Commit graph

337 commits

Author SHA1 Message Date
Armon Dadgar 93ee9f6b76 website: update the transit documentation 2015-06-17 18:45:29 -07:00
Jeff Mitchell 49f1fdbdcc Merge branch 'master' into f-pki 2015-06-16 13:43:25 -04:00
Armon Dadgar 07df5c251d Merge pull request #341 from ryancurrah/ryancurrah-doc-transit-echofix
Do not output the trailing newline in encoding.
2015-06-15 17:36:01 -07:00
Seth Vargo db178571eb Document longest-prefix match
Fixes https://github.com/hashicorp/vault/issues/331
2015-06-15 14:29:20 -04:00
Seth Vargo 90dfbe2883 Update gems 2015-06-15 13:54:36 -04:00
Ryan Currah c232fee6b3 Do not output the trailing newline in encoding.
Added -n to echo command to prevent newlines from showing up in encoding.
2015-06-13 12:03:57 -04:00
Jeff Mitchell e17ced0d51 Fix a docs-out-of-date bug.
Commit contents (C)2015 Akamai Technologies, Inc. <opensource@akamai.com>
2015-06-12 16:33:00 -04:00
Jeff Mitchell db5354823f Fix some out-of-date examples.
Commit contents (C)2015 Akamai Technologies, Inc. <opensource@akamai.com>
2015-06-11 21:17:05 -04:00
Jeff Mitchell 1513e2baa4 Add acceptance tests
* CA bundle uploading
* Basic role creation
* Common Name restrictions
* IP SAN restrictions
* EC + RSA keys
* Various key usages
* Lease times
* CA fetching in various formats
* DNS SAN handling

Also, fix a bug when trying to get code signing certificates.

Not tested:
* Revocation (I believe this is impossible with the current testing framework)

Commit contents (C)2015 Akamai Technologies, Inc. <opensource@akamai.com>
2015-06-08 00:06:09 -04:00
Jeff Mitchell 0d832de65d Initial PKI backend implementation.
Complete:
* Up-to-date API documents
* Backend configuration (root certificate and private key)
* Highly granular role configuration
* Certificate generation
* CN checking against role
* IP and DNS subject alternative names
* Server, client, and code signing usage types
* Later certificate (but not private key) retrieval
* CRL creation and update
* CRL/CA bare endpoints (for cert extensions)
* Revocation (both Vault-native and by serial number)
* CRL force-rotation endpoint

Missing:
* OCSP support (can't implement without changes in Vault)
* Unit tests

Commit contents (C)2015 Akamai Technologies, Inc. <opensource@akamai.com>
2015-06-08 00:06:09 -04:00
Justin Campbell 2a1eac837c docs: Fix examples of auth via JSON
For both userpass and LDAP
2015-06-04 10:38:11 -04:00
Justin Campbell d634a92d2a Remove .DS_Store
Already gitignored
2015-06-04 10:17:00 -04:00
Armon Dadgar 66ab2bbf54 Merge pull request #263 from sheldonh/iam-policy
List IAM permissions required by root credentials
2015-06-01 13:16:51 +02:00
Armon Dadgar 98cca9cb18 Merge pull request #261 from jsok/consul-lease
Add ability to configure consul lease durations
2015-06-01 13:04:28 +02:00
Armon Dadgar 82caf31532 Merge pull request #277 from hashicorp/f-rotate
Add support for key rotation
2015-06-01 12:52:32 +02:00
Seth Vargo 507f5b0114 Cleanup style on http index docs 2015-05-31 21:23:44 -07:00
Seth Vargo 4a41d05870 Merge pull request #271 from boncheff/f-doc-update-read-write-example
Update index.html.md
2015-05-31 21:20:34 -07:00
Seth Vargo 090de2c6d3 Merge pull request #279 from whit537/patch-1
Capitalize the first word of a sentence
2015-05-31 15:53:34 -07:00
Seth Vargo 7fd3d50f3e Merge pull request #280 from whit537/patch-2
Put me in charge of dev mode :)
2015-05-31 15:53:24 -07:00
Seth Vargo d90b63a520 Merge pull request #282 from whit537/patch-3
Add a missing word
2015-05-31 15:52:21 -07:00
Seth Vargo 68c9b9dd83 Merge pull request #283 from whit537/patch-4
revisions to Getting Started > Dynamic Secrets
2015-05-31 15:52:08 -07:00
Seth Vargo dba3fde064 Merge pull request #284 from whit537/patch-5
revisions to Getting Started > Built-in Help
2015-05-31 15:51:51 -07:00
Seth Vargo 83ad07bb72 Merge pull request #285 from whit537/patch-6
revisions to Getting Started > Authentication
2015-05-31 15:51:39 -07:00
Seth Vargo 1514dd5a14 Merge pull request #286 from whit537/patch-7
revisions to Getting Started > Access Control Policies
2015-05-31 15:51:08 -07:00
Seth Vargo 105def7354 Merge pull request #287 from whit537/patch-8
revisions to Getting Started > Deploy Vault
2015-05-31 15:50:58 -07:00
Chad Whitacre b83f3f2d02 Provide missing verb 2015-05-31 17:19:34 -04:00
Chad Whitacre e7cc5649dd Fix punctuation
We want an apostrophe (for the contraction, not the possessive), but we don't want an extra period.
2015-05-31 17:00:44 -04:00
Chad Whitacre 2df20f0c8c Remove an errant article 2015-05-31 16:47:15 -04:00
Chad Whitacre 1629f9ac93 Fix number of a noun 2015-05-31 16:42:29 -04:00
Chad Whitacre b1b2a4be7c Fix another broken passive 2015-05-31 16:34:34 -04:00
Chad Whitacre fcc7cbaee5 Fix a broken verb voice 2015-05-31 16:31:10 -04:00
Chad Whitacre 4a4d944bcc Charges don't incur themselves 2015-05-31 16:24:03 -04:00
Chad Whitacre 2ee0e9c51b REMOVE A SINGLE WHITESPACE CHARACTER 2015-05-31 16:21:39 -04:00
Chad Whitacre bd4dce28b5 Remove quotes to match styling elsewhere
Cf. http://vaultproject.io/intro/getting-started/dynamic-secrets.html
2015-05-31 16:20:56 -04:00
Chad Whitacre 11cd9eb6f5 Add a missing word 2015-05-31 16:19:38 -04:00
Chad Whitacre 2e00c9dd27 fix line wrapping
Sorry!
2015-05-31 16:07:50 -04:00
Chad Whitacre 4aee92f5e4 Direct new users over to the getting started guide
I found myself on the dev server reference, when really I was more interested in the getting started guide. This link is intended to help others get back on the right track.
2015-05-31 16:06:58 -04:00
Chad Whitacre ee4b84928e Put me in charge of dev mode :)
- "You" as subject instead of "Vault"
 - give the actual command
 - minor formatting changes
2015-05-31 15:54:32 -04:00
Chad Whitacre 2e8967ce22 Capitalize the first word of a sentence 2015-05-31 14:22:57 -04:00
Armon Dadgar b71226dfd7 website: document key rotation internals 2015-05-29 15:34:29 -07:00
Armon Dadgar 0563ac643e website: document new system APIs 2015-05-29 15:05:05 -07:00
Christian Berg 69e501a2e5 Fix typo 2015-05-29 10:24:29 +02:00
boncheff a1e5330f78 Update index.html.md
Updated the docs to show an example of how to read/write a secret using the HTTP API
2015-05-28 22:28:25 +01:00
Armon Dadgar e72ed2fa87 Merge pull request #269 from sheldonh/getting_started_deploy_consul
Use local Consul instance in deploy walkthrough
2015-05-28 10:06:36 -07:00
Sheldon Hearn 9126cf576f Use local Consul instance in deploy walkthrough
As per hashicorp/vault#217, demo.consul.io prevents sessions from being
created, which means you can't use it as a backend for Vault.
2015-05-28 14:11:34 +02:00
Sheldon Hearn 85fbdae5f5 Mention disable_mlock in deploy walkthrough 2015-05-28 13:24:28 +02:00
Sheldon Hearn 71c462b3b2 Clarify the disable_mlock option 2015-05-28 12:40:56 +02:00
certifiedloud ac4763027b replaced confusing term 'physical' with 'storage'. 2015-05-27 14:44:17 -06:00
Sheldon Hearn 89e7bb2569 Missed a few IAM permissions 2015-05-27 16:42:12 +02:00
Sheldon Hearn 3d2005ea56 List IAM permissions required by root credentials 2015-05-27 16:28:24 +02:00
Jonathan Sokolowski 2b1926f262 website: Update /consul/roles/ parameters 2015-05-27 09:54:15 +10:00
Armon Dadgar 5b587b979d Merge pull request #259 from buth/etcd
etcd non-HA storage backend
2015-05-26 15:07:06 -07:00
Eric Buth e4e4253d65 added etcd as a non-HA storage backend, updated documentation 2015-05-26 13:38:25 -04:00
Ian Unruh 2a6dd3225c Add libraries section to HTTP docs 2015-05-22 14:32:14 -07:00
Ian Unruh bb9f7c47ff Add read field flag to documentation 2015-05-22 11:33:28 -07:00
Armon Dadgar e2ff72795e website: doc cleanup 2015-05-20 17:42:29 -07:00
Armon Dadgar 8c75cc83e3 Merge pull request #242 from jstremick/f-physical-s3-backend
Physical S3 backend implementation
2015-05-20 17:00:44 -07:00
joe miller fd57ca0e39 fix doc example to submit valid json in POST body
I don't know if there is some version of curl that auto-generates json but the example didn't work for me on curl 7.32.0. Submitting the data as JSON works though.
2015-05-20 13:11:54 -07:00
James Stremick 53979d6f30 Physical S3 backend implementation 2015-05-20 10:59:03 -04:00
Aaron Bedra ed9b44bb44 Fix typo in app-id docs 2015-05-20 09:36:54 -05:00
Seth Vargo 05e59edb02 Merge pull request #239 from ijin/patch-1
Document that Vault Server needs to be running for vault help path
2015-05-20 12:28:31 +02:00
Michael H. Oshita e2a923a887 Document that Vault Server needs to be running for vault help path
Confused initial, I tried running `vault help secret` by itself and found out that the server needs to be running to execute this command.

Furthermore, the client needs `VAULT_ADDR` configured (`http://127.0.0.1:8200` in dev mode, since it uses https by default) to interact with the server.
2015-05-20 17:06:59 +09:00
Daniel McCarney c7bf89cf60 Add missing word to storage backend threat model. 2015-05-19 12:11:48 -07:00
Daniel McCarney af1aabe397 Fix "the a lease ID" typo. 2015-05-19 12:07:07 -07:00
Daniel McCarney dc5e1a714a Fix "all everything" typo in Secrets description. 2015-05-19 11:59:20 -07:00
Ian Unruh c0409b69ae Remove non-existent unseal API argument 2015-05-18 19:59:18 -07:00
Armon Dadgar 9c916386de Update github.html.md
Fixing incorrect documentation about case sensitivity
2015-05-18 09:37:31 -07:00
Armon Dadgar 3f3133b066 Merge pull request #204 from nrocine/master
Added implementation details to the GitHub Auth Docs on the Vault Website
2015-05-18 09:36:35 -07:00
Seth Vargo 7c6033c728 Use new middleman-hashicorp 2015-05-15 16:15:58 -04:00
Armon Dadgar 3b1df5a8ca website: clarify the app-id parameters 2015-05-15 11:39:05 -07:00
Nathan McCauley dd6de90a3f update info on keywhiz 2015-05-15 00:34:25 -07:00
Nils Rocine 6481c13bcc Added details in the github auth docs for the website. These details clarify end-to-end use of the github auth backend. Specifically: noting how to create a usable GitHub PAT and an example of how to auth with the PAT. 2015-05-14 13:20:58 -07:00
Trevor Pounds 7ce3718191 Fix minor typo. 2015-05-13 18:08:11 -07:00
Quentin Pradet 99e8b824d5 Fix typo
programtic -> programmatic
2015-05-13 09:08:15 +02:00
Mitchell Hashimoto de538b2387 website: bump 2015-05-11 11:47:36 -07:00
Mitchell Hashimoto 20d27ca099 website: note PGP key 2015-05-11 11:34:38 -07:00
Armon Dadgar 96e3bac87a website: Document overwrite behavior. Fixes #182 2015-05-11 10:58:29 -07:00
Mitchell Hashimoto 42d6b2a916 http: allow header for auth token [GH-124] 2015-05-11 10:56:58 -07:00
Armon Dadgar fbcf0c2b64 website: Fixing doc error 2015-05-11 10:43:03 -07:00
Armon Dadgar 697a70ca48 website: Adding LDAP docs 2015-05-11 10:43:03 -07:00
Kevin Nuckolls 58cfbead75 Update secret-backends.html.md
Confusing / typo language in the getting started documentation. Fixed it up. :)
2015-05-11 08:50:45 -05:00
Shaun Mouton f24841fc2f a word accidentally 2015-05-08 15:20:26 -05:00
Seth Vargo 83c869c5af Cleanup userpass docs 2015-05-08 11:49:58 -04:00
Seth Vargo f3c3f4717a Remove references to -var 2015-05-08 11:45:29 -04:00
Mads R. Christensen 2fc8ab41e4 Fixed typo 2015-05-08 11:48:42 +02:00
Mads R. Christensen 37deb08a1a Added more info about the userpass auth backend API endpoint 2015-05-08 11:45:21 +02:00
Armon Dadgar 19a54ea09a Merge pull request #166 from Banno/remove-plugin-docs
remove unused plugin docs
2015-05-07 12:26:44 -07:00
Spencer Herzberg 71b8f7b779 remove unused docs 2015-05-07 14:20:33 -05:00
Seth Vargo d2a6433270 Add instructions for enabling the auth first 2015-05-07 13:52:06 -04:00
Leo Cassarani db10a974f6 Fix typo in docs: "it's" -> "its" [ci skip] 2015-05-07 11:08:03 +00:00
Armon Dadgar 9d7119d7d0 website: minor doc changes for zookeeper 2015-05-06 11:08:26 -07:00
Spencer Herzberg 8a4c2eb691 cleanup zk HA leftover docs 2015-05-05 17:22:43 -05:00
Spencer Herzberg 9793986357 properly default zk address to localhost 2015-05-05 17:20:38 -05:00
Spencer Herzberg 966204d73f initial implementation of non-ha zookeeper 2015-05-05 16:49:18 -05:00
Seth Vargo a21e9e544d Merge pull request #144 from gotcha/patch-1
Typo
2015-05-05 08:43:43 -07:00
Seth Vargo 8a31b8081b Merge pull request #145 from gotcha/patch-2
Word missing
2015-05-05 08:43:33 -07:00
Godefroid Chapelle 886533e856 Use singular 2015-05-05 09:16:30 +02:00
Godefroid Chapelle 2e92a23727 Word missing 2015-05-05 09:12:32 +02:00
Godefroid Chapelle 4da4aba1bf Typo 2015-05-05 09:05:05 +02:00
Seth Vargo 1cd7e91bcc s/consul/vault /cc @armon 2015-05-03 16:13:55 -04:00