Chad Whitacre
2ee0e9c51b
REMOVE A SINGLE WHITESPACE CHARACTER
2015-05-31 16:21:39 -04:00
Chad Whitacre
bd4dce28b5
Remove quotes to match styling elsewhere
...
Cf. http://vaultproject.io/intro/getting-started/dynamic-secrets.html
2015-05-31 16:20:56 -04:00
Chad Whitacre
11cd9eb6f5
Add a missing word
2015-05-31 16:19:38 -04:00
Chad Whitacre
2e00c9dd27
fix line wrapping
...
Sorry!
2015-05-31 16:07:50 -04:00
Chad Whitacre
4aee92f5e4
Direct new users over to the getting started guide
...
I found myself on the dev server reference, when really I was more interested in the getting started guide. This link is intended to help others get back on the right track.
2015-05-31 16:06:58 -04:00
Chad Whitacre
ee4b84928e
Put me in charge of dev mode :)
...
- "You" as subject instead of "Vault"
- give the actual command
- minor formatting changes
2015-05-31 15:54:32 -04:00
Chad Whitacre
2e8967ce22
Capitalize the first word of a sentence
2015-05-31 14:22:57 -04:00
Steven De Coeyer
8155b3927e
Add help info for -dev flag
2015-05-31 18:05:15 +02:00
Armon Dadgar
b71226dfd7
website: document key rotation internals
2015-05-29 15:34:29 -07:00
Armon Dadgar
0563ac643e
website: document new system APIs
2015-05-29 15:05:05 -07:00
Armon Dadgar
daffef08db
vault: reload master key before keyring
2015-05-29 14:30:03 -07:00
Armon Dadgar
f6729b29f8
vault: adding ability to reload master key
2015-05-29 14:29:55 -07:00
Armon Dadgar
716f8d9979
core: adding tests for HA rekey and rotate
2015-05-29 12:16:34 -07:00
Armon Dadgar
4f5fde039f
vault: all rekey commands should fail as standby
2015-05-29 11:52:37 -07:00
Seth Vargo
2e032bb9e6
Merge pull request #275 from christianberg/patch-1
...
Fix typo
2015-05-29 08:38:37 -07:00
Christian Berg
69e501a2e5
Fix typo
2015-05-29 10:24:29 +02:00
Chris Bednarski
4e79210934
Updated phrasing to note restarts, stop, and other sealing scenarios
2015-05-28 17:07:38 -07:00
Chris Bednarski
528d0c6e28
Changed phrasing for unseal key notification
2015-05-28 17:02:09 -07:00
Armon Dadgar
5aaad32af8
vault: ensure upgrades are cleaned up
2015-05-28 16:52:06 -07:00
Armon Dadgar
db0afc9ebe
vault: move upgrade logic out of core
2015-05-28 16:43:44 -07:00
Armon Dadgar
4eb5c63a5d
vault: create upgrade path in HA mode
2015-05-28 16:43:15 -07:00
Armon Dadgar
67ed0a3c16
vault: moving upgrade path into barrier
2015-05-28 16:42:32 -07:00
Armon Dadgar
82ef0b1ac7
vault: handle read of key upgrades
2015-05-28 16:11:31 -07:00
Armon Dadgar
796ae59a89
vault: support keyring reload
2015-05-28 16:09:15 -07:00
Armon Dadgar
2e86fa62d5
vault: adding barrier AddKey
2015-05-28 15:52:26 -07:00
Armon Dadgar
c095861a02
keyring: Add key serialization
2015-05-28 15:49:52 -07:00
Armon Dadgar
c60970e743
vault: prevent rekey on standby
2015-05-28 15:26:35 -07:00
Armon Dadgar
7f26f5a4cb
command/rekey: adding tests
2015-05-28 15:22:42 -07:00
Armon Dadgar
9a162191cd
command/rekey: first pass at rekey
2015-05-28 15:08:09 -07:00
Armon Dadgar
84618a2fde
api: Support the rekey endpoints
2015-05-28 14:37:20 -07:00
Armon Dadgar
7964fa4d86
http: adding rekey handlers
2015-05-28 14:28:50 -07:00
boncheff
a1e5330f78
Update index.html.md
...
Updated the docs to show an example of how to read/write a secret using the HTTP API
2015-05-28 22:28:25 +01:00
Armon Dadgar
01e890653c
vault: more logging
2015-05-28 14:15:06 -07:00
Armon Dadgar
0877160754
vault: minor rekey cleanups
2015-05-28 12:07:52 -07:00
Armon Dadgar
c5352d14a4
vault: testing rekey
2015-05-28 12:02:30 -07:00
Armon Dadgar
361c722c5c
vault: first pass at rekey
2015-05-28 11:40:01 -07:00
Armon Dadgar
5aed043ea5
vault: ensure master key is copied to avoid memzero issues
2015-05-28 11:38:59 -07:00
Armon Dadgar
4e3f0cddcf
vault: Adding VerifyMaster to Barrier
2015-05-28 11:28:33 -07:00
Armon Dadgar
9f399eb9ff
vault: prevent raw access to protected paths
2015-05-28 10:24:41 -07:00
Armon Dadgar
42b91fe411
command/rotate: Adding new rotate command
2015-05-28 10:16:33 -07:00
Armon Dadgar
e72ed2fa87
Merge pull request #269 from sheldonh/getting_started_deploy_consul
...
Use local Consul instance in deploy walkthrough
2015-05-28 10:06:36 -07:00
Armon Dadgar
6ca11ecd35
Merge pull request #268 from sheldonh/howto_mlock
...
Document unprivileged mlock on Linux
2015-05-28 10:03:10 -07:00
Sheldon Hearn
6cda28f9e7
Don't recommend exporting VAULT_TOKEN
...
It's not needed by the dev server (which writes ~/.vault-token),
and breaks the Getting Started guide (e.g. #267 ).
2015-05-28 14:39:35 +02:00
Sheldon Hearn
9126cf576f
Use local Consul instance in deploy walkthrough
...
As per hashicorp/vault#217 , demo.consul.io prevents sessions from being
created, which means you can't use it as a backend for Vault.
2015-05-28 14:11:34 +02:00
Sheldon Hearn
85fbdae5f5
Mention `disable_mlock` in deploy walkthrough
2015-05-28 13:24:28 +02:00
Sheldon Hearn
71c462b3b2
Clarify the disable_mlock option
2015-05-28 12:40:56 +02:00
Ken Breeman
c72dd5a38c
Cleaned up error handling and HA lock monitoring for zookeeper physical backend based on PR feedback.
2015-05-28 00:39:12 -04:00
Armon Dadgar
388022bac1
command/key-status: Adding new key-status command
2015-05-27 18:17:02 -07:00
Armon Dadgar
efcdfd0066
api: Adding Rotate and KeyStatus
2015-05-27 18:05:23 -07:00
Armon Dadgar
af47c72639
http: adding key-status and rotate handlers
2015-05-27 18:02:50 -07:00