hc-github-team-secure-vault-core
ec6011be33
backport of commit 8e40823fe1cf40cecb1e004be29fde5fdb875bdb ( #21416 )
...
Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
2023-06-22 17:56:53 +00:00
hc-github-team-secure-vault-core
e513a1355c
backport of commit 58b6cb1c42418d5eb2c5e0d3b1bc9d95b3e3a707 ( #21410 )
...
Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
2023-06-22 15:29:46 +00:00
hc-github-team-secure-vault-core
69053efc00
backport of commit 6157b5ffcb6e0fcd1d0823e4929bf50ef1b00bc8 ( #20837 )
...
Co-authored-by: Nick Cabatoff <ncabatoff@hashicorp.com>
2023-06-21 22:56:07 +00:00
hc-github-team-secure-vault-core
0e266b7d03
backport of commit 774d75e63e2481f28f0890f2b4387303ac232755 ( #21294 )
...
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2023-06-21 22:22:01 +00:00
hc-github-team-secure-vault-core
6496f6674f
backport of commit 4eed18cf49535b9445c25a39c62f7190321764af ( #21358 )
...
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-06-21 21:23:03 +00:00
hc-github-team-secure-vault-core
b0b2e07f86
backport of commit 15aee2e0babebaeb7ef3c49fc6221a2bc08cd8fa ( #21398 )
...
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-06-21 17:06:16 -04:00
hc-github-team-secure-vault-core
352865372e
backport of commit eb634e93266f411db0e1476e638daf02aab6d0ec ( #21394 )
...
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2023-06-21 19:39:16 +00:00
Sarah Chavis
32982d73d2
[DOCS] Backport release notes updates ( #21386 )
...
* Backport initial release notes drafting
* Updates for GA
2023-06-21 17:42:11 +00:00
hc-github-team-secure-vault-core
056c1b11a3
backport of commit d8b811d8da56589ad1de0396d8d09a07c88fdb10 ( #21385 )
...
Co-authored-by: miagilepner <mia.epner@hashicorp.com>
2023-06-21 16:00:35 +00:00
hc-github-team-secure-vault-core
d7795738eb
backport of commit 99cf3836b69149d00e7f5e83c2e623a0155dc252 ( #21382 )
...
Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
2023-06-21 10:14:05 -04:00
hc-github-team-secure-vault-core
100f402ac8
backport of commit 3908ec9dc44352548e08f4c86f9ad76c255ce493 ( #21331 )
...
Co-authored-by: Anton Averchenkov <84287187+averche@users.noreply.github.com>
2023-06-16 17:33:30 -04:00
hc-github-team-secure-vault-core
664860a8ca
backport of commit d76424cb53c730da5410ec55bff3274a01212843 ( #21328 )
...
Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
2023-06-16 19:41:06 +00:00
hc-github-team-secure-vault-core
09e9cffcb4
backport of commit 3347e5d56b363e58e7be556cfd0875a210c2a2ec ( #21326 )
...
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-06-16 17:37:55 +00:00
hc-github-team-secure-vault-core
8068288873
backport of commit 41f392c43ff4c9077deb1d1640349b8ba867d139 ( #21307 )
...
Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
2023-06-16 09:04:23 -04:00
hc-github-team-secure-vault-core
f6f60770df
backport of commit e6f3003adcd00fa904309654e69c1201568e62c7 ( #21278 )
...
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-06-15 18:46:11 +00:00
hc-github-team-secure-vault-core
f41a167d6a
backport of commit b993384983f2c4d8e38b958fea0d56b0b83306ee ( #21258 )
...
Co-authored-by: miagilepner <mia.epner@hashicorp.com>
2023-06-15 16:13:53 +00:00
hc-github-team-secure-vault-core
846af74338
backport of commit 89469110784efdb8f9ebc481040e5b779303c04e ( #21212 )
...
Co-authored-by: Theron Voran <tvoran@users.noreply.github.com>
2023-06-13 21:25:11 +00:00
hc-github-team-secure-vault-core
a97b1ffeb6
backport of commit c823bd99a8ed9d000268b61cd325c3842f0eb933 ( #21191 )
...
Co-authored-by: Nick Cabatoff <ncabatoff@hashicorp.com>
2023-06-13 19:18:09 +00:00
hc-github-team-secure-vault-core
97a3665b9b
backport of commit a3657dc604fbffafce5c42f8ad0a972e4cf0213c ( #21184 )
...
Co-authored-by: Theron Voran <tvoran@users.noreply.github.com>
2023-06-13 17:53:08 +00:00
hc-github-team-secure-vault-core
53d14ec6e1
backport of commit 7a47df649d84103aff36a077710c4e21c99d0fea ( #21178 )
...
Co-authored-by: Daniel Huckins <dhuckins@users.noreply.github.com>
2023-06-13 16:40:49 +00:00
hc-github-team-secure-vault-core
460815581d
backport of commit 51c7e3e31ae8c927e35a52ab636a0817cf5f8fc8 ( #21176 )
...
Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
2023-06-13 09:30:39 -07:00
hc-github-team-secure-vault-core
6a4d2b13ea
backport of commit 820f7ee22f659352f7fa58e25f3078c21fadb77b ( #21175 )
...
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-06-13 16:17:39 +00:00
Anton Averchenkov
ef1f360248
[docs] Agent Process Supervisor Mode ( #21056 ) ( #21172 )
2023-06-13 15:40:01 +00:00
hc-github-team-secure-vault-core
fa482cbf1c
backport of commit f2887a253506f80cd507d619dc49a2a495c173c1 ( #21139 )
...
Co-authored-by: Paul Banks <pbanks@hashicorp.com>
2023-06-13 14:21:51 +00:00
hc-github-team-secure-vault-core
7d6c3aca5f
backport of commit 95ad2461624cc002f768b2eac4196b6884f6ddfe ( #21162 )
...
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2023-06-13 02:37:20 +00:00
hc-github-team-secure-vault-core
8dc607d08d
backport of commit 8194ec14fd2ac3bf47fcd5f77e9446753c93a428 ( #21154 )
...
Co-authored-by: Anton Averchenkov <84287187+averche@users.noreply.github.com>
2023-06-13 00:49:33 +00:00
hc-github-team-secure-vault-core
17b114c88d
backport of commit 810bb6ccb28fd19d2f381bd60938c833dc96aec1 ( #21158 )
...
Co-authored-by: Kyle Schochenmaier <kschoche@gmail.com>
2023-06-12 16:04:12 -05:00
hc-github-team-secure-vault-core
6c26b96b31
backport of commit 0ff9059967aa3fc0f2be0fd46926f9a7f1de5573 ( #21124 )
...
Co-authored-by: Josh Black <raskchanky@gmail.com>
2023-06-09 22:04:11 +00:00
hc-github-team-secure-vault-core
d8c82657e4
backport of commit 787897fa3af5c067f71e997343d436e50a5c97ff ( #21095 )
...
Co-authored-by: Jason O'Donnell <2160810+jasonodonnell@users.noreply.github.com>
2023-06-08 21:59:19 +00:00
hc-github-team-secure-vault-core
860b92d02c
backport of commit 698c39f988f773040868cff8a38b76de03199a2d ( #21089 )
...
Co-authored-by: Jason O'Donnell <2160810+jasonodonnell@users.noreply.github.com>
2023-06-08 19:59:37 +00:00
hc-github-team-secure-vault-core
e4867f0e7d
backport of commit 508017d073021bc2410ec91cbb26aa95bb9569af ( #21075 )
...
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2023-06-08 18:27:15 +00:00
hc-github-team-secure-vault-core
2ed4242ab1
backport of commit bbcd3f1c1bb787e15c6008e684b81b83be7245f0 ( #21079 )
...
Co-authored-by: Conor McCullough <103977699+conor-mccullough@users.noreply.github.com>
2023-06-08 15:06:11 +00:00
hc-github-team-secure-vault-core
63789ceb9f
backport of commit 0bd356f6cd9bd82c108535439a7f83796c89030e ( #21065 )
...
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2023-06-08 01:35:28 +00:00
hc-github-team-secure-vault-core
cb5e9c9e81
backport of commit b023353b2e92fd4ddcf94c735bc595b84fd02fab ( #21067 )
...
Co-authored-by: Thy Ton <maithytonn@gmail.com>
2023-06-07 16:47:26 -07:00
hc-github-team-secure-vault-core
d8979b449c
backport of commit f079b7b0a4de28f1230a270fc35ea5a787ad96d2 ( #21060 )
...
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-06-07 21:32:58 +00:00
hc-github-team-secure-vault-core
a5668f5f8f
backport of commit f1649fcde397ceddbf29d72f253e1932d9c091bd ( #21049 )
...
Co-authored-by: Nick Cabatoff <ncabatoff@hashicorp.com>
2023-06-07 14:38:20 -04:00
hc-github-team-secure-vault-core
c61f8780ed
backport of commit 45b9dffea1cf4fe4e506a9ef9138229961bfbbb4 ( #21026 )
...
Co-authored-by: kpcraig <3031348+kpcraig@users.noreply.github.com>
2023-06-06 20:00:24 +00:00
hc-github-team-secure-vault-core
f846268fd6
backport of commit bb03d116999439bdebed58cb3536a756ba920d8d ( #20958 )
...
Co-authored-by: Kunj Dave <63642262+kdav108@users.noreply.github.com>
2023-06-02 15:29:47 +00:00
hc-github-team-secure-vault-core
d1764ca0b5
backport of commit 00485c767d121f34a23a7a3931c292da45eb8ddb ( #20956 )
...
Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
2023-06-02 07:12:07 -07:00
hc-github-team-secure-vault-core
30837138d9
backport of commit 34a722195e730b85de1c1d29f0766264e2552434 ( #20951 )
...
Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>
2023-06-02 03:29:48 +00:00
hc-github-team-secure-vault-core
7ffedab7ce
backport of commit e63dc30507cbd65cd7bcd59c317edd663e035af7 ( #20946 )
...
Co-authored-by: Kit Haines <khaines@mit.edu>
2023-06-01 18:42:16 -04:00
hc-github-team-secure-vault-core
a486b13957
backport of commit 63ccb60b9a6dadf717e6813f9789c7194a2375de ( #20877 )
...
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-05-30 23:49:24 +00:00
hc-github-team-secure-vault-core
09569aa28e
backport of commit be2464fbea069f8aed6b6bd271a24ff3ed6037da ( #20861 )
...
Co-authored-by: Milena Zlaticanin <60530402+Zlaticanin@users.noreply.github.com>
2023-05-30 21:54:09 +00:00
hc-github-team-secure-vault-core
2f52c505a0
backport of commit 54685189eb1b210ed14bd3c35a2a337c58ca8e42 ( #20851 )
...
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-05-30 20:12:47 +00:00
hc-github-team-secure-vault-core
1fe6475c72
Backport: Add 1.14 draft docs and UI known issue #20665 ( #20854 )
...
Co-authored-by: Chelsea Shaw <82459713+hashishaw@users.noreply.github.com>
2023-05-30 10:27:48 -05:00
Thy Ton
9fbf8ad72f
update API docs for kubernetes secrets engine ( #20726 )
...
Co-authored-by: Tom Proctor <tomhjp@users.noreply.github.com>
2023-05-26 07:38:22 -07:00
Ben Ash
57e41db42a
Update VSO API reference docs for v0.1.0-beta.1 ( #20801 )
...
Co-authored-by: Kyle Schochenmaier <kschoche@gmail.com>
2023-05-25 20:31:45 -04:00
Kyle Schochenmaier
b43e865aef
[docs] update helm docs for vso beta1 release ( #20776 )
...
* update helm docs for vso beta1 release
2023-05-25 16:45:08 -05:00
Jonathan Frappier
24edfc6be4
Add additional endpoints, remove non-protected endpoints ( #20669 )
...
* Add additional endpoints, remove non-protected endpoints
* Add step-down per engineering
* Match HTTP verb to individual doc pages
* Add /sys/internal/inspect/router to table
* Apply additional suggestions
* Updates based on engineering feedback
* Adding unsaved changes
2023-05-24 17:32:53 -04:00
kpcraig
628c51516a
VAULT-12226: Add Static Roles to the AWS plugin ( #20536 )
...
Add static roles to the aws secrets engine
---------
Co-authored-by: maxcoulombe <max.coulombe@hashicorp.com>
Co-authored-by: vinay-gopalan <86625824+vinay-gopalan@users.noreply.github.com>
Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
2023-05-24 14:55:13 -04:00
Alexander Scheel
04bb7eef15
Update transit public keys for Ed25519 support ( #20727 )
...
* Refine documentation for public_key
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Support additional key types in importing version
This originally left off the custom support for Ed25519 and RSA-PSS
formatted keys that we've added manually.
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Add support for Ed25519 keys
Here, we prevent importing public-key only keys with derived Ed25519
keys. Notably, we still allow import of derived Ed25519 keys via private
key method, though this is a touch weird: this private key must have
been packaged in an Ed25519 format (and parseable through Go as such),
even though it is (strictly) an HKDF key and isn't ever used for Ed25519.
Outside of this, importing non-derived Ed25519 keys works as expected.
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Add public-key only export method to Transit
This allows the existing endpoints to retain private-key only, including
empty strings for versions which lack private keys. On the public-key
endpoint, all versions will have key material returned.
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Update tests for exporting via public-key interface
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Add public-key export option to docs
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
---------
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-05-24 11:26:35 -04:00
Tom Proctor
e41119d5f4
Docs: Updates for latest Vault CSI Provider releases ( #20721 )
2023-05-24 13:07:00 +01:00
Peter Wilson
5eb03f785e
Docs: audit - add warning when disabling device regarding HMAC ( #20715 )
...
* added note to warn of potential issues in disabling audit when using HMAC
* added to command docs pages too
2023-05-23 14:55:55 +01:00
claire bontempo
f4793cdca1
remove paragraph ( #20709 )
2023-05-22 16:14:17 -04:00
Mike Palmiotto
dc8d2af2d8
Add current_billing_period activity endpoint param ( #20694 )
...
* Add current_billing_period activity endpoint param
This commit introduces a new parameter: `current_billing_period`, which
can be used in lieu of `start_time` and `end_time` options.
GET ... /sys/internal/counters/activity?current_billing_period=true now
results in a response which contains the full billing period
information.
* changelog
* Update internal counters docs
2023-05-22 09:22:45 -04:00
Christopher Swenson
f80a73d0fe
docs: Traditional HA standby nodes do *not* serve read requests directly ( #20687 )
2023-05-19 13:00:57 -07:00
Violet Hynes
a47c0c7073
VAULT-15546 First pass at Vault Proxy docs ( #20578 )
...
* VAULT-15546 First pass at Vault Proxy docs
* VAULT-15546 correct errors
* VAULT-15546 fully qualify paths
* VAULT-15546 remove index
* VAULT-15546 Some typos and clean up
* VAULT-15546 fix link
* VAULT-15546 Add redirects so old links stay working
* VAULT-15546 more explicit redirects
* VAULT-15546 typo fixes
* Suggestions for Vault Agent & Vault Proxy docs (#20612 )
* Rename 'agentandproxy' to 'agent-and-proxy' for better URL
* Update the index pages for each section
* VAULT-15546 fix link typo
---------
Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
2023-05-19 13:11:39 -04:00
Equus quagga
0750d31a4c
Added a note to remove-peer ( #20583 )
...
* Update raft.mdx
* Update website/content/docs/commands/operator/raft.mdx
Co-authored-by: Josh Black <raskchanky@gmail.com>
---------
Co-authored-by: Josh Black <raskchanky@gmail.com>
2023-05-19 12:21:30 +02:00
Equus quagga
5ff1bfc1e8
Update docs/secrets/databases/mssql.mdx ( #20623 )
...
Added a note in the `Example for Azure SQL Database` section stating that we only support SQL auth and no Azure AD auth.
2023-05-18 19:33:55 -07:00
l-with
d1d3d697da
Add possibility to decode generated encoded root token to api ( #20595 )
2023-05-18 15:18:19 -04:00
Jonathan Frappier
03a684eb7e
Add root protected endpoint table ( #20650 )
...
* Add root protected endpoint table
* Fix heading case
2023-05-18 11:53:22 -04:00
Luis (LT) Carbonell
95e6723aa9
Correct Default for MaximumPageSize ( #20453 )
...
* default max page size for config
* Add changelog
* update test int to *int
* add testing defaults
* update default to -1, i.e. dont paginate
* update test
* Add error message for invalid search
* Make 0 the default
* cleanup
* Add to known issues doc
* Update website/content/docs/upgrading/upgrade-to-1.13.x.mdx
* Update website/content/docs/upgrading/upgrade-to-1.11.x.mdx
Co-authored-by: Jason O'Donnell <2160810+jasonodonnell@users.noreply.github.com>
* Update website/content/docs/upgrading/upgrade-to-1.13.x.mdx
Co-authored-by: Jason O'Donnell <2160810+jasonodonnell@users.noreply.github.com>
* Update website/content/docs/upgrading/upgrade-to-1.12.x.mdx
Co-authored-by: Jason O'Donnell <2160810+jasonodonnell@users.noreply.github.com>
* Add workaround to docs
* Update changelog/20453.txt
Co-authored-by: Austin Gebauer <34121980+austingebauer@users.noreply.github.com>
---------
Co-authored-by: Jason O'Donnell <2160810+jasonodonnell@users.noreply.github.com>
Co-authored-by: Austin Gebauer <34121980+austingebauer@users.noreply.github.com>
2023-05-17 20:56:53 +00:00
Stefano Cattonar
023d847182
Fixed a typo in the "Environment Variable Example" because it was generating a parsing error ( #20574 )
...
Fixed a typo in the "Environment Variable Example" because it was generating a parsing error:
template server error: error="(dynamic): execute: template: :2:30: executing \"\" at <.Data.data.payments_api_key>: can't evaluate field data in type *dependency.Secret"
2023-05-12 22:34:51 +00:00
Josh Black
8c08ac8df4
add undo logs metrics to docs ( #20568 )
2023-05-11 18:28:25 -07:00
Rowan Smith
57af313dc8
Update server.mdx ( #19881 )
...
added a note detailing that usage of `-log-file` functions as an additional output, does not replace journald / stdout
2023-05-11 17:18:55 -07:00
Gabriel Santos
05f3236c15
Provide public key encryption via transit engine ( #17934 )
...
* import rsa and ecdsa public keys
* allow import_version to update public keys - wip
* allow import_version to update public keys
* move check key fields into func
* put private/public keys in same switch cases
* fix method in UpdateKeyVersion
* move asymmetrics keys switch to its own method - WIP
* test import public and update it with private counterpart
* test import public keys
* use public_key to encrypt if RSAKey is not present and failed to decrypt
if key version does not have a private key
* move key to KeyEntry parsing from Policy to KeyEntry method
* move extracting of key from input fields into helper function
* change back policy Import signature to keep backwards compatibility and
add new method to import private or public keys
* test import with imported public rsa and ecdsa keys
* descriptions and error messages
* error messages, remove comments and unused code
* changelog
* documentation - wip
* suggested changes - error messages/typos and unwrap public key passed
* fix unwrap key error
* fail if both key fields have been set
* fix in extractKeyFromFields, passing a PolicyRequest wouldn't not work
* checks for read, sign and verify endpoints so they don't return errors when a private key was not imported and tests
* handle panic on "export key" endpoint if imported key is public
* fmt
* remove 'isPrivateKey' argument from 'UpdateKeyVersion' and
'parseFromKey' methods
also: rename 'UpdateKeyVersion' method to 'ImportPrivateKeyForVersion' and 'IsPublicKeyImported' to 'IsPrivateKeyMissing'
* delete 'RSAPublicKey' when private key is imported
* path_export: return public_key for ecdsa and rsa when there's no private key imported
* allow signed data validation with pss algorithm
* remove NOTE comment
* fix typo in EC public key export where empty derBytes was being used
* export rsa public key in pkcs8 format instead of pkcs1 and improve test
* change logic on how check for is private key missing is calculated
---------
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-05-11 11:56:46 +00:00
Jonathan Frappier
82427e355f
Add requested generated secret example ( #20556 )
...
* Add requested generated secret example
* Fix code block types
* Update website/content/docs/secrets/kv/kv-v1.mdx
Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
* Update website/content/docs/secrets/kv/kv-v2.mdx
Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
---------
Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
2023-05-10 18:21:26 -04:00
Jens Hofmann
b8ac5ec2da
Update elasticdb.mdx ( #20437 )
...
* Update elasticdb.mdx
Remove success message of vault write operations from text blocks to better support copy&paste to console
* Update code block types
---------
Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
2023-05-04 16:17:57 -07:00
Alex Cahn
976881954a
Update interoperability-matrix.mdx ( #20501 )
...
* Update interoperability-matrix.mdx
* Update interoperability-matrix.mdx
Added MySQL as well
2023-05-04 08:58:00 -07:00
Alexander Scheel
c1bc341b88
Add note about cross-cluster write failures ( #20506 )
...
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-05-04 13:05:14 +00:00
claire bontempo
00e43b88b4
fix typo ( #20473 )
2023-05-02 19:29:14 +00:00
Yoko Hyakuna
a56e4ca96a
Fix the title header - What is Vault ( #20465 )
2023-05-02 11:29:36 -07:00
marcin-kulik
fda0a731fc
Update installation.mdx ( #17954 )
2023-05-02 13:34:42 -04:00
Jonathan Frappier
3c6e130ca2
Add HCP tabs, apply Vale suggestions, fix heading case ( #20361 )
...
* Add HCP tabs, apply Vale suggestions, fix heading case
* Apply feedback
* Apply PM feedback
* Update website/content/docs/secrets/databases/oracle.mdx
Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
* Update website/content/docs/secrets/databases/oracle.mdx
Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
* Update website/content/docs/secrets/databases/oracle.mdx
Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
---------
Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
2023-05-01 11:56:16 -04:00
Josh Black
1d307d48b6
Clarify origin of ID parameter for path filter creation ( #20415 )
...
* Clarify origin of ID parameter for path filter creation
* add additional note
* add additional info
2023-05-01 08:34:03 -07:00
Alexander Scheel
32a7f8250a
Update to tidy status and docs ( #20442 )
...
* Add missing tidy-status state values
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Add docs on auto-tidy reading
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Add missing tidy status field revocation_queue_safety_buffer
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Include pause_duration in tidy-status docs
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Add date of last auto-tidy operation to status
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Add changelog entry
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
---------
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-05-01 14:26:29 +00:00
Alexander Scheel
91481143af
Show existing keys, issuers on PKI import ( #20441 )
...
* Add additional existing keys response field
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Update tests for validating existing keys
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Update docs for import to include new fields
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Add changelog entry
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Update website/content/api-docs/secret/pki.mdx
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
---------
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2023-05-01 14:07:31 +00:00
Yoko Hyakuna
ad96cf88e8
Update the command output example ( #20427 )
2023-04-28 13:46:20 -07:00
Jason Peng
2a954ef072
Updated the HA Upgrade Instructions ( #20206 )
...
* Update index.mdx
Updated instructions for Vault Upgrade HA
* Create vault-ha-upgrade.mdx
Moved HA Vault upgrade instruction to a new page and added a Note for disabling automated upgrade procedure
* Add the new vault-ha-upgrade page to the side menu
* Format and wording edits
* Remove extra paracentesis
* Fix a typo
* Change the title appears on the navigation
---------
Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
2023-04-28 10:54:53 -07:00
Tom Proctor
767dc6283f
docs: Set uniform supported Kubernetes versions for all integrations ( #20010 )
2023-04-28 10:33:37 +01:00
Ben Ash
2f63318cea
api-docs/pki: common_name is no longer required. ( #20403 )
2023-04-27 16:11:49 -04:00
Yoko Hyakuna
155a32fc77
Fix the GDPR link ( #20382 )
2023-04-27 08:57:23 -07:00
Josh Black
80a9d7d4ce
Correct an oversight re: skip_flush in the docs ( #20383 )
2023-04-26 17:30:09 -07:00
Brian Shumate
7fcdb23376
Docs: DR replication API updates ( #20373 )
...
* Docs: DR replication API updates
- Add clarification for secondary_public_key parameter
- Update section header
* During activation
2023-04-26 16:15:46 -07:00
Braulio Gomes Rodrigues
627fe60044
Vault change doc main couchbase ( #20314 )
...
* changing chouchbase host variable
* Alterando linha 82 couchbase
* Changing couchbase host address in main document
2023-04-25 10:21:25 -07:00
miagilepner
7d631cb44f
VAULT-15791: Update docs to use vault-java-driver fork ( #20316 )
2023-04-25 11:08:05 +02:00
Nick Cabatoff
3ddb69bd2b
Fix docs-nav-data.json that I broke in #20312 ( #20322 )
2023-04-24 13:10:53 -04:00
Nick Cabatoff
4d42b08644
Add guidelines for agent/server version compatibility ( #20312 )
2023-04-24 11:49:50 -04:00
Braulio Gomes Rodrigues
03fa9432a4
changing chouchbase host variable ( #19812 )
...
* changing chouchbase host variable
* Alterando linha 82 couchbase
2023-04-24 13:56:56 +00:00
Josh Black
4b9599fddb
update website docs for new update-primary mode ( #20302 )
2023-04-21 15:21:28 -07:00
John Children
bebe6dcaa0
Docs: Fix k8s injector templating example ( #20271 )
...
From every other example I can find, the secret name in the template should match the one in the inject annotation. Indeed the same example appears in the examples page.
https://github.com/hashicorp/vault/blob/main/website/content/docs/platform/k8s/injector/examples.mdx#patching-existing-pods
2023-04-21 17:12:13 +00:00
melmus
c5d10e0b8b
doc/Update service_registration if use Vault HA ( #19920 )
...
* Update service_registration if use Vault HA
* Update protocol
* Minor updates for style consistency
---------
Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
2023-04-21 17:04:25 +00:00
Luis (LT) Carbonell
d308c31cbf
Add Configurable LDAP Max Page Size ( #19032 )
...
* Add config flag for LDAP max page size
* Add changelog
* move changelog to correct file
* cleanup
* Default to non-paged searching for with -1
* Update website/content/api-docs/auth/ldap.mdx
Co-authored-by: Austin Gebauer <34121980+austingebauer@users.noreply.github.com>
* Update website/content/docs/auth/ldap.mdx
Co-authored-by: Austin Gebauer <34121980+austingebauer@users.noreply.github.com>
* Update tests
---------
Co-authored-by: Austin Gebauer <34121980+austingebauer@users.noreply.github.com>
2023-04-20 20:39:27 +00:00
Austin Gebauer
eaf67b7c0e
Add OIDC provider docs for IBM ISAM ( #19247 )
...
* Add OIDC provider docs for IBM ISAM
* Add changelog, api docs and docs-nav-data
---------
Co-authored-by: Benjamin Voigt <benjamin.voigt@god.dev>
2023-04-20 11:30:59 -07:00
Hugo Puntos
dae5489787
Fix link for the tutorial about Key Management Secrets Engine with GCP Cloud KMS ( #19418 )
2023-04-19 12:43:21 -04:00
Jason O'Donnell
b5822e612b
cli/namespace: add detailed flag to namespace list ( #20243 )
...
* cli/namespace: add detailed flag to namespace list
* changelog
2023-04-19 09:31:51 -04:00
Sohil Kaushal
5424eb2e8f
docs(postgresql): Update Postgresql SE API doco ( #19931 )
...
* docs(postgresql): Update Postgresql SE API doco
Update the postgresql secret engine API docs to include some "caveats"
of the pgx library. In particular, this enhances the docs to inform the
user that if any sslcreds are supplied as a part of the Database
connection string, the user/vault admin will need to ensure that the
certificates are present at those paths.
* Chore: fixup minor error with db docs
* Keep the language simple
---------
Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
2023-04-19 00:17:44 +00:00
Yoko Hyakuna
e7a43f86ba
[Docs] Mark the 'policies' parameter as deprecated for tokens ( #20238 )
...
* Mark the 'policies' parameter as deprecated
* Update website/content/partials/tokenfields.mdx
Co-authored-by: Theron Voran <tvoran@users.noreply.github.com>
---------
Co-authored-by: Theron Voran <tvoran@users.noreply.github.com>
2023-04-18 23:55:05 +00:00
Tom Proctor
f2d8762679
Docs: CSI encoding config released in v1.3.0 ( #20237 )
2023-04-18 23:55:25 +01:00
Nathan Handler
ad1c669d4b
Fix Indentation in Kubernetes Auth Example ( #20216 )
...
In the Kubernetes Auth Code Example, the indentation for the `auth` import is off, causing it to not be indented the same amount as the previous `vault` import. This change ensures that both imports use the same indentation.
2023-04-18 15:23:25 -07:00
Yura Shutkin
7de8a3bc31
Update wrapping-unwrap.mdx ( #20109 )
...
* Update wrapping-unwrap.mdx
It is possible to unwrap data without authentication in Vault. I've added an example of a curl request.
* Add changelog record
2023-04-18 14:20:27 -07:00
Jason O'Donnell
bb82c679ad
docs/debug: add example policy for debug command ( #20232 )
2023-04-18 14:17:19 -04:00
Max Bowsher
91abc177bb
Minor follow-ups to #16865 ( #20220 )
...
* Minor follow-ups to #16865
Fix PKI issuer upgrade logic when upgrading to 1.12 or later, to
actually turn off the issuer crl-signing usage when it intended to.
Fix minor typo in docs.
* changelog
2023-04-18 07:39:05 -04:00
Milena Zlaticanin
42400699c0
add missing mongodb atlas fields to the docs ( #20207 )
2023-04-17 14:10:07 -07:00
Niranjan Shrestha
adbfffc47b
Update userpass.mdx ( #20121 )
...
* Update userpass.mdx
vault write auth/userpass/users/mitchellh password=foo policies=admins
in the path "userpass" is actually a path, if custom path is defined, custom path need to used, instead of userpass.
* Add extra description
---------
Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
2023-04-17 16:52:13 +00:00
Scott Miller
5be4d61d13
Add documentation for cert auth OCSP checking ( #18064 )
2023-04-13 18:33:21 +00:00
Jason O'Donnell
ec9e08c931
sdk/ldaputil: add connection_timeout configurable ( #20144 )
...
* sdk/ldaputil: add connection_timeout configurable
* changelog
* Update doc
* Fix test
* Change default to 30s
2023-04-13 12:43:28 -04:00
Josh Black
cf20bb9233
Add additional clarity around autopilot upgrade versions ( #20129 )
2023-04-12 17:21:50 -07:00
James King
0b6327eda9
Potentially Malicious Link ( #20114 )
...
* Potentially Malicious Link
The current link redirects to a personal beauty sales site.
* Create 20114.txt
2023-04-12 20:23:41 +00:00
Matt Schultz
2310e13cf1
Update docs to include specifics and caveats around Transit Managed Keys support. ( #20099 )
2023-04-12 12:19:25 -05:00
Mike Palmiotto
1b5d527521
api: Add reporting fields to activitylog config endpoint ( #20086 )
...
This PR adds the internal reporting state to the
`internal/counters/config` read endpoint:
* reporting_enabled
* billing_start_timestamp
2023-04-12 12:02:28 -04:00
Violet Hynes
918d1001e0
Docs: remove use_auto_auth token from cache docs ( #20111 )
2023-04-12 13:26:36 +00:00
Yoko Hyakuna
0b3f24a2d8
Update the HTTP verb for consistency ( #20056 )
2023-04-11 13:35:06 -07:00
Austin Gebauer
787c5971ab
docs/oidc: fixes Azure user.read permission link ( #20079 )
2023-04-11 11:34:38 -07:00
Jonathan Frappier
6980579388
Fix list formatting ( #20076 )
2023-04-11 09:25:12 -07:00
John-Michael Faircloth
8a4e50fa64
secrets/openldap: add creds/ endpoint to API docs ( #19973 )
2023-04-11 08:42:50 -05:00
Yoko Hyakuna
de1eeffdcf
[Docs] Add tutorial links to install doc ( #20051 )
...
* Add tutorial links for additional guidance
* Removed extra space
2023-04-10 08:52:48 -07:00
Christopher Swenson
43912fe0e2
Update docs for Helm 0.24.0 release ( #20049 )
...
Release: https://github.com/hashicorp/vault-helm/releases/tag/v0.24.0
2023-04-07 14:03:43 -07:00
Kyle Schochenmaier
c3ef3d9c3f
add upgrade documentation around STS lease_duration issue ( #20011 )
...
* add upgrade documentation around STS lease_duration issue
Co-authored-by: Robert <17119716+robmonte@users.noreply.github.com>
2023-04-07 17:34:42 +00:00
Andreas Gruhler
0036a35c58
Update helm.mdx ( #20020 )
...
I was wondering why the default VaultAuth CR was not created. It was due the fact that I copy/pasted the snippet from the docs here, which has the wrong key.
2023-04-07 09:31:08 -07:00
ram-parameswaran
29182ae562
update index.mdx with correct installation doc ref ( #19932 )
...
* update index.mdx with correct installation doc ref
update index.mdx with installation doc ref to point to the right installation.mdx path
* Update installation ref
Update installation ref
* Update index ref without relative path
Update installation doc index ref without relative path
2023-04-07 08:48:23 -07:00
Brian Shumate
29fdfeeb04
API docs: update Transit restore payload example ( #20032 )
...
- Correct JSON payload example
2023-04-07 08:14:43 -04:00
Chip Stepowski
8cd90fc1e2
Update Create Role heading to Create/Update Role ( #20000 )
...
The subheading states you can update a named role but for navigation purposes I think it would also make sense to add it to the heading too.
2023-04-06 11:42:22 +01:00
Florin Cătălin Țiucra-Popa
59d3f5110d
Update create.mdx ( #19981 )
...
Add the missing Command Option `-wrap-ttl`
2023-04-05 17:54:07 +02:00
Yoko Hyakuna
f649c9e20c
Updated the example config with api_addr parameter ( #19985 )
2023-04-04 17:58:08 -07:00
Yoko Hyakuna
e90d94b97e
Extends the PR19488 ( #19928 )
2023-04-04 14:52:57 -07:00
Theron Voran
74d87239af
docs/vault-k8s: example using pkiCert and writeToFile ( #19926 )
...
Adding an example of using pkiCert and writeToFile to write cert and
key files from a template.
---------
Co-authored-by: Tom Proctor <tomhjp@users.noreply.github.com>
2023-04-03 16:39:26 -07:00
Alain Chiasson
9ee73e38fb
Update replication-dr.mdx ( #19604 )
...
In testing, disabling the dr secondary requires a DR Operations token, not a vault token.
2023-04-03 13:35:16 -04:00
Alexander Scheel
a94541080f
Clarify that other operations run while tidy is paused ( #19914 )
...
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-03-31 16:09:37 -04:00
Mark Lewis
d90f6daee9
Update kubernetes.mdx ( #19567 )
...
Correct 2 typos
2023-03-30 16:42:25 -07:00
Anthony Burke
95472e0ae5
fixes oracle plugin whitespace ( #19470 )
2023-03-30 16:40:25 -07:00
Chip Stepowski
256e20e862
Added note about Autopilot default values. ( #19515 )
...
* Added note about Autopilot default values.
* Update website/content/docs/concepts/integrated-storage/autopilot.mdx
Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
---------
Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
2023-03-30 16:30:29 -07:00
Peter Wilson
538e66ffea
Add available types to API documentation for enable audit ( #19850 )
2023-03-30 15:30:35 +00:00
Kit Haines
d2ecf8ffc5
Add PKI-CLI to docs ( #19669 )
...
* Add pki-cli docs.
* Tiny updates.
* Whitespace fix, include description
* Closing-tags.
* Update website/content/docs/commands/pki/verify-sign.mdx
Title Code as Shell
Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
* Update website/content/docs/commands/pki/reissue.mdx
Title More Code as Shell
Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
* Update website/content/docs/commands/pki/list-intermediates.mdx
Title code block as shell
Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
* Update website/content/docs/commands/pki/issue.mdx
Title code-block as shell
Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
* Apply suggestions from code review
Label Code-Blocks as Shell-Session
Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
* Apply suggestions from code review
Comma and Period Changes.
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Apply suggestions from code review
ascheels highlighting-1
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Fix highlighting throughout.
* Update website/content/docs/commands/pki/list-intermediates.mdx
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Update website/content/docs/commands/pki/reissue.mdx
Clarifying note on why unknown fields might be there.
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Update website/content/docs/commands/pki/reissue.mdx
cipherboy request
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Add Key-ID RFC link.
* k=v add link
* correct link
---------
Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-03-30 07:31:48 -04:00
Theron Voran
f0391962a2
docs/vault-secrets-operator: update for beta install ( #19835 )
...
Update the helm commands to work with the beta release.
2023-03-29 22:51:34 +00:00
Brian Shumate
f4fbca8050
Docs: API: Update token_period description ( #19821 )
...
- Clarify token_period per feedback in SPE-34
2023-03-29 13:53:16 -07:00
Ben Ash
7322dd952b
Add vault-secrets-operator beta docs. ( #19827 )
...
Co-authored-by: Kyle Schochenmaier <kschoche@gmail.com>
Co-authored-by: Tom Proctor <tomhjp@users.noreply.github.com>
Co-authored-by: Theron Voran <tvoran@users.noreply.github.com>
2023-03-29 20:33:06 +00:00
Robert
71071fd954
docs: Change wording for AssumeRole permissions in AWS secrets ( #19823 )
...
Co-authored-by: wernerwws <wernerwws@users.noreply.github.com>
2023-03-29 13:03:26 -05:00
Raymond Ho
554674fb59
add docs for VAULT_RUN_MODE ( #19808 )
2023-03-28 21:18:45 -07:00
Victor Rodriguez
bd76f6c539
Update Vault PKCS#11 Provider documentation for v0.2.0. ( #19783 )
2023-03-28 14:57:45 -04:00
Anton Averchenkov
41466b9eca
docs: Fix duration format link in kv-v2 docs page ( #19768 )
2023-03-27 13:18:25 -04:00
Raymond Ho
f725e151b8
add warning for vault lambda extension cache ttl ( #19738 )
2023-03-24 23:37:38 +00:00
ram-parameswaran
f491cc8225
Update username template description for AWS ( #19690 )
...
Update username template description for AWS by calling out what DisplayName and PolicyName actually are placeholders for
2023-03-23 19:56:55 -07:00
Yoko Hyakuna
11a748de4a
Add OpenAPI Go and C# ( #18896 )
...
* Add OpenAPI Go and C#
* Update website/content/docs/get-started/developer-qs.mdx
Co-authored-by: Anton Averchenkov <84287187+averche@users.noreply.github.com>
* Update website/content/docs/get-started/developer-qs.mdx
Co-authored-by: Anton Averchenkov <84287187+averche@users.noreply.github.com>
* Update website/content/docs/get-started/developer-qs.mdx
Co-authored-by: Anton Averchenkov <84287187+averche@users.noreply.github.com>
* Update website/content/docs/get-started/developer-qs.mdx
Co-authored-by: Anton Averchenkov <84287187+averche@users.noreply.github.com>
* Update website/content/docs/get-started/developer-qs.mdx
Co-authored-by: Anton Averchenkov <84287187+averche@users.noreply.github.com>
* Update website/content/docs/get-started/developer-qs.mdx
Co-authored-by: Anton Averchenkov <84287187+averche@users.noreply.github.com>
* Update website/content/docs/get-started/developer-qs.mdx
Co-authored-by: Anton Averchenkov <84287187+averche@users.noreply.github.com>
* Update website/content/docs/get-started/developer-qs.mdx
Co-authored-by: Anton Averchenkov <84287187+averche@users.noreply.github.com>
* Update website/content/docs/get-started/developer-qs.mdx
Co-authored-by: AnPucel <adiroff@hashicorp.com>
* Update website/content/docs/get-started/developer-qs.mdx
Co-authored-by: AnPucel <adiroff@hashicorp.com>
* Update website/content/docs/get-started/developer-qs.mdx
Co-authored-by: AnPucel <adiroff@hashicorp.com>
* Update website/content/docs/get-started/developer-qs.mdx
Co-authored-by: AnPucel <adiroff@hashicorp.com>
* Add code sample links for OpenAPI-based Go and .NET
* Update website/content/docs/get-started/developer-qs.mdx
Co-authored-by: Anton Averchenkov <84287187+averche@users.noreply.github.com>
* Remove command flags that are no longer needed
* Fix 'OpenAPI C#' > 'OpenAPI .NET'
* Update website/content/docs/get-started/developer-qs.mdx
Co-authored-by: AnPucel <adiroff@hashicorp.com>
* Update website/content/docs/get-started/developer-qs.mdx
Co-authored-by: AnPucel <adiroff@hashicorp.com>
* Update website/content/docs/get-started/developer-qs.mdx
Co-authored-by: AnPucel <adiroff@hashicorp.com>
* Update website/content/docs/get-started/developer-qs.mdx
Co-authored-by: AnPucel <adiroff@hashicorp.com>
---------
Co-authored-by: Anton Averchenkov <84287187+averche@users.noreply.github.com>
Co-authored-by: AnPucel <adiroff@hashicorp.com>
2023-03-23 16:04:50 -07:00
Rowan Smith
8627b8aca5
Update tcp.mdx ( #19546 )
...
expand the info for using x-forwarded-for option
2023-03-23 15:59:42 -07:00
Yoko Hyakuna
af842e2cee
Fix the title parsing error ( #19685 )
2023-03-22 20:35:35 -07:00
Luis (LT) Carbonell
91e04109be
add clarifying statement for pkcs11 support ( #19673 )
2023-03-22 12:40:23 -04:00
ram-parameswaran
b24115cf1e
Updated connection_url to be pgx library relevant ( #19667 )
...
Updated connection_url to be according to the options available in the pgx library instead of the now deprecated use of the lib/pq which was done as part of Vault 1.11 as documented here - https://github.com/hashicorp/vault/blob/main/CHANGELOG.md#june-20-2022
2023-03-22 09:02:47 -07:00
Karel
7469b0828a
Fix: Optionally reload x509 key-pair from disk on agent auto-auth ( #19002 )
...
* Optionally reload x509 key-pair from disk
* Document 'reload' config value
* Added changelog release note
2023-03-22 11:01:58 -04:00
Raymond Ho
96e966e9ef
VAULT-13614 Support SCRAM-SHA-256 encrypted passwords for PostgreSQL ( #19616 )
2023-03-21 12:12:53 -07:00