Commit graph

175 commits

Author SHA1 Message Date
Theron Voran 06700a7110
Adding docs for azure-specific handling in jwt-oidc (#9287)
Co-authored-by: Jason O'Donnell <2160810+jasonodonnell@users.noreply.github.com>
2020-06-29 10:46:41 -07:00
Vitaly Velikodny 1bb9992c92
fix #8092: add the note to docs about impossible to create a custom token with 's.' prefix (#8195)
Co-authored-by: Vishal Nayak <vishalnayak@users.noreply.github.com>
2020-06-29 12:20:23 -04:00
Josh Black 6306faa3d2
Update documentation with more details for allowed_parameters (#9279) 2020-06-29 09:01:33 -07:00
Vishal Nayak c6876fe00f
Resource Quotas: Rate Limiting (#9330) 2020-06-26 17:13:16 -04:00
Theron Voran 505bb596d3
docs: default for the auth-path annotation (#9313)
Updating the default for the auth-path annotation in the k8s injector
docs.
2020-06-25 09:36:23 -07:00
Jason O'Donnell 9a19916d53
doc: update vault helm enterprise image examples (#9299)
* doc: update vault helm enterprise image examples

* fix tar reference
2020-06-23 16:20:34 -04:00
Calvin Leung Huang c45bdca0b3
raft: add support for using backend for ha_storage (#9193)
* raft: initial work on raft ha storage support

* add note on join

* add todo note

* raft: add support for bootstrapping and joining existing nodes

* raft: gate bootstrap join by reading leader api address from storage

* raft: properly check for raft-only for certain conditionals

* raft: add bootstrap to api and cli

* raft: fix bootstrap cli command

* raft: add test for setting up new cluster with raft HA

* raft: extend TestRaft_HA_NewCluster to include inmem and consul backends

* raft: add test for updating an existing cluster to use raft HA

* raft: remove debug log lines, clean up verifyRaftPeers

* raft: minor cleanup

* raft: minor cleanup

* Update physical/raft/raft.go

Co-authored-by: Brian Kassouf <briankassouf@users.noreply.github.com>

* Update vault/ha.go

Co-authored-by: Brian Kassouf <briankassouf@users.noreply.github.com>

* Update vault/ha.go

Co-authored-by: Brian Kassouf <briankassouf@users.noreply.github.com>

* Update vault/logical_system_raft.go

Co-authored-by: Brian Kassouf <briankassouf@users.noreply.github.com>

* Update vault/raft.go

Co-authored-by: Brian Kassouf <briankassouf@users.noreply.github.com>

* Update vault/raft.go

Co-authored-by: Brian Kassouf <briankassouf@users.noreply.github.com>

* address feedback comments

* address feedback comments

* raft: refactor tls keyring logic

* address feedback comments

* Update vault/raft.go

Co-authored-by: Alexander Bezobchuk <alexanderbez@users.noreply.github.com>

* Update vault/raft.go

Co-authored-by: Alexander Bezobchuk <alexanderbez@users.noreply.github.com>

* address feedback comments

* testing: fix import ordering

* raft: rename var, cleanup comment line

* docs: remove ha_storage restriction note on raft

* docs: more raft HA interaction updates with migration and recovery mode

* docs: update the raft join command

* raft: update comments

* raft: add missing isRaftHAOnly check for clearing out state set earlier

* raft: update a few ha_storage config checks

* Update command/operator_raft_bootstrap.go

Co-authored-by: Vishal Nayak <vishalnayak@users.noreply.github.com>

* raft: address feedback comments

* raft: fix panic when checking for config.HAStorage.Type

* Update vault/raft.go

Co-authored-by: Alexander Bezobchuk <alexanderbez@users.noreply.github.com>

* Update website/pages/docs/commands/operator/raft.mdx

Co-authored-by: Alexander Bezobchuk <alexanderbez@users.noreply.github.com>

* raft: remove bootstrap cli command

* Update vault/raft.go

Co-authored-by: Brian Kassouf <briankassouf@users.noreply.github.com>

* Update vault/raft.go

Co-authored-by: Brian Kassouf <briankassouf@users.noreply.github.com>

* raft: address review feedback

* raft: revert vendored sdk

* raft: don't send applied index and node ID info if we're HA-only

Co-authored-by: Brian Kassouf <briankassouf@users.noreply.github.com>
Co-authored-by: Alexander Bezobchuk <alexanderbez@users.noreply.github.com>
Co-authored-by: Vishal Nayak <vishalnayak@users.noreply.github.com>
2020-06-23 12:04:13 -07:00
Mark Gritter 6bd17d7e91
Document new and previously undocumented telemetry metrics: (#9283)
usage metrics
 vault.route.*
 vault.core.unsealed
2020-06-23 13:49:45 -05:00
Calvin Leung Huang 4a5bef48c4
docs: add additional info around transform for tweak and template type (#9203) 2020-06-23 10:32:54 -07:00
Austin Gebauer 965f95239a
docs: clarify when plugin executables must also be given mlock syscall ability (#9275) 2020-06-22 10:05:15 -07:00
Johnathan Schmidt ab4e072bb6
Add the static-roles feature for MSSQL (#9062) 2020-06-19 23:01:06 -07:00
Scott Miller 632c86ecc1
Add new Telemetry config options (#9238)
* Add new Telemetry config options

Add cluster_name, maximum_gauge_cardinality, and usage_gauge_period
configuration options to the config stanza.

Update unit tests.

Document.

Co-authored-by: Mark Gritter <mgritter@hashicorp.com>
2020-06-17 10:07:33 -05:00
Jason O'Donnell e8db47f92d
docs/agent: add overview for consul template fetches (#9227)
* docs/vault-k8s: add overview for consul template fetches

* Add dynamic role link

* move to agent documentation, add link

* fix typo in certificate doc

* fix note about leased secrets

* update secret vs token, add note to pki

* add more secret vs token notes

* add note about caching
2020-06-15 15:49:35 -04:00
Austin Gebauer d9fbd04a33
docs: fix typo in gcp and gcpkms secrets (#9228) 2020-06-15 11:57:51 -07:00
Matt Whiteley 922f9374c6
Fix typo (#9217)
correct parameter is `leader_ca_cert_file`
2020-06-15 14:36:15 -04:00
Michael Golowka 1a8b7765bc
Add password policies to Active Directory secret engine (#9144)
* Also updates AD docs to reflect password policies
2020-06-15 10:36:17 -06:00
Jim Kalafut 320e9ecb92
Minor transform docs rewording (#9223) 2020-06-14 20:53:36 -07:00
Michael Golowka a89f09802d
Integrate password policies into RabbitMQ secret engine (#9143)
* Add password policies to RabbitMQ & update docs
* Also updates some parts of the password policies to aid/fix testing
2020-06-11 16:08:20 -06:00
ncabatoff 9cc77b94a8
Clarify cache setting. (#9204) 2020-06-11 16:20:36 -04:00
Andy Assareh e8a36eb752
replacing "a key usage mode" as it is confusing (#9194)
Since the context of this page is transit and encryption keys, the use of the word "key" to mean effectively common seems ill advised. Proposing an alternative wording.
2020-06-11 07:50:31 -04:00
Theron Voran e1a432a167
AWS: Add iam_groups parameter to role create/update (#8811)
Allows vault roles to be associated with IAM groups in the AWS
secrets engine, since IAM groups are a recommended way to manage
IAM user policies. IAM users generated against a vault role will
be added to the IAM Groups. For a credential type of
`assumed_role` or `federation_token`, the policies sent to the
corresponding AWS call (sts:AssumeRole or sts:GetFederation) will
be the policies from each group in `iam_groups` combined with the
`policy_document` and `policy_arns` parameters.

Co-authored-by: Jim Kalafut <jkalafut@hashicorp.com>
2020-06-09 16:56:12 -07:00
Rob Taylor 76e78605a9
Fixed minor typo in secrets documentation page (#8856) 2020-06-08 11:17:26 -04:00
Frederic Hemberger 4e13db3912
[docs/telemetry] Unnecessary comma in HCL example (#8817) 2020-06-08 11:07:28 -04:00
Rob Jackson 38ca50cdd9
update to include vault_format (#8876) 2020-06-08 10:40:03 -04:00
Calvin Leung Huang 0565e28592
docs: document raft and mlock interaction (#9093)
* docs: document raft and mlock interaction

* docs: expand on mlock issue when raft is used

* Update website/pages/docs/configuration/index.mdx

Co-authored-by: Brian Kassouf <briankassouf@users.noreply.github.com>

Co-authored-by: Brian Kassouf <briankassouf@users.noreply.github.com>
2020-06-05 15:02:55 -07:00
Scott Miller e2d5d92b77
Github markdown doesn't use "^" for superscript, have to be explicit (#9156) 2020-06-05 16:55:33 -05:00
Scott Miller f8f4ae4ab2
Document and give an example of the input size limits when using the FF3-1 transform. (#9151)
* Document and give an example of the input size limits when using the FF3-1
transform.
2020-06-05 07:45:18 -05:00
Jason O'Donnell e0e29a9586
docs/k8s: Add OpenShift K8s beta documentation (#9135)
* doc/k8s: add OpenShift examples

* Update requirements

* Update website/pages/docs/platform/k8s/helm/openshift.mdx

Co-authored-by: Theron Voran <tvoran@users.noreply.github.com>

* Fix ha example

* Fix ha doc

* Update image references

* Fix formatting

Co-authored-by: Theron Voran <tvoran@users.noreply.github.com>
2020-06-03 15:10:37 -04:00
Dave D'Amico a60ba90a20
updated 1.3.2 and 1.4.0 upgrade guides to note AWS STS region issue fixed in 1.4.1 (#9137) 2020-06-03 10:27:45 -07:00
Theron Voran 7622bee530
Docs updates for vault-helm 0.6.0 release (#9116)
* Docs updates for vault-helm 0.6.0 release

* added openshift and postStart values

* noting that openshift support is a beta feature
2020-06-03 11:44:32 -04:00
Theron Voran fa17e22050
Docs updates for vault-k8s 0.4.0 (#9107)
* Adding changes for vault-k8s 0.4.0

* add note about run-as-same-user rejecting root
2020-06-03 10:06:20 -04:00
Brian Kassouf fbd9fd4510
Fix upgrade guide (#9133) 2020-06-02 16:27:19 -07:00
Michael Golowka 5ca4d819d1
Update OpenLDAP Secrets Docs with Password Policies (#9088)
* Update OpenLDAP docs to use password policies
2020-06-02 11:34:01 -06:00
Michael Golowka bd587da491
Add docs for password policies (#8974)
* Add docs for password policies
2020-06-02 11:12:22 -06:00
Alexander Bezobchuk 9dd67cbeb6
Merge PR #9027: Integrated Storage (Raft): Add Support for max_entry_size Config 2020-06-01 10:17:24 -04:00
dddugan a098e313a9
correct sockaddr.is_contained example (#9104)
Syntax for sockaddr.is_contained should be outer, inner - i.e. range, IP. See https://docs.hashicorp.com/sentinel/imports/sockaddr/ for reference.
2020-05-29 10:51:31 -07:00
ncabatoff 9987b71a36
Update seal docs to reflect 1.3 changes. (#9086) 2020-05-29 13:28:03 -04:00
Christophe Drevet-Droguet 932c1834cc
ssh certificate signing: fix documentation of extensions (#8859) 2020-05-29 13:23:19 -04:00
Elthariel 3a07bd0bc4
doc: Add an example of templated policy using k8s metadata (#9101) 2020-05-28 17:54:56 -07:00
ncabatoff d8c52a4b44
Add note regarding LDAP regression. (#9038) 2020-05-27 12:29:30 -04:00
Thomas L. Kula 3ce9615992
Allow auto_auth with templates without specifying a sink (#8812)
For situations where you want the Vault agent to handle one or more templates but do not require the acquired credentials elsewhere.

Modify the logic in SyncServer so that if there are no sinks, ignore any new credentials. Since SyncServer is responsible for shutting down the agent, make sure it still properly shuts down in this new situation.

Solves #7988
2020-05-26 13:52:14 -04:00
Jim Kalafut a9d7d34ede
Update release notes (#9064) 2020-05-21 18:51:19 -07:00
Jeff Escalante 8eed94b072
🌷 Docs Website Maintenance (#8985)
* website maintenance round
* improve docs, revert bug workaround as it was fixed
* boost memory
* remove unnecessary code
2020-05-21 13:18:17 -04:00
Lauren Voswinkel 8fc08f8c91
Require TLS or plaintext flagging in MySQL configuration (#9012)
* Adds a safety switch to configuration files.

This requires a user to either use TLS, or acknowledge that they are sending
credentials over plaintext.

* Warn if plaintext credentials will be passed

* Add true/false support to the plaintext transmission ack

* Updated website docs and ensured ToLower is used for true comparison
2020-05-21 09:09:37 -07:00
Jason O'Donnell 4b2a72c616
doc: clarify token helper intro (#9058) 2020-05-21 10:11:32 -04:00
Jason O'Donnell 1845ef6d2e
doc: add environment variable template example (#9019)
* doc: add environment variable template example

* Update website/pages/docs/platform/k8s/injector/examples.mdx

Co-authored-by: Becca Petrin <beccapetrin@gmail.com>

Co-authored-by: Becca Petrin <beccapetrin@gmail.com>
2020-05-18 15:51:17 -04:00
Theron Voran b7a9fb8566
docs: updating helm configuration (#8973)
Added helm configs that were changed/added in vault-helm
0.5.0. Also corrected the data type of a few config parameters.
2020-05-18 11:08:40 -07:00
Tyler Reid fbbd4fcf2d
docs: fix agent listener link (#9003) 2020-05-15 06:51:52 -05:00
Scott Miller d1ba50384a
Soften the warning language on PKCS #1 v1.5 padding (#8988)
* Soften the warning language on PKCS #1 v1.5 padding
2020-05-14 12:29:21 -05:00
Jim Kalafut 5825b23013
Add 1.4.1 upgrade guide (#8981) 2020-05-13 16:55:32 -07:00