Marc Sensenich
92f937c021
Remove Trailing White space in Kubernetes Doc ( #3360 )
...
Removed a trailing white space from which caused `Error loading data: Invalid key/value pair ' ': format must be key=value` if copying the example
```
vault write auth/kubernetes/role/demo \
bound_service_account_names=vault-auth \
bound_service_account_namespaces=default \
policies=default \
ttl=1h
```
2017-12-02 14:12:39 -05:00
immutability
74bd27bdb5
Missing command for vault PUT operation ( #3355 )
2017-12-02 13:43:37 -05:00
Jeff Mitchell
f79a15ddcd
Update some rekey docs
...
Fixes #3306
2017-12-02 13:34:52 -05:00
Jeff Mitchell
f8a7f4b7d9
changelog++
2017-12-01 17:11:58 -05:00
Jeff Mitchell
20320cd71e
Move location of quit channel closing in exp manager ( #3638 )
...
* Move location of quit channel closing in exp manager
If it happens after stopping timers any timers firing before all timers
are stopped will still run the revocation function. With plugin
auto-crash-recovery this could end up instantiating a plugin that could
then try to unwrap a token from a nil token store.
This also plumbs in core so that we can grab a read lock during the
operation and check standby/sealed status before running it (after
grabbing the lock).
* Use context instead of checking core values directly
* Use official Go context in a few key places
2017-12-01 17:08:38 -05:00
Jeff Mitchell
bfc37f0847
Re-add some functionality lost during last dep update ( #3636 )
2017-12-01 10:18:26 -05:00
Jeff Mitchell
548629e8ef
Port over some changes
2017-11-30 09:43:07 -05:00
Jeff Mitchell
45d4facb29
Add some delay to postgres create user test to verify expiration isn't immediate
2017-11-30 09:35:47 -05:00
Brian Kassouf
6c0eb32cd0
changelog++
2017-11-28 10:23:22 -08:00
Brian Kassouf
24b449e6c6
database/mysql: Allow the creation statement to use commands that are… ( #3619 )
...
* database/mysql: Allow the creation statement to use commands that are not yet supported by the prepare statement protocol
* Remove unnecessary else block
2017-11-28 10:19:49 -08:00
Laura Uva
3b5cbe54fd
Added clarification to KV documentation about default CLI behavior and how to preserve non-string type values ( #3596 )
2017-11-27 11:43:49 -05:00
Brian Shumate
fa4af18b73
Docs: policy update for multiple policies, fixes #3611 ( #3613 )
2017-11-27 09:54:38 -05:00
mariachugunova
89a0919250
Fix typo in s3 storage backend docs ( #3603 )
2017-11-23 13:28:33 -08:00
Jeff Mitchell
903021c6d2
changelog++
2017-11-21 16:34:16 -05:00
Vishal Nayak
5f02a64206
docs: encryption/decryption now supports asymmetric keys ( #3599 )
2017-11-21 12:25:28 -05:00
Jeff Mitchell
304e1b96b8
Use Seal Type instead of Type in status output for less confusion
2017-11-21 12:14:00 -05:00
Brian Kassouf
3beda25bf1
Update README.md
2017-11-17 10:52:03 -08:00
Jeff Mitchell
422c1898c8
Update upgrade guide with HSM info
2017-11-16 11:04:46 -05:00
Vishal Nayak
00dfc1c4de
Docs: Remove 'none' as algorithm options ( #3587 )
2017-11-15 09:09:45 -05:00
Jeff Mitchell
141548fb33
Add now-necessary mfa import to sentinel MFA example
2017-11-14 21:42:43 -05:00
Jeff Mitchell
6314af28f1
Update gitignore
2017-11-14 21:42:06 -05:00
Brian Kassouf
85a5a75835
Add token_reviewer_jwt to the kubernetes docs ( #3586 )
2017-11-14 13:27:09 -08:00
Chris Hoffman
b3a7d8ecf3
adding licensing docs ( #3585 )
2017-11-14 16:15:09 -05:00
Paul Pieralde
8fedef3d99
Docs change for Policy API ( #3584 )
...
vault 0.9.0 deprecated the term `rules` in favor of the
term `policy` in several of the /sys/policy APIs.
The expected return state of 200 SUCCESS_NO_DATA only happens
if the `policy` term is used. A response including the
deprecation notice and a 204 SUCCESS_WITH_DATA status code
is returned when `rules` is applied.
2017-11-14 14:26:26 -05:00
Calvin Leung Huang
4c428db94b
changelog++
2017-11-14 13:34:40 -05:00
Vishal Nayak
2b481defe4
Upgrade to 0.9 ( #3583 )
...
* Upgrade to 0.9
* Add link to sidebar
* Remove items that were already in 0.8 upgrade guide
2017-11-14 13:32:09 -05:00
Vishal Nayak
3c7f194797
Doc: Add groups to identity concepts ( #3581 )
...
* Add groups to the concepts page
* s/pulled-in and pulled-out/synced against
* Remove double spaces
2017-11-14 13:27:49 -05:00
Seth Vargo
d9c197b260
Merge pull request #3582 from hashicorp/sethvargo/ent-seal
...
Update docs on auto unseal
2017-11-14 13:14:12 -05:00
Seth Vargo
68052f18d0
Flip seal pages upside down to put examples first
2017-11-14 13:12:35 -05:00
Seth Vargo
4efcfe03d1
Add an auto-unseal page to the docs
...
This helps with SEO and also is where I'd expect auto unsealing to be referenced.
2017-11-14 13:12:20 -05:00
Seth Vargo
b09d042173
Use super to show enterprise
2017-11-14 13:11:55 -05:00
Jeff Mitchell
8ba71a67e5
Minor website wording updates
2017-11-14 12:34:28 -05:00
Jeff Mitchell
40e3883788
Fix some broken links
2017-11-14 12:32:03 -05:00
Jeff Mitchell
fc9525c727
Cut version 0.9.0
2017-11-14 11:57:40 -05:00
Jeff Mitchell
8677ae2f7a
changelog++
2017-11-14 11:56:05 -05:00
Jeff Mitchell
7ac167f8a4
Sync docs
2017-11-14 06:13:11 -05:00
Jeff Mitchell
77442f8640
Prep for 0.9.0
2017-11-14 06:08:56 -05:00
Jeff Mitchell
eef6afec3e
Fix mount path for credential values in aliases ( #3580 )
2017-11-14 01:31:10 -05:00
Jeff Mitchell
f6cb7e9975
Bump go version in Dockerfile
2017-11-14 01:16:59 -05:00
Calvin Leung Huang
2f9ff5c062
Acquire state lock at the start of UnsealWithRecoveryKeys ( #3579 )
...
* Acquire state lock from the start of UnsealWithRecoveryKeys, add metrics
* Change metrics variable
2017-11-13 22:05:22 -05:00
Vishal Nayak
5d976794d4
API refactoring and doc updates ( #3577 )
...
* Doc updates and API refactoring
* fix tests
* change metadata fieldtype to TypeKVPairs
* Give example for TypeKVPairs in CLI for metadata
* Update API docs examples to reflect the native expected value for TypeKVPairs
* Don't mention comma separation in the docs for TypeCommaStringSlice
* s/groups/group; s/entities/entity; s/entity-aliases/entity-alias; s/group-aliases/group-alias
* Address review feedback
* Fix formatting
* fix sidebar links
2017-11-13 20:59:42 -05:00
Brian Kassouf
58dc99ac95
Update the path for generating DR Operation tokens ( #3578 )
2017-11-13 20:28:34 -05:00
Vlad Ungureanu
2ff547196f
Remove unused recovery field in dynamodb backend ( #3569 )
2017-11-13 15:46:02 -05:00
Chris Hoffman
9e79e9b397
generate token functions to share common names ( #3576 )
2017-11-13 15:44:26 -05:00
Joel Thompson
6f5aeeeae2
auth/aws: Check credential availability before auth ( #3465 )
...
Checks to ensure we can get a valid credential from the credential chain
when using the vault CLI to do AWS auth.
Fixes #3383
2017-11-13 15:43:24 -05:00
Jeff Mitchell
ccfcac17fe
grpclogfaker should use or, not and, to check whether to log
2017-11-13 15:37:00 -05:00
Jeff Mitchell
2b78bc2a9b
Port over bits ( #3575 )
2017-11-13 15:31:32 -05:00
Laura Uva
96e80e38e8
Updated the Replication guide to make it clear that it is focused on Performance Replication. Added a link to our general info page for information on DR Replication. Removed some statements about DR not being available yet. ( #3502 )
2017-11-13 11:55:04 -05:00
Jeff Mitchell
d55f94f4a3
Plumb more seal wrap stuff through and move to outside layer of mount options ( #3572 )
2017-11-13 11:22:22 -05:00
Jeff Mitchell
e4750fc793
Fix typo in test (and failure)
2017-11-13 10:35:36 -05:00