (DR) capacity. For more information on Vault's disaster recovery replication, look at the -[general information page](/docs/vault-enterprise/replication/index.html). +[general information page](/docs/vault-enterprise/replication). As a result, Vault performance replication acts on static items within Vault, meaning information that is not part of Vault’s lease-tracking system. In a practical @@ -172,4 +172,4 @@ Local backend mounts are not replicated and their use will require existing DR mechanisms if DR is necessary in your implementation. If you need true DR, look at the -[general information page](/docs/vault-enterprise/replication/index.html) for information on Vault's disaster recovery replication. +[general information page](/docs/vault-enterprise/replication) for information on Vault's disaster recovery replication. diff --git a/website/pages/guides/operations/seal-wrap.mdx b/website/pages/guides/operations/seal-wrap.mdx index 831520b96..b975a1c65 100644 --- a/website/pages/guides/operations/seal-wrap.mdx +++ b/website/pages/guides/operations/seal-wrap.mdx @@ -10,8 +10,8 @@ description: 'In this guide,' ~> **Enterprise Only:** Vault's HSM auto-unseal and Seal Wrap features are a part of _Vault Enterprise_. -**_Vault Enterprise_** integrates with [HSM platforms](/docs/enterprise/hsm/index.html) -to opt-in automatic [unsealing](/docs/concepts/seal.html#unsealing). +**_Vault Enterprise_** integrates with [HSM platforms](/docs/enterprise/hsm) +to opt-in automatic [unsealing](/docs/concepts/seal#unsealing). HSM integration provides three pieces of special functionality: - **Master Key Wrapping**: Vault protects its master key by transiting it through @@ -36,9 +36,9 @@ operations. ## Reference Material - [HashiCorp + AWS: Integrating CloudHSM with Vault Enterprise](https://www.hashicorp.com/resources/hashicorp-and-aws-integrating-cloudhsm-with-vault-e) webinar -- [Seal Wrap documentation](/docs/enterprise/sealwrap/index.html) -- [Vault Configuration - pkcs11 Seal](/docs/configuration/seal/pkcs11.html) -- [Vault Enterprise HSM Support](/docs/enterprise/hsm/index.html) +- [Seal Wrap documentation](/docs/enterprise/sealwrap) +- [Vault Configuration - pkcs11 Seal](/docs/configuration/seal/pkcs11) +- [Vault Enterprise HSM Support](/docs/enterprise/hsm) - [NIST SC-12: Cryptographic Key Establishment and Management](https://nvd.nist.gov/800-53/Rev4/control/SC-12) - [NIST SC-13: Cryptographic Protection](https://nvd.nist.gov/800-53/Rev4/control/SC-13) @@ -71,7 +71,7 @@ HSM encryption and decryption. #### Benefits of the Seal Wrap: -- Conformance with FIPS 140-2 directives on Key Storage and Key Transport as [certified by Leidos](/docs/enterprise/sealwrap/index.html#fips-140-2-compliance) +- Conformance with FIPS 140-2 directives on Key Storage and Key Transport as [certified by Leidos](/docs/enterprise/sealwrap#fips-140-2-compliance) - Supports FIPS level of security equal to HSM - For example, if you use Level 3 hardware encryption on an HSM, Vault will be using FIPS 140-2 Level 3 cryptography @@ -84,7 +84,7 @@ HSM encryption and decryption. This intermediate operations guide assumes that you have: -- A [supported HSM](/docs/enterprise/hsm/index.html) cluster to be integrated +- A [supported HSM](/docs/enterprise/hsm) cluster to be integrated with Vault - Vault Enterprise Premium @@ -106,7 +106,7 @@ provider. #### Task 1: Write a Vault configuration file To integrate your Vault Enterprise server with an HSM cluster, the configuration -file must define the [`PKCS11 seal` stanza](/docs/configuration/seal/pkcs11.html) +file must define the [`PKCS11 seal` stanza](/docs/configuration/seal/pkcs11) providing necessary connection information. **Example: `config-hsm.hcl`** @@ -156,7 +156,7 @@ The example configuration defines the following in its **`seal`** stanza: ~> **IMPORTANT:** Having Vault generate its own key is the easiest way to get up and running, but for security, Vault marks the key as **non-exportable**. If your HSM key backup strategy requires the key to be exportable, you should -generate the key yourself. Refer to the [key generation attributes](/docs/configuration/seal/pkcs11.html#vault-key-generation-attributes). +generate the key yourself. Refer to the [key generation attributes](/docs/configuration/seal/pkcs11#vault-key-generation-attributes). #### Task 2: Initialize your Vault Enterprise server @@ -188,7 +188,7 @@ $ vault server -config=/home/ec2-user/config-hsm.hcl
-In another terminal, set the `VAULT_ADDR` environment variable, and [initialize](/intro/getting-started/deploy.html#initializing-the-vault) your Vault server. +In another terminal, set the `VAULT_ADDR` environment variable, and [initialize](/intro/getting-started/deploy#initializing-the-vault) your Vault server. **Example:** @@ -216,7 +216,7 @@ HSM to decrypt the master key. ~> **NOTE:** When Vault is initialized while using an HSM, rather than unseal keys being returned to the operator, **recovery keys** are returned. These are generated from an internal recovery key that is [split via Shamir's Secret -Sharing](/docs/enterprise/hsm/behavior.html#initialization), similar to Vault's +Sharing](/docs/enterprise/hsm/behavior#initialization), similar to Vault's treatment of unseal keys when running without an HSM. Some Vault operations such as generation of a root token require these recovery keys. @@ -293,7 +293,7 @@ Notice that the `seal_wrap` parameter is set to **`false`**. $ vault secrets enable -path=secret2/ -version=1 -seal-wrap kv ``` -The above command enabled [key/value version 1](/docs/secrets/kv/kv-v1.html) with +The above command enabled [key/value version 1](/docs/secrets/kv/kv-v1) with seal wrap feature enabled. ```plaintext @@ -370,7 +370,7 @@ $ curl --header "X-Vault-Token: ..." \ http://127.0.0.1:8200/v1/sys/mounts/secret2 ``` -The above command enabled [key/value version 1](/docs/secrets/kv/kv-v1.html) with +The above command enabled [key/value version 1](/docs/secrets/kv/kv-v1) with seal wrap feature enabled. ```plaintext @@ -610,4 +610,4 @@ with KeyStorage and KeyTransit requirements. This guide used the local file system as the storage backend to keep it simple. To learn more about making your Vault cluster highly available, read the [Vault -HA with Consul](/guides/operations/vault-ha-consul.html) guide. +HA with Consul](/guides/operations/vault-ha-consul) guide. diff --git a/website/pages/guides/operations/vault-ha-consul.mdx b/website/pages/guides/operations/vault-ha-consul.mdx index 993f975d3..73dc856d7 100644 --- a/website/pages/guides/operations/vault-ha-consul.mdx +++ b/website/pages/guides/operations/vault-ha-consul.mdx @@ -30,8 +30,8 @@ redirect requests to the _active_ node. > Nodes** feature is included in _Vault Enterprise Premium_, and also available > for _Vault Enterprise Pro_ with additional fee. This is particularly useful for > processing high volume Encryption as a Service ([Transit secrets -> engine](/docs/secrets/transit/index.html)) requests. Read [Performance Standby -> Nodes](/docs/enterprise/performance-standby/index.html) documentation and a [guide](/guides/operations/performance-nodes.html) for more details. +> engine](/docs/secrets/transit)) requests. Read [Performance Standby +> Nodes](/docs/enterprise/performance-standby) documentation and a [guide](/guides/operations/performance-nodes) for more details. ~> This guide will walk you through a simple Vault Highly Available (HA) cluster implementation. While this is not an exhaustive or prescriptive guide that can @@ -40,9 +40,9 @@ inform your own production setup. ## Reference Materials -- [High Availability Mode](/docs/concepts/ha.html) -- [Consul Storage Backend](/docs/configuration/storage/consul.html) -- [High Availability Parameters](/docs/configuration/index.html#high-availability-parameters) +- [High Availability Mode](/docs/concepts/ha) +- [Consul Storage Backend](/docs/configuration/storage/consul) +- [High Availability Parameters](/docs/configuration#high-availability-parameters) - [Consul Agent Configuration](https://www.consul.io/docs/agent/options.html) ## Estimated Time to Complete @@ -297,7 +297,7 @@ configure local Consul client agents on the Vault servers which will communicate with the Consul server cluster for registering health checks, service discovery, and cluster HA failover coordination (cluster leadership). ~> Note that [it is not recommended to connect the Vault servers directly to the -Consul servers](/docs/configuration/storage/consul.html#address). +Consul servers](/docs/configuration/storage/consul#address). The Consul client agents will be using the same address as the Vault servers for network communication to the Consul server cluster, but they will be binding the @@ -460,9 +460,9 @@ by a label as well: In our configuration file, we'll set up the following: -- [**`tcp`**](/docs/configuration/listener/tcp.html) listener -- [**`consul`**](/docs/configuration/storage/consul.html) storage backend -- [High Availability parameters](/docs/configuration/index.html#high-availability-parameters) +- [**`tcp`**](/docs/configuration/listener/tcp) listener +- [**`consul`**](/docs/configuration/storage/consul) storage backend +- [High Availability parameters](/docs/configuration#high-availability-parameters) This section assumes the Vault binary is located at **`/usr/local/bin/vault`** @@ -490,9 +490,9 @@ We're setting the following parameters for our `tcp` listener: This configuration allows for listening on all interfaces (such that a Vault command against the loopback address would succeed, for example). -We're also explicitly setting Vault's [HA parameters](/docs/configuration/index.html#high-availability-parameters) (`api_addr` and `cluster_addr`). Often, it's not necessary to configure these two parameters when using Consul as Vault's storage backend, as Consul will attempt to automatically discover and advertise the address of the active Vault node. However, certain cluster configurations might require them to be explicitly set (accessing Vault through a load balancer, for example). +We're also explicitly setting Vault's [HA parameters](/docs/configuration#high-availability-parameters) (`api_addr` and `cluster_addr`). Often, it's not necessary to configure these two parameters when using Consul as Vault's storage backend, as Consul will attempt to automatically discover and advertise the address of the active Vault node. However, certain cluster configurations might require them to be explicitly set (accessing Vault through a load balancer, for example). -For the sake of simplicity, we will assume that clients in our scenario connect directly to the Vault nodes (rather than through a load balancer). Review the [Client Redirection](/docs/concepts/ha.html#client-redirection) documentation for more information on client access patterns and their implications. +For the sake of simplicity, we will assume that clients in our scenario connect directly to the Vault nodes (rather than through a load balancer). Review the [Client Redirection](/docs/concepts/ha#client-redirection) documentation for more information on client access patterns and their implications. Note that some values contain variable placeholders while the rest have reasonable defaults. You should replace the following values in your own Vault @@ -602,7 +602,7 @@ Start the Vault service on each system and verify the status: └─2080 /usr/local/bin/vault server -config=/home/ubuntu/vault_nano/config/vault_server.hcl -log-level=debu Now you’ll need to move on to [initializing and -unsealing](/intro/getting-started/deploy.html#initializing-the-vault) each Vault +unsealing](/intro/getting-started/deploy#initializing-the-vault) each Vault instance. Once that is done, check Vault status on each of the servers. @@ -648,5 +648,5 @@ see the standby instance assumes the leadership. ## Next steps -Read [Production Hardening](/guides/operations/production.html) to learn best +Read [Production Hardening](/guides/operations/production) to learn best practices for a production hardening deployment of Vault. diff --git a/website/pages/guides/secret-mgmt/app-integration.mdx b/website/pages/guides/secret-mgmt/app-integration.mdx index 142251687..d3d6a7fef 100644 --- a/website/pages/guides/secret-mgmt/app-integration.mdx +++ b/website/pages/guides/secret-mgmt/app-integration.mdx @@ -42,7 +42,7 @@ applications across systems. - [Consul Template](https://github.com/hashicorp/consul-template) - [Envconsul](https://github.com/hashicorp/consul-template) -- [Secret as a Service: Dynamic Secrets](/guides/secret-mgmt/dynamic-secrets.html) +- [Secret as a Service: Dynamic Secrets](/guides/secret-mgmt/dynamic-secrets) ## Estimated Time to Complete @@ -69,7 +69,7 @@ to make minimal to no code change. To perform the tasks described in this guide, you need: -- A [Vault environment](/intro/getting-started/install.html) +- A [Vault environment](/intro/getting-started/install) - [Consul Template](https://releases.hashicorp.com/consul-template/) - [Envconsul](https://releases.hashicorp.com/envconsul/) - [PostgreSQL](#postgresql) @@ -81,7 +81,7 @@ Template and Envconsul. Therefore, you need a [PostgreSQL](https://www.postgresql.org/download/) server to connect to. ~> Complete the [Secret as a Service: Dynamic -Secrets](/guides/secret-mgmt/dynamic-secrets.html) guide first if you are not +Secrets](/guides/secret-mgmt/dynamic-secrets) guide first if you are not familiar with `database` secrets engine. ### Policy requirements @@ -117,7 +117,7 @@ path "auth/token/create" { ``` If you are not familiar with policies, complete the -[policies](/guides/identity/policies.html) guide. +[policies](/guides/identity/policies) guide. ## Steps @@ -137,12 +137,12 @@ engine using `postgresql-database-plugin` where the database connection URL is `postgresql://root:rootpassword@localhost:5432/myapp`. > **NOTE:** Your database connection URL is most likely different from this -> example. Be sure to use the correct [connection URL](http://localhost:4567/api/secret/databases/postgresql.html#connection_url) to +> example. Be sure to use the correct [connection URL](/api/secret/databases/postgresql#connection_url) to > match your environment. ~> Refer to the [PostgreSQL Database Secrets -Engine](/docs/secrets/databases/postgresql.html) documentation or [Secret as a -Service: Dynamic Secrets](/guides/secret-mgmt/dynamic-secrets.html) guide if you +Engine](/docs/secrets/databases/postgresql) documentation or [Secret as a +Service: Dynamic Secrets](/guides/secret-mgmt/dynamic-secrets) guide if you are not familiar with `database` secrets engine. The detailed description of working with `database` secrets engine is out of scope for this guide. @@ -411,5 +411,5 @@ uppercase. Otherwise, the default uses lowercase (e.g. `database_creds_readonly_ If the integration option is to directly invoke Vault API within your application, refer to the [_AppRole Pull -Authentication_](/guides/identity/authentication.html) guide to learn about the +Authentication_](/guides/identity/authentication) guide to learn about the AppRole auth method which is designed for applications. diff --git a/website/pages/guides/secret-mgmt/cubbyhole.mdx b/website/pages/guides/secret-mgmt/cubbyhole.mdx index ed6060a01..e923dba82 100644 --- a/website/pages/guides/secret-mgmt/cubbyhole.mdx +++ b/website/pages/guides/secret-mgmt/cubbyhole.mdx @@ -22,8 +22,8 @@ long as its policy allows it. ## Reference Material -- [Cubbyhole](/docs/secrets/cubbyhole/index.html) -- [Response Wrapping](/docs/concepts/response-wrapping.html) +- [Cubbyhole](/docs/secrets/cubbyhole) +- [Response Wrapping](/docs/concepts/response-wrapping) ~> **NOTE:** An [interactive tutorial](https://www.katacoda.com/hashicorp/scenarios/vault-cubbyhole) is @@ -44,7 +44,7 @@ The end-to-end scenario described in this guide involves two personas: ## Challenge In order to tightly manage the secrets, you set the scope of who can do what -using the [Vault policy](/docs/concepts/policies.html) and attach that to +using the [Vault policy](/docs/concepts/policies) and attach that to tokens, roles, entities, etc. Think of a case where you have a trusted entity (Chef, Jenkins, etc.) which @@ -67,9 +67,9 @@ be minimized. To perform the tasks described in this guide, you need to have a Vault environment. Refer to the [Getting -Started](/intro/getting-started/install.html) guide to install Vault. Make sure +Started](/intro/getting-started/install) guide to install Vault. Make sure that your Vault server has been [initialized and -unsealed](/intro/getting-started/deploy.html). +unsealed](/intro/getting-started/deploy). ### Policy requirements @@ -99,7 +99,7 @@ path "secret/dev" { ``` If you are not familiar with policies, complete the -[policies](/guides/identity/policies.html) guide. +[policies](/guides/identity/policies) guide. ## Steps @@ -119,7 +119,7 @@ uses cubbyhole response wrapping. In this guide, you perform the following: **NOTE:** This guide demonstrates how the response wrapping works. To learn more about reading and writing secrets in Vault, refer to the [Static -Secret](/guides/secret-mgmt/static-secrets.html) guide. +Secret](/guides/secret-mgmt/static-secrets) guide. ### Step 1: Create and wrap a token @@ -442,7 +442,7 @@ store a password tied to your username that should not be shared with anyone. The cubbyhole secret engine is mounted at the **`cubbyhole/`** prefix by default. The secrets you store in the `cubbyhole/` path are tied to your token and all tokens are permitted to read and write to the `cubbyhole` secret engine -by the [`default`](/docs/concepts/policies.html#default-policy) policy. +by the [`default`](/docs/concepts/policies#default-policy) policy. ```shell ... @@ -543,11 +543,11 @@ $ curl --header "X-Vault-Token: root" --request GET \ } ``` -Also, refer to [Cubbyhole Secret Engine (API)](/api/secret/cubbyhole/index.html). +Also, refer to [Cubbyhole Secret Engine (API)](/api/secret/cubbyhole). ## Next steps -The use of [AppRole Pull Authentication](/guides/identity/authentication.html) is a good +The use of [AppRole Pull Authentication](/guides/identity/authentication) is a good use case to leverage the response wrapping. Go through the guide if you have not done so. To better understand the lifecycle of Vault tokens, proceed to [Tokens -and Leases](/guides/identity/lease.html) guide. +and Leases](/guides/identity/lease) guide. diff --git a/website/pages/guides/secret-mgmt/db-root-rotation.mdx b/website/pages/guides/secret-mgmt/db-root-rotation.mdx index f905306b0..b29dda230 100644 --- a/website/pages/guides/secret-mgmt/db-root-rotation.mdx +++ b/website/pages/guides/secret-mgmt/db-root-rotation.mdx @@ -11,7 +11,7 @@ description: |- ## Database Secrets Engine -Vault's [database secrets engine](/docs/secrets/databases/index.html) provides a +Vault's [database secrets engine](/docs/secrets/databases) provides a centralized workflow for managing credentials for various database systems. By leveraging this, every service instance gets a unique set of database credentials instead of sharing one. Having those credentials tied directly to @@ -22,14 +22,14 @@ can be revoked immediately. This reduces the manual tasks performed by the database administrator and make the access to the database to be more efficient and secure. -The [Secret as a Service: Dynamic Secrets](/guides/secret-mgmt/dynamic-secrets.html) +The [Secret as a Service: Dynamic Secrets](/guides/secret-mgmt/dynamic-secrets) guide demonstrates the primary workflow. ## Reference Material -- [Secret as a Service: Dynamic Secrets](/guides/secret-mgmt/dynamic-secrets.html) -- [Database Secret Engine (API)](/api/secret/databases/index.html#rotate-root-credentials) -- [PostgreSQL Database Plugin HTTP API](/api/secret/databases/postgresql.html) +- [Secret as a Service: Dynamic Secrets](/guides/secret-mgmt/dynamic-secrets) +- [Database Secret Engine (API)](/api/secret/databases#rotate-root-credentials) +- [PostgreSQL Database Plugin HTTP API](/api/secret/databases/postgresql) ## Estimated Time to Complete @@ -60,9 +60,9 @@ immediately after the initial configuration of each database. To perform the tasks described in this guide, you need to have a Vault environment. Refer to the [Getting -Started](/intro/getting-started/install.html) guide to install Vault. Make sure +Started](/intro/getting-started/install) guide to install Vault. Make sure that your Vault server has been [initialized and -unsealed](/intro/getting-started/deploy.html). +unsealed](/intro/getting-started/deploy). ### PostgreSQL @@ -96,7 +96,7 @@ path "database/*" { ``` If you are not familiar with policies, complete the -[policies](/guides/identity/policies.html) guide. +[policies](/guides/identity/policies) guide. ## Steps @@ -143,7 +143,7 @@ and passes the secret engine type ("`database`") in the request payload. ### Step 2: Configure PostgreSQL secret engine In the [Secret as a Service: Dynamic -Secrets](/guides/secret-mgmt/dynamic-secrets.html#step2) guide, the PostgreSQL +Secrets](/guides/secret-mgmt/dynamic-secrets#step2) guide, the PostgreSQL plugin was configured with its root credentials embedded in the `connection_url` (`root` and `rootpassword`) as below: @@ -356,6 +356,6 @@ which is not used for other purposes. In this guide, you learned how to rotate the root database credentials. -Read the [AppRole Pull Authentication](/guides/identity/authentication.html) +Read the [AppRole Pull Authentication](/guides/identity/authentication) guide to learn about generating a client token for your app so that it can request database credentials from Vault. diff --git a/website/pages/guides/secret-mgmt/dynamic-secrets.mdx b/website/pages/guides/secret-mgmt/dynamic-secrets.mdx index 57e4c3814..c012dd458 100644 --- a/website/pages/guides/secret-mgmt/dynamic-secrets.mdx +++ b/website/pages/guides/secret-mgmt/dynamic-secrets.mdx @@ -13,14 +13,14 @@ will generate an AWS credential granting permissions to access the S3 bucket. In addition, Vault will automatically revoke this credential after the TTL is expired. -The [Getting Started](/intro/getting-started/dynamic-secrets.html) guide walks +The [Getting Started](/intro/getting-started/dynamic-secrets) guide walks you through the generation of dynamic AWS credentials. ## Reference Material -- [Getting Started - Dynamic Secrets](/intro/getting-started/dynamic-secrets.html) -- [Secret Engines - Databases](/docs/secrets/databases/index.html) -- [Role API](/api/secret/databases/index.html#create-role) +- [Getting Started - Dynamic Secrets](/intro/getting-started/dynamic-secrets) +- [Secret Engines - Databases](/docs/secrets/databases) +- [Role API](/api/secret/databases#create-role) ## Estimated Time to Complete @@ -59,9 +59,9 @@ can be revoked rather than changing more global set of credentials. To perform the tasks described in this guide, you need to have a Vault environment. Refer to the [Getting -Started](/intro/getting-started/install.html) guide to install Vault. Make sure +Started](/intro/getting-started/install) guide to install Vault. Make sure that your Vault server has been [initialized and -unsealed](/intro/getting-started/deploy.html). +unsealed](/intro/getting-started/deploy). ### PostgreSQL @@ -106,7 +106,7 @@ path "auth/token/create" { ``` If you are not familiar with policies, complete the -[policies](/guides/identity/policies.html) guide. +[policies](/guides/identity/policies) guide. ## Steps @@ -127,7 +127,7 @@ the commands that an `app` runs to get a database credentials from Vault. (**Persona:** admin) -As most of the secret engines, the [database secret engine](/docs/secrets/databases/index.html) +As most of the secret engines, the [database secret engine](/docs/secrets/databases) must be mounted. #### CLI command @@ -159,7 +159,7 @@ $ curl --header "X-Vault-Token: " \ ``` Where `` is your valid token, and `` holds [configuration -parameters](/api/system/mounts.html#enable-secrets-engine) of the secret engine. +parameters](/api/system/mounts#enable-secrets-engine) of the secret engine. **Example:** @@ -222,7 +222,7 @@ $ cat payload.json
-~> **NOTE:** Read the [Database Root Credential Rotation](/guides/secret-mgmt/db-root-rotation.html) +~> **NOTE:** Read the [Database Root Credential Rotation](/guides/secret-mgmt/db-root-rotation) guide to learn about rotating the root credential immediately after the initial configuration of each database. @@ -325,7 +325,7 @@ token_policies [apps default] Use the returned token to perform the remaining. -**NOTE:** [AppRole Pull Authentication](/guides/identity/authentication.html) guide +**NOTE:** [AppRole Pull Authentication](/guides/identity/authentication) guide demonstrates more sophisticated way of generating a token for your apps. ```shell @@ -398,7 +398,7 @@ $ curl --header "X-Vault-Token: ..." --request POST \ Be sure to use the returned token to perform the remaining. -**NOTE:** [AppRole Pull Authentication](/guides/identity/authentication.html) guide +**NOTE:** [AppRole Pull Authentication](/guides/identity/authentication) guide demonstrates more sophisticated way of generating a token for your apps. ```plaintext @@ -483,5 +483,5 @@ user name exists. This guide discussed how to generate credentials on-demand so that the access credentials no longer need to be written to disk. Next, learn about the -[Tokens and Leases](/guides/identity/lease.html) so that you can control the +[Tokens and Leases](/guides/identity/lease) so that you can control the lifecycle of those credentials. diff --git a/website/pages/guides/secret-mgmt/index.mdx b/website/pages/guides/secret-mgmt/index.mdx index 7e7d11f12..406dc2f2f 100644 --- a/website/pages/guides/secret-mgmt/index.mdx +++ b/website/pages/guides/secret-mgmt/index.mdx @@ -18,33 +18,33 @@ tight access control and recording a detailed audit log. Secrets Management guides demonstrate features in Vault to securely store your secrets. -- [Static Secrets](/guides/secret-mgmt/static-secrets.html) guide walks you +- [Static Secrets](/guides/secret-mgmt/static-secrets) guide walks you through the steps to write secrets in Vault, and control who can access them. -- [Versioned KV Secret Engine](/guides/secret-mgmt/versioned-kv.html) guide +- [Versioned KV Secret Engine](/guides/secret-mgmt/versioned-kv) guide demonstrates the secret versioning capabilities provided by KV Secret Engine v2. -- [Secret as a Service: Dynamic Secrets](/guides/secret-mgmt/dynamic-secrets.html) +- [Secret as a Service: Dynamic Secrets](/guides/secret-mgmt/dynamic-secrets) guide demonstrates the Vault feature to generate database credentials on-demand so that each application or system can obtain its own credentials, and its permissions can be tightly controlled. -- [Database Root Credential Rotation](/guides/secret-mgmt/db-root-rotation.html) +- [Database Root Credential Rotation](/guides/secret-mgmt/db-root-rotation) guide walks you through the steps to enable the rotation of the database root credentials for those managed by Vault. -- [Cubbyhole Response Wrapping](/guides/secret-mgmt/cubbyhole.html) guide +- [Cubbyhole Response Wrapping](/guides/secret-mgmt/cubbyhole) guide demonstrates a secure method to distribute secrets by wrapping them where only the expecting client can unwrap. -- [One-Time SSH Password](/guides/secret-mgmt/ssh-otp.html) guide demonstrates +- [One-Time SSH Password](/guides/secret-mgmt/ssh-otp) guide demonstrates the use of SSH secrets engine to generate a one-time password (OTP) every time a client wants to SSH into a remote host. -- [Build Your Own Certificate Authority](/guides/secret-mgmt/pki-engine.html) +- [Build Your Own Certificate Authority](/guides/secret-mgmt/pki-engine) guide walks you through the use of the PKI secrets engine to generate dynamic X.509 certificates. -- [Direct Application Integration](/guides/secret-mgmt/app-integration.html) +- [Direct Application Integration](/guides/secret-mgmt/app-integration) guide demonstrates the usage of _Consul Template_ and _Envconsul_ tool to retrieve secrets from Vault with no or minimum code change to your applications. diff --git a/website/pages/guides/secret-mgmt/pki-engine.mdx b/website/pages/guides/secret-mgmt/pki-engine.mdx index 7cc75465e..277733a34 100644 --- a/website/pages/guides/secret-mgmt/pki-engine.mdx +++ b/website/pages/guides/secret-mgmt/pki-engine.mdx @@ -21,8 +21,8 @@ signing process to complete. ## Reference Material -- [PKI (Certificates) Secrets Engine](/docs/secrets/pki/index.html) -- [PKI Secrets Engine (API)](/api/secret/pki/index.html) +- [PKI (Certificates) Secrets Engine](/docs/secrets/pki) +- [PKI Secrets Engine (API)](/api/secret/pki) - [RFC 5280 Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile](https://tools.ietf.org/html/rfc5280) - [OpenSSL x509 Man Pages](https://www.openssl.org/docs/man1.1.0/apps/x509.html) @@ -67,7 +67,7 @@ higher levels of security. To perform the tasks described in this guide, you need to have a Vault environment. Refer to the [Getting -Started](/intro/getting-started/install.html) guide to install Vault. +Started](/intro/getting-started/install) guide to install Vault. Alternatively, you can use the [Vault Playground](https://www.katacoda.com/hashicorp/scenarios/vault-playground) @@ -101,7 +101,7 @@ path "pki*" { ``` If you are not familiar with policies, complete the -[policies](/guides/identity/policies.html) guide. +[policies](/guides/identity/policies) guide. ## Steps @@ -172,7 +172,7 @@ PKI secrets engine. ``` Where `` is your valid token, and `` holds [configuration - parameters](/api/system/mounts.html#enable-secrets-engine) of the secret engine. + parameters](/api/system/mounts#enable-secrets-engine) of the secret engine. **Example:** @@ -434,7 +434,7 @@ in the previous step. A role is a logical name that maps to a policy used to generate those credentials. It allows [configuration -parameters](/api/secret/pki/index.html#create-update-role) to control +parameters](/api/secret/pki#create-update-role) to control certificate common names, alternate names, the key usages that they are valid for, and more. diff --git a/website/pages/guides/secret-mgmt/ssh-otp.mdx b/website/pages/guides/secret-mgmt/ssh-otp.mdx index 8b57a2ae3..8109d4a57 100644 --- a/website/pages/guides/secret-mgmt/ssh-otp.mdx +++ b/website/pages/guides/secret-mgmt/ssh-otp.mdx @@ -17,13 +17,13 @@ as well as its connected machines and systems. The Vault SSH secrets engine provides secure authentication and authorization for access to machines via the SSH protocol. It supports [signed SSH -certificate](/docs/secrets/ssh/signed-ssh-certificates.html) and one-time SSH +certificate](/docs/secrets/ssh/signed-ssh-certificates) and one-time SSH password modes. This guide demonstrates the one-time SSH password mode. ## Reference Material -- [One-Time SSH Passwords](/docs/secrets/ssh/one-time-ssh-passwords.html) -- [SSH Secrets Engine (API)](/api/secret/ssh/index.html) +- [One-Time SSH Passwords](/docs/secrets/ssh/one-time-ssh-passwords) +- [SSH Secrets Engine (API)](/api/secret/ssh) - [Vault SSH Helper](https://github.com/hashicorp/vault-ssh-helper) ## Estimated Time to Complete @@ -67,7 +67,7 @@ secrets engine. To perform the tasks described in this guide, you need to have a Vault environment. Refer to the [Getting -Started](/intro/getting-started/install.html) guide to install Vault. +Started](/intro/getting-started/install) guide to install Vault. ### Policy requirements @@ -97,7 +97,7 @@ path "sys/mounts/*" { ``` If you are not familiar with policies, complete the -[policies](/guides/identity/policies.html) guide. +[policies](/guides/identity/policies) guide. ## Steps @@ -241,7 +241,7 @@ $ curl --header "X-Vault-Token: " \ ``` Where `` is your valid token, and `` holds [configuration -parameters](/api/system/mounts.html#enable-secrets-engine) of the secret engine. +parameters](/api/system/mounts#enable-secrets-engine) of the secret engine. **Example:** @@ -418,6 +418,6 @@ $ vault ssh -role otp_key_role -mode otp -strict-host-key-checking=no ubuntu@192 ## Next steps Read the [Signed SSH -Certificates](/docs/secrets/ssh/signed-ssh-certificates.html) documentation if +Certificates](/docs/secrets/ssh/signed-ssh-certificates) documentation if you want to use signed SSH certificate so that the clients can use their local SSH keys to connect to the target hosts. diff --git a/website/pages/guides/secret-mgmt/static-secrets.mdx b/website/pages/guides/secret-mgmt/static-secrets.mdx index 2dba5c094..9af7589a8 100644 --- a/website/pages/guides/secret-mgmt/static-secrets.mdx +++ b/website/pages/guides/secret-mgmt/static-secrets.mdx @@ -18,9 +18,9 @@ Secret Storage. ## Reference Material -- [Key/Value Secret Engine](/docs/secrets/kv/index.html) -- [Key/Value Secret Engine API](/api/secret/kv/index.html) -- [Client libraries](/api/libraries.html) for Vault API for commonly used languages +- [Key/Value Secret Engine](/docs/secrets/kv) +- [Key/Value Secret Engine API](/api/secret/kv) +- [Client libraries](/api/libraries) for Vault API for commonly used languages ## Estimated Time to Complete @@ -57,15 +57,15 @@ sees the unencrypted value, so gaining access to the raw storage isn't enough to access your secrets. ~> **NOTE:** This guide demonstrates secret management using [v2 of the KV -secret engine](/docs/secrets/kv/kv-v2.html). +secret engine](/docs/secrets/kv/kv-v2). ## Prerequisites To perform the tasks described in this guide, you need to have a Vault environment. Refer to the [Getting -Started](/intro/getting-started/install.html) guide to install Vault. Make sure +Started](/intro/getting-started/install) guide to install Vault. Make sure that your Vault server has been [initialized and -unsealed](/intro/getting-started/deploy.html). +unsealed](/intro/getting-started/deploy). ### Policy requirements @@ -95,7 +95,7 @@ path "auth/token/create" { ``` If you are not familiar with policies, complete the -[policies](/guides/identity/policies.html) guide. +[policies](/guides/identity/policies) guide. ## Steps @@ -131,7 +131,7 @@ commands that `apps` persona runs to read secrets from Vault. (**Persona:** devops) Currently, when you start the Vault server in [**dev -mode**](/intro/getting-started/dev-server.html#starting-the-dev-server), it +mode**](/intro/getting-started/dev-server#starting-the-dev-server), it automatically enables **v2** of the KV secret engine at **`secret/`**. If you start the Vault server in non-dev mode, the default is v1. @@ -251,7 +251,7 @@ $ curl --header "X-Vault-Token: " \ ``` Where `` is your valid token, and `secret/data/` is the path to -your secrets. The [`payload.json`](/api/secret/kv/kv-v2.html#parameters-2) +your secrets. The [`payload.json`](/api/secret/kv/kv-v2#parameters-2) contains the parameters to invoke the endpoint. **Example:** @@ -630,5 +630,5 @@ $ vault kv put secret/dev/config/mongodb @mongodb.txt This guide introduced the CLI commands and API endpoints to read and write secrets in key/value secret engine. To keep it simple, the `devops` persona generated a token for `apps`. Read [AppRole Pull -Authentication](/guides/identity/authentication.html) guide to learn about +Authentication](/guides/identity/authentication) guide to learn about programmatically generate a token for apps. diff --git a/website/pages/guides/secret-mgmt/versioned-kv.mdx b/website/pages/guides/secret-mgmt/versioned-kv.mdx index 2649f16e1..bb091a772 100644 --- a/website/pages/guides/secret-mgmt/versioned-kv.mdx +++ b/website/pages/guides/secret-mgmt/versioned-kv.mdx @@ -10,7 +10,7 @@ description: |- # Versioned Key/Value Secret Engine -The [Static Secrets](/guides/secret-mgmt/static-secrets.html) guide introduced +The [Static Secrets](/guides/secret-mgmt/static-secrets) guide introduced the basics of working with key-value secret engine. **Vault 0.10** introduced [_K/V Secrets Engine v2 with Secret Versioning_](https://www.hashicorp.com/blog/vault-0-10). This guide @@ -18,9 +18,9 @@ demonstrates the new features introduced by the key-value secret engine v2. ## Reference Material -- [Static Secrets guide](/guides/secret-mgmt/static-secrets.html) -- [KV Secrets Engine - Version 2](/docs/secrets/kv/kv-v2.html) -- [KV Secrets Engine - Version 2 (API)](/api/secret/kv/kv-v2.html) +- [Static Secrets guide](/guides/secret-mgmt/static-secrets) +- [KV Secrets Engine - Version 2](/docs/secrets/kv/kv-v2) +- [KV Secrets Engine - Version 2 (API)](/api/secret/kv/kv-v2) ~> **NOTE:** An [interactive tutorial](https://www.katacoda.com/hashicorp/scenarios/vault-static-secrets) is @@ -51,9 +51,9 @@ unintentionally. To perform the tasks described in this guide, you need to have a Vault environment. Refer to the [Getting -Started](/intro/getting-started/install.html) guide to install Vault. Make sure +Started](/intro/getting-started/install) guide to install Vault. Make sure that your Vault server has been [initialized and -unsealed](/intro/getting-started/deploy.html). +unsealed](/intro/getting-started/deploy). ### Policy requirements @@ -83,7 +83,7 @@ path "sys/mounts/*" { ``` If you are not familiar with policies, complete the -[policies](/guides/identity/policies.html) guide. +[policies](/guides/identity/policies) guide. ## Steps @@ -928,5 +928,5 @@ the `cas` does not match the current version number, you will receive the ## Next steps This guide introduced the CLI commands and API endpoints to read and write -static secrets in the key-value secret engine. Read [Secret as a Service: Dynamic Secrets](/guides/secret-mgmt/dynamic-secrets.html) guide to learn about the +static secrets in the key-value secret engine. Read [Secret as a Service: Dynamic Secrets](/guides/secret-mgmt/dynamic-secrets) guide to learn about the usage of database secret engine. diff --git a/website/pages/home/index.jsx b/website/pages/home/index.jsx index 9f44461bd..f197a5e7a 100644 --- a/website/pages/home/index.jsx +++ b/website/pages/home/index.jsx @@ -25,13 +25,12 @@ export default function Homepage() { { external: false, title: 'Download', - url: 'https://www.vaultproject.io/downloads.html' + url: 'https://www.vaultproject.io/downloads' }, { external: false, title: 'Get Started with Vault', - url: - 'https://www.vaultproject.io/intro/getting-started/index.html' + url: 'https://www.vaultproject.io/intro/getting-started' } ], centered: false, diff --git a/website/pages/intro/getting-started/apis.mdx b/website/pages/intro/getting-started/apis.mdx index 4615d84f2..38d7bea64 100644 --- a/website/pages/intro/getting-started/apis.mdx +++ b/website/pages/intro/getting-started/apis.mdx @@ -14,7 +14,7 @@ via the HTTP API. Once you have started the Vault server, you can use `curl` or any other http client to make API calls. For example, if you started the Vault server in -[dev mode](/docs/concepts/dev-server.html), you could validate the +[dev mode](/docs/concepts/dev-server), you could validate the initialization status like this: ```text @@ -33,7 +33,7 @@ This will return a JSON response: Machines that need access to information stored in Vault will most likely access Vault via its REST API. For example, if a machine were using -[AppRole](/docs/auth/approle.html) for authentication, the application would +[AppRole](/docs/auth/approle) for authentication, the application would first authenticate to Vault which would return a Vault API token. The application would use that token for future communication with Vault. @@ -116,7 +116,7 @@ output. This will return a JSON response: ``` Now any of the available auth methods can be enabled and configured. -For the purposes of this guide lets enable [AppRole](/docs/auth/approle.html) +For the purposes of this guide lets enable [AppRole](/docs/auth/approle) authentication. Start by enabling the AppRole authentication. @@ -135,7 +135,7 @@ the Vault server. We could also generate tokens using any other authentication mechanisms, but we will use the root token for simplicity. Now create an AppRole with desired set of [ACL -policies](/docs/concepts/policies.html). In the following command, it is being +policies](/docs/concepts/policies). In the following command, it is being specified that the tokens issued under the AppRole `my-role`, should be associated with `dev-policy` and the `my-policy`. @@ -255,7 +255,7 @@ This should return a response like this: } ``` -You can see the documentation on the [HTTP APIs](/api/index.html) for +You can see the documentation on the [HTTP APIs](/api) for more details on other available endpoints. Congratulations! You now know all the basics to get started with Vault. @@ -263,5 +263,5 @@ Congratulations! You now know all the basics to get started with Vault. ## Next Next, we have a page dedicated to [next -steps](/intro/getting-started/next-steps.html) depending on what you would like +steps](/intro/getting-started/next-steps) depending on what you would like to achieve. diff --git a/website/pages/intro/getting-started/authentication.mdx b/website/pages/intro/getting-started/authentication.mdx index da5600d59..4d7bc7e6f 100644 --- a/website/pages/intro/getting-started/authentication.mdx +++ b/website/pages/intro/getting-started/authentication.mdx @@ -16,7 +16,7 @@ you in as the root user with admin permissions. In a non-dev setup, you would have had to authenticate first. On this page, we'll talk specifically about authentication. On the next page, we -talk about [authorization](/intro/getting-started/policies.html). Authentication +talk about [authorization](/intro/getting-started/policies). Authentication is the mechanism of assigning an identity to a Vault user. The access control and permissions associated with an identity are authorization, and will not be covered on this page. @@ -80,7 +80,7 @@ $ vault token revoke 463763ae-0c3b-ff77-e137-af668941465c Success! Revoked token (if it existed) ``` -In a [previous section](/intro/getting-started/dynamic-secrets.html#revoking-the-secret), we use the `vault lease revoke` command. This command +In a [previous section](/intro/getting-started/dynamic-secrets#revoking-the-secret), we use the `vault lease revoke` command. This command is only used for revoking _leases_. For revoking _tokens_, use `vault token revoke`. @@ -279,6 +279,6 @@ The multiple auth methods Vault provides let you choose the most appropriate authentication mechanism for your organization. In this next section, we'll learn about -[authorization and policies](/intro/getting-started/policies.html). +[authorization and policies](/intro/getting-started/policies). [gh-pat]: https://help.github.com/articles/creating-an-access-token-for-command-line-use/ diff --git a/website/pages/intro/getting-started/deploy.mdx b/website/pages/intro/getting-started/deploy.mdx index b2d4f09eb..ded0810f1 100644 --- a/website/pages/intro/getting-started/deploy.mdx +++ b/website/pages/intro/getting-started/deploy.mdx @@ -49,7 +49,7 @@ For now, copy and paste the configuration above to a file called `config.hcl`. It will configure Vault to expect an instance of Consul running locally. Starting a local Consul instance takes only a few minutes. Just follow the -[Consul Getting Started Guide](https://www.consul.io/intro/getting-started/install.html) +[Consul Getting Started Guide](https://www.consul.io/intro/getting-started/install) up to the point where you have installed Consul and started it with this command: ```text @@ -101,7 +101,7 @@ file. ``` For guidance on dealing with this issue, see the discussion of -`disable_mlock` in [Server Configuration](/docs/configuration/index.html). +`disable_mlock` in [Server Configuration](/docs/configuration). ## Initializing the Vault @@ -146,7 +146,7 @@ somewhere, and continue. In a real deployment scenario, you would never save these keys together. Instead, you would likely use Vault's PGP and Keybase.io support to encrypt each of these keys with the users' PGP keys. This prevents one single person from having all the unseal keys. Please -see the documentation on [using PGP, GPG, and Keybase](/docs/concepts/pgp-gpg-keybase.html) +see the documentation on [using PGP, GPG, and Keybase](/docs/concepts/pgp-gpg-keybase) for more information. ## Seal/Unseal @@ -263,7 +263,7 @@ basic knowledge necessary to deploy Vault into a real environment. Once the Vault is unsealed, you access it as you have throughout this getting started guide (which worked with an unsealed Vault). -Next, we have a [short tutorial](/intro/getting-started/apis.html) on using the +Next, we have a [short tutorial](/intro/getting-started/apis) on using the HTTP APIs to authenticate and access secrets. [hcl]: https://github.com/hashicorp/hcl diff --git a/website/pages/intro/getting-started/dev-server.mdx b/website/pages/intro/getting-started/dev-server.mdx index 7281889c8..6d7adb663 100644 --- a/website/pages/intro/getting-started/dev-server.mdx +++ b/website/pages/intro/getting-started/dev-server.mdx @@ -114,4 +114,4 @@ Congratulations! You've started your first Vault server. We haven't stored any secrets yet, but we'll do that in the next section. Next, we're going to -[read and write our first secrets](/intro/getting-started/first-secret.html). +[read and write our first secrets](/intro/getting-started/first-secret). diff --git a/website/pages/intro/getting-started/dynamic-secrets.mdx b/website/pages/intro/getting-started/dynamic-secrets.mdx index 1f404561a..c46045b6a 100644 --- a/website/pages/intro/getting-started/dynamic-secrets.mdx +++ b/website/pages/intro/getting-started/dynamic-secrets.mdx @@ -171,4 +171,4 @@ access credentials, and Vault will be ready to get the most value out of this practice. Before going further, we're going to take a quick detour to learn about the -[built-in help system](/intro/getting-started/help.html). +[built-in help system](/intro/getting-started/help). diff --git a/website/pages/intro/getting-started/first-secret.mdx b/website/pages/intro/getting-started/first-secret.mdx index 206d261eb..584d58228 100644 --- a/website/pages/intro/getting-started/first-secret.mdx +++ b/website/pages/intro/getting-started/first-secret.mdx @@ -13,7 +13,7 @@ read and write our first secret. One of the core features of Vault is the ability to read and write arbitrary secrets securely. On this page, we'll do this using the CLI, but there is also a complete -[HTTP API](/api/index.html) +[HTTP API](/api) that can be used to programmatically do anything with Vault. Secrets written to Vault are encrypted and then written to backend @@ -48,7 +48,7 @@ Success! Data written to: secret/hello `vault kv put` is a very powerful command. In addition to writing data directly from the command-line, it can read values and key pairs from `STDIN` as well as files. For more information, see the -[command documentation](/docs/commands/index.html). +[command documentation](/docs/commands). ~> **Warning:** The documentation uses the `key=value` based entry throughout, but it is more secure to use files if possible. Sending @@ -110,4 +110,4 @@ In this section we learned how to use the powerful CRUD features of Vault to store arbitrary secrets. On its own this is already a useful but basic feature. -Next, we'll learn the basics about [secrets engines](/intro/getting-started/secrets-engines.html). +Next, we'll learn the basics about [secrets engines](/intro/getting-started/secrets-engines). diff --git a/website/pages/intro/getting-started/help.mdx b/website/pages/intro/getting-started/help.mdx index 50e48808b..2272b75da 100644 --- a/website/pages/intro/getting-started/help.mdx +++ b/website/pages/intro/getting-started/help.mdx @@ -115,4 +115,4 @@ indispensable in day-to-day usage. The help system lets you learn about how to use any backend within Vault without leaving the command line. Next, we will learn about -[authentication](/intro/getting-started/authentication.html). +[authentication](/intro/getting-started/authentication). diff --git a/website/pages/intro/getting-started/index.mdx b/website/pages/intro/getting-started/index.mdx index 1f694fe07..6f326a2ea 100644 --- a/website/pages/intro/getting-started/index.mdx +++ b/website/pages/intro/getting-started/index.mdx @@ -8,15 +8,15 @@ description: The first step to using Vault is to get it installed. # Install Vault Vault must first be installed on your machine. Vault is distributed as -a [binary package](/downloads.html) for all supported platforms and +a [binary package](/downloads) for all supported platforms and architectures. This page will not cover how to compile Vault from source, -but compiling from source is covered in the [documentation](/docs/install/index.html) +but compiling from source is covered in the [documentation](/docs/install) for those who want to be sure they're compiling source they trust into the final binary. ## Installing Vault -To install Vault, find the [appropriate package](/downloads.html) for +To install Vault, find the [appropriate package](/downloads) for your system and download it. Vault is packaged as a zip archive. After downloading Vault, unzip the package. Vault runs as a single binary @@ -93,4 +93,4 @@ helpful for beginners and advanced Vault users. ## Next Now Vault is installed we can start our first Vault server! [Let's do -that now](/intro/getting-started/dev-server.html). +that now](/intro/getting-started/dev-server). diff --git a/website/pages/intro/getting-started/next-steps.mdx b/website/pages/intro/getting-started/next-steps.mdx index 0f2f73bec..1e853bee0 100644 --- a/website/pages/intro/getting-started/next-steps.mdx +++ b/website/pages/intro/getting-started/next-steps.mdx @@ -17,5 +17,5 @@ We've covered the basics of all the core features of Vault in this guide. Due to the importance of securing secrets, we recommend reading the following as next steps. -- [Documentation](/docs/index.html) - The documentation is an in-depth +- [Documentation](/docs) - The documentation is an in-depth reference guide to all the features of Vault. diff --git a/website/pages/intro/getting-started/policies.mdx b/website/pages/intro/getting-started/policies.mdx index e3637ec5f..cae3700eb 100644 --- a/website/pages/intro/getting-started/policies.mdx +++ b/website/pages/intro/getting-started/policies.mdx @@ -224,6 +224,6 @@ The syntax and function of policies is easy to understand and work with, and because auth methods all must map to the central policy system, you only have to learn this policy system. -Next, we will cover how to [deploy Vault](/intro/getting-started/deploy.html). +Next, we will cover how to [deploy Vault](/intro/getting-started/deploy). [hcl]: https://github.com/hashicorp/hcl diff --git a/website/pages/intro/getting-started/secrets-engines.mdx b/website/pages/intro/getting-started/secrets-engines.mdx index 2964ed840..09e57ab7f 100644 --- a/website/pages/intro/getting-started/secrets-engines.mdx +++ b/website/pages/intro/getting-started/secrets-engines.mdx @@ -140,6 +140,6 @@ You now know about secrets engines and how to operate on them. This is important knowledge to move forward and learn about other secrets engines. Next, we'll use the AWS backend to -[generate dynamic secrets](/intro/getting-started/dynamic-secrets.html). +[generate dynamic secrets](/intro/getting-started/dynamic-secrets). [vfs]: https://en.wikipedia.org/wiki/Virtual_file_system diff --git a/website/pages/partials/tokenstorefields.mdx b/website/pages/partials/tokenstorefields.mdx index e0a190541..813f01bf1 100644 --- a/website/pages/partials/tokenstorefields.mdx +++ b/website/pages/partials/tokenstorefields.mdx @@ -3,7 +3,7 @@ successfully, and ties the resulting token to these blocks as well. - `token_explicit_max_ttl` `(integer: 0 or string: "")` - If set, will encode an [explicit max - TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls) + TTL](/docs/concepts/tokens#token-time-to-live-periodic-tokens-and-explicit-max-ttls) onto the token. This is a hard cap even if `token_ttl` and `token_max_ttl` would otherwise allow a renewal. - `token_no_default_policy` `(bool: false)` - If set, the `default` policy will @@ -12,7 +12,7 @@ - `token_num_uses` `(integer: 0)` - The maximum number of times a generated token may be used (within its lifetime); 0 means unlimited. - `token_period` `(integer: 0 or string: "")` - The - [period](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls), + [period](/docs/concepts/tokens#token-time-to-live-periodic-tokens-and-explicit-max-ttls), if any, to set on the token. - `token_type` `(string: "")` - The type of token that should be generated. Can be `service`, `batch`, or `default` to use the mount's tuned default (which diff --git a/website/pages/use-cases/data-encryption/index.jsx b/website/pages/use-cases/data-encryption/index.jsx index 6f37141ae..0cf1e8296 100644 --- a/website/pages/use-cases/data-encryption/index.jsx +++ b/website/pages/use-cases/data-encryption/index.jsx @@ -16,7 +16,7 @@ export default function DataEncryptionUseCase() { />
-
diff --git a/website/pages/use-cases/identity-based-access/index.jsx b/website/pages/use-cases/identity-based-access/index.jsx index 8f9a66b48..ba5949699 100644 --- a/website/pages/use-cases/identity-based-access/index.jsx +++ b/website/pages/use-cases/identity-based-access/index.jsx @@ -16,7 +16,7 @@ export default function DataEncryptionUseCase() { />
-
diff --git a/website/pages/use-cases/secrets-management/index.jsx b/website/pages/use-cases/secrets-management/index.jsx index b2a48cab7..41efdd882 100644 --- a/website/pages/use-cases/secrets-management/index.jsx +++ b/website/pages/use-cases/secrets-management/index.jsx @@ -17,7 +17,7 @@ export default function SecretsManagmentUseCase() { />
-