Commit graph

1282 commits

Author SHA1 Message Date
Jeff Mitchell b57ce8e5c2 Change "lease" parameter in the generic backend to be "ttl" to reduce confusion. "lease" is now deprecated but will remain valid until 0.4.
Fixes #528.
2015-08-20 16:41:25 -07:00
Vishal Nayak beca9f1596 Merge pull request #385 from hashicorp/vishal/vault
SSH Secret Backend for Vault
2015-08-20 10:03:15 -07:00
Bernhard K. Weisshuhn 86cde438a5 avoid dashes in generated usernames for cassandra to avoid quoting issues 2015-08-20 11:15:28 +02:00
vishalnayak 76ed3bec74 Vault SSH: 1024 is default key size and removed 4096 2015-08-19 12:51:33 -07:00
vishalnayak 1f5062a6e1 Merge branch 'master' of https://github.com/hashicorp/vault into vishalvault 2015-08-19 12:16:37 -07:00
Armon Dadgar f351cd5ee0 Merge pull request #531 from mfischer-zd/fix_doc_tls
Clarify availability of tls_min_version
2015-08-18 19:01:28 -07:00
vishalnayak b5cda4942b Vault SSH: doc update 2015-08-18 11:50:32 -07:00
vishalnayak b91ebbc6e2 Vault SSH: Documentation update and minor refactoring changes. 2015-08-17 18:22:03 -07:00
vishalnayak 9db318fc55 Vault SSH: Website page for SSH backend 2015-08-14 12:41:26 -07:00
Michael S. Fischer 0e0cdeed75 Clarify availability of tls_min_version
`tls_min_version` doesn't work in the current Vault release;
make that clear.
2015-08-13 08:35:09 -07:00
vishalnayak 93dfa67039 Merging changes from master 2015-08-12 09:28:16 -07:00
vishalnayak 0abf07cb91 Vault SSH: Website doc v1. Removed path_echo 2015-08-12 09:25:28 -07:00
Erik Kristensen 2233f993ae initial pass at JWT secret backend 2015-08-06 17:49:44 -06:00
Armon Dadgar f58f46c243 Merge pull request #439 from geckoboard/feature-tls-mysql
Using SSL to encrypt connections to MYSQL
2015-08-05 14:52:43 -07:00
Armon Dadgar 4d08cfdf6f Merge pull request #469 from kgutwin/f-config-defaultlease
Add configuration options for default lease duration and max lease duration
2015-08-04 10:06:41 -07:00
Vivien Schilis 9db7426002 Add documentation for the tls_ca_file option 2015-08-04 05:10:33 +00:00
Rusty Ross 719ac6e714 update doc for app-id
make clearer in doc that user-id can accept multiple app-id mappngs as comma-separated values
2015-08-03 09:44:26 -07:00
Armon Dadgar 473668a1a0 Merge pull request #482 from chiefy/master
Adding vaulted nodejs library to libraries section in docs.
2015-07-31 15:13:44 -07:00
Long Nguyen e666b5c624 added golang client 2015-07-31 17:10:38 -04:00
Christopher Najewicz c5c7926af6 Adding vaulted nodejs library to libraries section in docs. 2015-07-31 14:31:26 -04:00
Armon Dadgar 03728af495 Merge pull request #464 from bgirardeau/master
Add Multi-factor authentication with Duo
2015-07-30 17:51:31 -07:00
Bradley Girardeau aa55d36f03 Clean up naming and add documentation 2015-07-30 17:36:40 -07:00
Karl Gutwin 4bad987e58 PR review updates 2015-07-30 13:21:41 -04:00
Karl Gutwin 151ec72d00 Add configuration options for default lease duration and max lease duration. 2015-07-30 09:42:49 -04:00
Armon Dadgar 1535a21198 Merge pull request #384 from dkaffee92/feature/storage-backend-consul-configuration
allow specifying certificates used to talk to consul for storage backend
2015-07-29 14:41:53 -07:00
Fabian Ruff 41106d9b69 fix doc for pki/revoke API 2015-07-29 14:28:12 +02:00
Bradley Girardeau 112f98d86f mfa: cleanup website documentation 2015-07-28 12:25:01 -07:00
Bradley Girardeau 6c24a000a3 mfa: add website documentation 2015-07-28 11:00:57 -07:00
Daniel Kaffee a6f828ba0a made documentation a bit more clear 2015-07-28 15:50:43 +03:00
Daniel Kaffee 4146be770c refactor code 2015-07-28 14:55:33 +03:00
Armon Dadgar 83729a3bd9 website: fixing details about HA backends 2015-07-24 12:11:45 -07:00
Armon Dadgar 80e59089ba Merge pull request #449 from JustinLaRose/master
Cassandra secret backend doc update for connection config
2015-07-23 13:42:59 -07:00
Armon Dadgar eeb623bca0 Merge pull request #447 from kgutwin/f-tlsvers
Specify Vault listener minimum TLS version
2015-07-23 13:42:42 -07:00
Armon Dadgar 9ec3cefea9 Merge pull request #433 from infame-io/feature/s3_sts
Granting S3 backend temporary access
2015-07-23 13:33:58 -07:00
Karl Gutwin 3a5e036727 Document warning for using lower TLS versions 2015-07-23 11:54:45 -04:00
Lauro Balderas 436dfd464d S3 backend session token documentation updated 2015-07-23 22:53:20 +10:00
Justin LaRose 361f10f79e Cassandra secret backend doc update for connection config - "hosts" instead of "host" 2015-07-23 03:07:29 -04:00
Karl Gutwin 1096f5a53e Avoid unnecessary abbreviation 2015-07-22 23:28:46 -04:00
Karl Gutwin 9c963a0632 TLS minimum version documentation 2015-07-22 23:21:18 -04:00
Armon Dadgar 63fcb61145 Merge pull request #419 from nbrownus/telemetry_names
Disable hostname prefix for runtime telemetry
2015-07-22 15:38:23 -07:00
Bradley Girardeau e8d26d244b ldap: change setting user policies to setting user groups 2015-07-20 11:33:39 -07:00
Bradley Girardeau 1e1d4ba66d ldap: add documentation for setting policies based on user 2015-07-14 16:13:40 -07:00
Nate Brown 65dc78ba35 Docs for the telemetry object 2015-07-14 15:45:45 -07:00
Bradley Girardeau 0e2edc2378 ldap: add ability to login with a userPrincipalName (user@upndomain) 2015-07-14 15:37:46 -07:00
Armon Dadgar 3042452def website: fixing lots of references to vault help 2015-07-13 20:12:09 +10:00
Armon Dadgar 7be012b8b6 website: help command is now path-help 2015-07-13 20:03:29 +10:00
Armon Dadgar 26937498f6 physical/zk: Fixing node representation. Fixes #416 2015-07-13 19:33:23 +10:00
Armon Dadgar 8dd9478e14 website: fixing documentation errors. Fixes #412 2015-07-13 19:10:44 +10:00
Armon Dadgar 2da54da6ed website: update HA status, discourage ZK 2015-07-13 19:01:32 +10:00
Matt Button 76bc988e50 Remove documentation that was copied from the terraform project 2015-07-12 16:52:24 +00:00
mootpt 872593d1e1 fixed secrets backend url
minor doc fix
2015-07-06 11:11:58 -07:00
mootpt f782e7382e pointed authentication backend to proper location
pointed authentication backend to proper location
2015-07-06 10:42:14 -07:00
Armon Dadgar 70cd3d1206 Merge pull request #400 from hashicorp/f-glob
Change ACL semantics, use explicit glob and deny has highest precedence
2015-07-06 11:15:49 -06:00
Armon Dadgar 768a6e33b0 website: clarify changes in addition to feedback 2015-07-06 11:10:09 -06:00
Armon Dadgar 0be3d419c8 secret/transit: address PR feedback 2015-07-05 19:58:31 -06:00
Armon Dadgar 01b0257c5f website: update for glob matching 2015-07-05 17:43:13 -06:00
Armon Dadgar f4d555a2ba website: document derived keys in secret/transit 2015-07-05 14:47:16 -07:00
Armon Dadgar 0521c6df6c http: support ?standbyok for 200 status on standby. Fixes #389 2015-07-02 17:49:35 -07:00
Bradley Girardeau 42050fe77b ldap: add starttls support and option to specificy ca certificate 2015-07-02 15:49:51 -07:00
Armon Dadgar 3c58773598 Merge pull request #380 from kgutwin/cert-cli
Enable TLS client cert authentication via the CLI
2015-06-30 11:44:28 -07:00
Armon Dadgar b8f2e8d498 website: document insecure_tls for LDAP backend 2015-06-30 09:42:18 -07:00
Jeff Mitchell 42b90fa9b9 Address some issues from code review.
Commit contents (C)2015 Akamai Technologies, Inc. <opensource@akamai.com>
2015-06-30 09:27:23 -04:00
Karl Gutwin 70fc49be84 Website docs. 2015-06-30 09:18:39 -04:00
Jeff Mitchell fccbc587c6 A Cassandra secrets backend.
Supports creation and deletion of users in Cassandra using flexible CQL queries.

TLS, including client authentication, is supported.

Commit contents (C)2015 Akamai Technologies, Inc. <opensource@akamai.com>
2015-06-30 09:04:01 -04:00
Jeff Mitchell e086879fa3 Merge remote-tracking branch 'upstream/master' into f-pki 2015-06-19 13:01:26 -04:00
Jeff Mitchell a6fc48b854 A few things:
* Add comments to every non-obvious (e.g. not basic read/write handler type) function
* Remove revoked/ endpoint, at least for now
* Add configurable CRL lifetime
* Cleanup
* Address some comments from code review

Commit contents (C)2015 Akamai Technologies, Inc. <opensource@akamai.com>
2015-06-19 12:48:18 -04:00
Armon Dadgar 28ddff305c physical/mysql: cleanup and documentation 2015-06-18 14:31:00 -07:00
Jeff Mitchell 34f495a354 Refactor to allow only issuing CAs to be set and not have things blow up. This is useful/important for e.g. the Cassandra backend, where you may want to do TLS with a specific CA cert for server validation, but not actually do client authentication with a client cert.
Commit contents (C)2015 Akamai Technologies, Inc. <opensource@akamai.com>
2015-06-18 15:22:58 -04:00
Armon Dadgar 7e6f44e39e website: document transit upsert behavior 2015-06-17 18:51:58 -07:00
Armon Dadgar 93ee9f6b76 website: update the transit documentation 2015-06-17 18:45:29 -07:00
Jeff Mitchell 49f1fdbdcc Merge branch 'master' into f-pki 2015-06-16 13:43:25 -04:00
Armon Dadgar 07df5c251d Merge pull request #341 from ryancurrah/ryancurrah-doc-transit-echofix
Do not output the trailing newline in encoding.
2015-06-15 17:36:01 -07:00
Seth Vargo db178571eb Document longest-prefix match
Fixes https://github.com/hashicorp/vault/issues/331
2015-06-15 14:29:20 -04:00
Ryan Currah c232fee6b3 Do not output the trailing newline in encoding.
Added -n to echo command to prevent newlines from showing up in encoding.
2015-06-13 12:03:57 -04:00
Jeff Mitchell e17ced0d51 Fix a docs-out-of-date bug.
Commit contents (C)2015 Akamai Technologies, Inc. <opensource@akamai.com>
2015-06-12 16:33:00 -04:00
Jeff Mitchell db5354823f Fix some out-of-date examples.
Commit contents (C)2015 Akamai Technologies, Inc. <opensource@akamai.com>
2015-06-11 21:17:05 -04:00
Jeff Mitchell 1513e2baa4 Add acceptance tests
* CA bundle uploading
* Basic role creation
* Common Name restrictions
* IP SAN restrictions
* EC + RSA keys
* Various key usages
* Lease times
* CA fetching in various formats
* DNS SAN handling

Also, fix a bug when trying to get code signing certificates.

Not tested:
* Revocation (I believe this is impossible with the current testing framework)

Commit contents (C)2015 Akamai Technologies, Inc. <opensource@akamai.com>
2015-06-08 00:06:09 -04:00
Jeff Mitchell 0d832de65d Initial PKI backend implementation.
Complete:
* Up-to-date API documents
* Backend configuration (root certificate and private key)
* Highly granular role configuration
* Certificate generation
* CN checking against role
* IP and DNS subject alternative names
* Server, client, and code signing usage types
* Later certificate (but not private key) retrieval
* CRL creation and update
* CRL/CA bare endpoints (for cert extensions)
* Revocation (both Vault-native and by serial number)
* CRL force-rotation endpoint

Missing:
* OCSP support (can't implement without changes in Vault)
* Unit tests

Commit contents (C)2015 Akamai Technologies, Inc. <opensource@akamai.com>
2015-06-08 00:06:09 -04:00
Justin Campbell 2a1eac837c docs: Fix examples of auth via JSON
For both userpass and LDAP
2015-06-04 10:38:11 -04:00
Armon Dadgar 66ab2bbf54 Merge pull request #263 from sheldonh/iam-policy
List IAM permissions required by root credentials
2015-06-01 13:16:51 +02:00
Armon Dadgar 98cca9cb18 Merge pull request #261 from jsok/consul-lease
Add ability to configure consul lease durations
2015-06-01 13:04:28 +02:00
Armon Dadgar 82caf31532 Merge pull request #277 from hashicorp/f-rotate
Add support for key rotation
2015-06-01 12:52:32 +02:00
Seth Vargo 507f5b0114 Cleanup style on http index docs 2015-05-31 21:23:44 -07:00
Seth Vargo 4a41d05870 Merge pull request #271 from boncheff/f-doc-update-read-write-example
Update index.html.md
2015-05-31 21:20:34 -07:00
Seth Vargo 090de2c6d3 Merge pull request #279 from whit537/patch-1
Capitalize the first word of a sentence
2015-05-31 15:53:34 -07:00
Seth Vargo 7fd3d50f3e Merge pull request #280 from whit537/patch-2
Put me in charge of dev mode :)
2015-05-31 15:53:24 -07:00
Chad Whitacre b83f3f2d02 Provide missing verb 2015-05-31 17:19:34 -04:00
Chad Whitacre 2ee0e9c51b REMOVE A SINGLE WHITESPACE CHARACTER 2015-05-31 16:21:39 -04:00
Chad Whitacre bd4dce28b5 Remove quotes to match styling elsewhere
Cf. http://vaultproject.io/intro/getting-started/dynamic-secrets.html
2015-05-31 16:20:56 -04:00
Chad Whitacre 2e00c9dd27 fix line wrapping
Sorry!
2015-05-31 16:07:50 -04:00
Chad Whitacre 4aee92f5e4 Direct new users over to the getting started guide
I found myself on the dev server reference, when really I was more interested in the getting started guide. This link is intended to help others get back on the right track.
2015-05-31 16:06:58 -04:00
Chad Whitacre ee4b84928e Put me in charge of dev mode :)
- "You" as subject instead of "Vault"
 - give the actual command
 - minor formatting changes
2015-05-31 15:54:32 -04:00
Chad Whitacre 2e8967ce22 Capitalize the first word of a sentence 2015-05-31 14:22:57 -04:00
Armon Dadgar b71226dfd7 website: document key rotation internals 2015-05-29 15:34:29 -07:00
Armon Dadgar 0563ac643e website: document new system APIs 2015-05-29 15:05:05 -07:00
boncheff a1e5330f78 Update index.html.md
Updated the docs to show an example of how to read/write a secret using the HTTP API
2015-05-28 22:28:25 +01:00
Armon Dadgar e72ed2fa87 Merge pull request #269 from sheldonh/getting_started_deploy_consul
Use local Consul instance in deploy walkthrough
2015-05-28 10:06:36 -07:00
Sheldon Hearn 9126cf576f Use local Consul instance in deploy walkthrough
As per hashicorp/vault#217, demo.consul.io prevents sessions from being
created, which means you can't use it as a backend for Vault.
2015-05-28 14:11:34 +02:00
Sheldon Hearn 71c462b3b2 Clarify the disable_mlock option 2015-05-28 12:40:56 +02:00
certifiedloud ac4763027b replaced confusing term 'physical' with 'storage'. 2015-05-27 14:44:17 -06:00
Sheldon Hearn 89e7bb2569 Missed a few IAM permissions 2015-05-27 16:42:12 +02:00
Sheldon Hearn 3d2005ea56 List IAM permissions required by root credentials 2015-05-27 16:28:24 +02:00
Jonathan Sokolowski 2b1926f262 website: Update /consul/roles/ parameters 2015-05-27 09:54:15 +10:00
Armon Dadgar 5b587b979d Merge pull request #259 from buth/etcd
etcd non-HA storage backend
2015-05-26 15:07:06 -07:00
Eric Buth e4e4253d65 added etcd as a non-HA storage backend, updated documentation 2015-05-26 13:38:25 -04:00
Ian Unruh 2a6dd3225c Add libraries section to HTTP docs 2015-05-22 14:32:14 -07:00
Ian Unruh bb9f7c47ff Add read field flag to documentation 2015-05-22 11:33:28 -07:00
Armon Dadgar e2ff72795e website: doc cleanup 2015-05-20 17:42:29 -07:00
Armon Dadgar 8c75cc83e3 Merge pull request #242 from jstremick/f-physical-s3-backend
Physical S3 backend implementation
2015-05-20 17:00:44 -07:00
joe miller fd57ca0e39 fix doc example to submit valid json in POST body
I don't know if there is some version of curl that auto-generates json but the example didn't work for me on curl 7.32.0. Submitting the data as JSON works though.
2015-05-20 13:11:54 -07:00
James Stremick 53979d6f30 Physical S3 backend implementation 2015-05-20 10:59:03 -04:00
Aaron Bedra ed9b44bb44 Fix typo in app-id docs 2015-05-20 09:36:54 -05:00
Seth Vargo 05e59edb02 Merge pull request #239 from ijin/patch-1
Document that Vault Server needs to be running for vault help path
2015-05-20 12:28:31 +02:00
Michael H. Oshita e2a923a887 Document that Vault Server needs to be running for vault help path
Confused initial, I tried running `vault help secret` by itself and found out that the server needs to be running to execute this command.

Furthermore, the client needs `VAULT_ADDR` configured (`http://127.0.0.1:8200` in dev mode, since it uses https by default) to interact with the server.
2015-05-20 17:06:59 +09:00
Daniel McCarney c7bf89cf60 Add missing word to storage backend threat model. 2015-05-19 12:11:48 -07:00
Daniel McCarney af1aabe397 Fix "the a lease ID" typo. 2015-05-19 12:07:07 -07:00
Daniel McCarney dc5e1a714a Fix "all everything" typo in Secrets description. 2015-05-19 11:59:20 -07:00
Ian Unruh c0409b69ae Remove non-existent unseal API argument 2015-05-18 19:59:18 -07:00
Armon Dadgar 9c916386de Update github.html.md
Fixing incorrect documentation about case sensitivity
2015-05-18 09:37:31 -07:00
Armon Dadgar 3f3133b066 Merge pull request #204 from nrocine/master
Added implementation details to the GitHub Auth Docs on the Vault Website
2015-05-18 09:36:35 -07:00
Armon Dadgar 3b1df5a8ca website: clarify the app-id parameters 2015-05-15 11:39:05 -07:00
Nils Rocine 6481c13bcc Added details in the github auth docs for the website. These details clarify end-to-end use of the github auth backend. Specifically: noting how to create a usable GitHub PAT and an example of how to auth with the PAT. 2015-05-14 13:20:58 -07:00
Mitchell Hashimoto 20d27ca099 website: note PGP key 2015-05-11 11:34:38 -07:00
Armon Dadgar 96e3bac87a website: Document overwrite behavior. Fixes #182 2015-05-11 10:58:29 -07:00
Mitchell Hashimoto 42d6b2a916 http: allow header for auth token [GH-124] 2015-05-11 10:56:58 -07:00
Armon Dadgar fbcf0c2b64 website: Fixing doc error 2015-05-11 10:43:03 -07:00
Armon Dadgar 697a70ca48 website: Adding LDAP docs 2015-05-11 10:43:03 -07:00
Seth Vargo 83c869c5af Cleanup userpass docs 2015-05-08 11:49:58 -04:00
Seth Vargo f3c3f4717a Remove references to -var 2015-05-08 11:45:29 -04:00
Mads R. Christensen 2fc8ab41e4 Fixed typo 2015-05-08 11:48:42 +02:00
Mads R. Christensen 37deb08a1a Added more info about the userpass auth backend API endpoint 2015-05-08 11:45:21 +02:00
Armon Dadgar 19a54ea09a Merge pull request #166 from Banno/remove-plugin-docs
remove unused plugin docs
2015-05-07 12:26:44 -07:00
Spencer Herzberg 71b8f7b779 remove unused docs 2015-05-07 14:20:33 -05:00
Seth Vargo d2a6433270 Add instructions for enabling the auth first 2015-05-07 13:52:06 -04:00
Leo Cassarani db10a974f6 Fix typo in docs: "it's" -> "its" [ci skip] 2015-05-07 11:08:03 +00:00
Armon Dadgar 9d7119d7d0 website: minor doc changes for zookeeper 2015-05-06 11:08:26 -07:00
Spencer Herzberg 8a4c2eb691 cleanup zk HA leftover docs 2015-05-05 17:22:43 -05:00
Spencer Herzberg 9793986357 properly default zk address to localhost 2015-05-05 17:20:38 -05:00
Spencer Herzberg 966204d73f initial implementation of non-ha zookeeper 2015-05-05 16:49:18 -05:00
Seth Vargo a21e9e544d Merge pull request #144 from gotcha/patch-1
Typo
2015-05-05 08:43:43 -07:00
Seth Vargo 8a31b8081b Merge pull request #145 from gotcha/patch-2
Word missing
2015-05-05 08:43:33 -07:00
Godefroid Chapelle 886533e856 Use singular 2015-05-05 09:16:30 +02:00
Godefroid Chapelle 2e92a23727 Word missing 2015-05-05 09:12:32 +02:00
Godefroid Chapelle 4da4aba1bf Typo 2015-05-05 09:05:05 +02:00
Seth Vargo 1cd7e91bcc s/consul/vault /cc @armon 2015-05-03 16:13:55 -04:00
Trevor Pounds 582677b134 Fix documentation typo. 2015-04-28 22:15:56 -07:00
jjshoe 8e182e4b97 I think you a word. 2015-04-28 18:05:40 -05:00
Mitchell Hashimoto df41dd70a0 website: add disable_mlock flag 2015-04-28 15:13:07 -07:00
Emil Hessman ba0225249e website: fix typo 2015-04-28 20:42:53 +02:00
Mitchell Hashimoto d873100562 website: we vendored 2015-04-28 11:40:36 -07:00
Mitchell Hashimoto f3fd061ed0 Merge pull request #54 from pborreli/typos
website: fixed typos
2015-04-28 11:37:49 -07:00
Emil Hessman 04d09c34d2 website: merge 2015-04-28 20:36:27 +02:00
Pascal Borreli 0ec229a9c9 Fixed typos 2015-04-28 19:36:16 +01:00
AJ Bourg cc10592dd4 Update architecture.html.md
Super trivial grammar fix.
2015-04-28 12:32:06 -06:00
Emil Hessman 3d5f3d1d70 website: address minor doc typos 2015-04-28 20:32:04 +02:00
Andrew Williams b68244b252 website: fix small typo 2015-04-28 13:21:44 -05:00
Mat Elder a7c0d26dea msyql to consul on consul backend docs 2015-04-28 14:11:42 -04:00
Mitchell Hashimoto 5345d5ea82 website: remove unused files 2015-04-28 09:46:19 -07:00
Armon Dadgar 848433a355 audit/file: add log_raw parameter and default to hashing 2015-04-27 15:56:41 -07:00
Armon Dadgar 1403fb987b website: Adding the syslog audit backend 2015-04-27 15:56:41 -07:00
Armon Dadgar 43083225d0 website: remove TODO from transit quickstart 2015-04-27 14:58:53 -07:00
Armon Dadgar 434305a6c2 secret/aws: Using roles instead of policy 2015-04-27 14:20:28 -07:00
Armon Dadgar 5edf8cf3a8 Do not root protect role configurations 2015-04-27 14:07:20 -07:00
Armon Dadgar 12e8c0f8cf secret/postgres: secret/mysql: roles endpoints root protected 2015-04-27 14:04:10 -07:00
Armon Dadgar 816d981d1a secret/consul: replace policy with roles, and prefix the token path 2015-04-27 13:59:56 -07:00
Armon Dadgar 6a38090822 secret/transit: rename policy to keys 2015-04-27 13:52:47 -07:00
Armon Dadgar 1a5b774527 website: Adding CIDR block config to app-id 2015-04-27 12:38:04 -07:00
Armon Dadgar 190b7f30e1 website: API consistency 2015-04-27 12:30:46 -07:00
Armon Dadgar 04421a5635 website: aws API 2015-04-27 12:26:23 -07:00
Armon Dadgar b52f52ace6 website: make PG quickstart like MySQL 2015-04-27 12:16:07 -07:00
Armon Dadgar 4404dd2a8f website: adding postgresql API docs 2015-04-27 11:17:13 -07:00
Armon Dadgar 61783663e4 website: document Consul APIs 2015-04-27 11:08:47 -07:00
Seth Vargo a4b55bfc3e Add Quick Start for Postgresql 2015-04-27 09:30:21 -04:00
Seth Vargo 0ffbd1f8ea Add Quick Start for AWS 2015-04-27 09:29:16 -04:00
Armon Dadgar 6ac2c848d7 website: start consul api 2015-04-26 22:03:38 -07:00
Armon Dadgar ea29b313e9 website: consul quickstart 2015-04-26 22:03:38 -07:00
Armon Dadgar 0e12fa9b68 website: adding mysql quickstart and API 2015-04-26 22:03:38 -07:00
Armon Dadgar 0d0aec7abd website: quickstart + API for transit 2015-04-26 22:03:38 -07:00
Armon Dadgar e58676128b website: quickstart for generic 2015-04-26 22:03:38 -07:00
Armon Dadgar 102796bd6d website: fix formating 2015-04-26 22:03:38 -07:00
Mitchell Hashimoto 6b306b597a website: fix API styling for auth 2015-04-26 21:08:11 -07:00
Armon Dadgar 23ab2f6b9d website: documenting token API 2015-04-25 20:21:59 -07:00
Armon Dadgar d801e2e555 website: adding mysql docs skeleton 2015-04-25 12:10:53 -07:00
Armon Dadgar 9087471bad credential/cert: support leasing and renewal 2015-04-24 12:58:39 -07:00
Seth Vargo b08e672172 Fix typo 2015-04-24 14:06:50 -04:00
Armon Dadgar 9c60464a7f website: document cert backend 2015-04-24 10:52:25 -07:00
Armon Dadgar cca4580db8 Merge pull request #29 from hashicorp/f-health
Adding sys/health for Consul HTTP health monitoring
2015-04-23 11:58:58 -07:00
Armon Dadgar a945bc2296 website: document endpoint 2015-04-23 11:58:10 -07:00
Seth Vargo 93b9047472 Update website whitespace and formatting 2015-04-22 19:47:11 -04:00
Mitchell Hashimoto 2438effea1 Merge pull request #21 from hashicorp/audit-hashstructure
Hash the strings in audit logs
2015-04-22 07:43:21 +02:00
Mitchell Hashimoto 6ac71602cf website: help command 2015-04-21 19:04:21 +02:00
Mitchell Hashimoto fc1e55af3c website: reading data 2015-04-21 18:48:23 +02:00
Mitchell Hashimoto ee081584bc website: TODO on reading data 2015-04-21 18:39:50 +02:00
Mitchell Hashimoto 93c4f92300 website: start documenting CLI more 2015-04-21 16:35:19 +01:00
Mitchell Hashimoto dd3a6bf37f website: clarify that secrets are no longer stored in audit logs 2015-04-21 16:23:16 +01:00
Armon Dadgar ab144343df website: replace the consul telemetry 2015-04-20 12:26:30 -07:00
Armon Dadgar ebd1e88872 website: document sys/leader 2015-04-20 12:02:32 -07:00
Armon Dadgar e32fb5cb32 website: typo fix 2015-04-20 11:51:09 -07:00
Armon Dadgar 85065a436a website: document sys/raw/ and sys/revoke-prefix/ 2015-04-20 11:50:21 -07:00
Mitchell Hashimoto 146c1fd37f website: audit backends 2015-04-19 22:59:39 -07:00
Mitchell Hashimoto dd39c1499f website: doc userpass 2015-04-19 15:21:35 -07:00
Armon Dadgar c83a7ebe95 website: Document token tree / one-time-tokens 2015-04-19 12:20:16 -07:00
Mitchell Hashimoto 690a932deb website: postgresql backend 2015-04-18 22:47:23 -07:00
Mitchell Hashimoto 23fade03ec website: mostly complete API 2015-04-18 22:39:43 -07:00
Mitchell Hashimoto 208dd1e8be logical/aws: move root creds config to config/root 2015-04-18 22:21:31 -07:00
Mitchell Hashimoto cd98244de6 website: so much API docs 2015-04-18 14:34:47 -07:00
Mitchell Hashimoto 20324a0c9c website: more auth 2015-04-18 13:45:50 -07:00
Mitchell Hashimoto 482c40c733 website: token auth help 2015-04-18 13:35:55 -07:00
Mitchell Hashimoto 688f98037d website: auth backends 2015-04-17 17:41:56 -07:00
Mitchell Hashimoto a77913c0b6 website: a lot more concepts 2015-04-17 17:18:31 -07:00
Mitchell Hashimoto 68e26ca2a0 website: transit backend 2015-04-17 12:56:31 -07:00
Mitchell Hashimoto 466ab3f17a website: HA concepts, configuration 2015-04-17 12:56:31 -07:00
Armon Dadgar 1c84cfad54 website: Adding telemetry documentation 2015-04-14 18:47:47 -07:00
Armon Dadgar c5d70794ad website: document the HA design 2015-04-14 18:31:25 -07:00
Armon Dadgar c1bfd5ccdd website: copy cleanups 2015-04-14 10:50:07 -07:00
Mitchell Hashimoto 3f1b0a0aed website: leasing 2015-04-13 20:56:03 -07:00
Mitchell Hashimoto e6f65cb194 website: seal concept 2015-04-13 20:42:07 -07:00
Mitchell Hashimoto 2dc7188eff website: concepts, dev server mode 2015-04-13 20:42:07 -07:00
Mitchell Hashimoto 744440021f website: add a couple more secret backend sections 2015-04-13 20:42:07 -07:00
Armon Dadgar 7629c35c96 website: more on security model 2015-04-13 19:09:44 -07:00
Mitchell Hashimoto 3c9b4182cb website: consul secret backend 2015-04-10 20:26:01 -07:00
Mitchell Hashimoto 3266f9513f website: aws secret backend 2015-04-10 20:24:45 -07:00
Mitchell Hashimoto a3f9311161 website: security model is pretty important 2015-04-10 20:11:43 -07:00
Armon Dadgar 3b852ff3e9 website: working on thread model 2015-04-10 18:16:36 -07:00
Mitchell Hashimoto a906f720b1 website: secrets index 2015-04-09 23:31:26 -07:00
Mitchell Hashimoto 96dec861ec website: lots more docs 2015-04-09 22:52:02 -07:00
Mitchell Hashimoto 8f52174397 website: install docs 2015-04-09 21:49:52 -07:00
Mitchell Hashimoto c71550edc9 website: nit picking 2015-04-09 19:23:50 -07:00
Mitchell Hashimoto a0f9b4bf0c website: update to protect website during beta 2015-04-09 18:03:46 -07:00
Armon Dadgar 3f53d0e571 website: Working on architecture page 2015-04-08 15:36:55 -07:00
Armon Dadgar bbbd3b63ef website: Starting internals glossary 2015-04-08 12:17:09 -07:00
Jack Pearkes 442ac631d8 website: initial import 2015-03-13 10:38:41 -07:00