Commit graph

3245 commits

Author SHA1 Message Date
Scott Miller fdb2fc612e
API and upgrade docs for global plugin reload (#9487) 2020-07-17 13:39:24 -05:00
Austin Gebauer 6bc9696a51
Replaces storage backend with secrets engine in the gcp secrets docs (#9511) 2020-07-16 17:43:47 -07:00
Alexander Bezobchuk ea13485c7d
Merge PR #9502: Resource Quotas: Remove 'burst' Param from Rate Limiter 2020-07-16 14:34:43 -04:00
Vishal Nayak 4e4cb5289a
Fetch quota by name before updating it (#9466)
* Fix quotas update

* Update doc
2020-07-15 13:25:00 -04:00
Mike Jarmy 11b10f21b7
Update the seal migration docs (#9432)
* update the seal migration docs

* Update website/pages/docs/concepts/seal.mdx

Co-authored-by: Alexander Bezobchuk <alexanderbez@users.noreply.github.com>

Co-authored-by: Alexander Bezobchuk <alexanderbez@users.noreply.github.com>
2020-07-15 11:55:28 -04:00
Meggie f5a81882b5
Add RC note on downloads page (#9473) 2020-07-13 18:43:30 -04:00
Theron Voran a7522738b9
docs: Updating vault-helm service_registration docs (#9417)
* Adding notes about ingress and route requirements

Specifically that they require vault 1.4 with service_registration
enabled. Also removed a stray block about extraVolumes.
2020-07-10 13:02:51 -07:00
Michael Golowka 23a3375f98
Add links to API docs (#9442) 2020-07-10 12:55:43 -06:00
Mark Gritter ca21cb93df
Documentation fixes on metric names (#9419)
Make the names of WAL metrics exactly match their implementation.
Add `vault` prefix to be consistent everywhere.

Co-authored-by: Alexander Bezobchuk <alexanderbez@users.noreply.github.com>
2020-07-08 13:16:42 -05:00
Larry Eichenbaum f5fcf04a73
Document OSS->ENT upgrade process (#9414) 2020-07-08 09:17:27 -04:00
Michael Golowka 6d86988d0b
Update GCP auth docs with warning about token impersonation (#9418) 2020-07-07 17:09:12 -06:00
Alexander Bezobchuk a282864793
Merge PR #9342: Resource Quotas Doc 2020-07-07 11:42:01 -04:00
Jeff Escalante dcc05e8aed
learn -> tutorials in subnav (#9391) 2020-07-06 18:47:59 -04:00
Trishank Karthik Kuppusamy 94b4545a69
Merge PR #9388: Update tokens.mdx 2020-07-06 09:22:50 -04:00
DevOps Rob 230656ccf4
adding a note to the docs to make it clear that the token needs to be unlimited to create child tokens (#9397) 2020-07-03 09:00:14 -07:00
Meggie 866576cde8
Changing changelog headers and update version (#9393) 2020-07-02 19:46:41 -04:00
Jeff Escalante a3371f6242
🌷Website Maintenance (#9140)
* another round of maintenance

- apply stylelint
- run eslint across all files
- remove unneeded font import
- add jsconfig and import from absolute pahts
- remove unneeded experimental nextjs config
- update all dependencies

* refreshing with the latest dep updates
2020-07-02 14:24:34 -04:00
Geoffrey Grosenbach 93b37de1bc
Mention Linux packages on install page (#9314)
* Update install docs to mention Linux packages

We now build packages for Debian, Ubuntu, CentOS, etc. This removes language
about "we have no plans to build packages" and adds links to step by step guides
for adding a GPG key and the official repository.

* Fix URL to Learn Vault install page

A Linux section previously existed but now it is in the general install section.

* Fix Markdown for multi-step compile from source

The steps were previously marked up as an ordered list but the numbers didn't
display correctly. This outdents the code so it's a series of paragraphs instead
of an ordered list.
2020-07-02 13:51:02 -04:00
Roger Berlind 15d8ed3f82
request.connection.remote_addr only has IP (#9326)
* request.connection.remote_addr only has IP

The request.connection.remote_addr property exposed to Sentinel only has an IP.
It does not include a port.
I tested this in a policy with `print("remote address:", request.connection.remote_addr)` and got back 150.10.0.26.

* Update website/pages/docs/enterprise/sentinel/properties.mdx

Co-authored-by: Calvin Leung Huang <cleung2010@gmail.com>

Co-authored-by: Calvin Leung Huang <cleung2010@gmail.com>
2020-07-02 10:47:44 -07:00
Josh Black 44a7e3661d
Update replication status API docs with new fields (#9215) 2020-06-29 15:11:17 -07:00
Josh Black dc2b5c1830
Add docs for vault monitor (#9218) 2020-06-29 12:23:31 -07:00
Theron Voran 06700a7110
Adding docs for azure-specific handling in jwt-oidc (#9287)
Co-authored-by: Jason O'Donnell <2160810+jasonodonnell@users.noreply.github.com>
2020-06-29 10:46:41 -07:00
Vitaly Velikodny 1bb9992c92
fix #8092: add the note to docs about impossible to create a custom token with 's.' prefix (#8195)
Co-authored-by: Vishal Nayak <vishalnayak@users.noreply.github.com>
2020-06-29 12:20:23 -04:00
Josh Black 6306faa3d2
Update documentation with more details for allowed_parameters (#9279) 2020-06-29 09:01:33 -07:00
Kevin Pruett 4a48b57546
Add Algolia indexing script to CI (#9332) 2020-06-29 16:39:08 +01:00
Vishal Nayak c6876fe00f
Resource Quotas: Rate Limiting (#9330) 2020-06-26 17:13:16 -04:00
Theron Voran 505bb596d3
docs: default for the auth-path annotation (#9313)
Updating the default for the auth-path annotation in the k8s injector
docs.
2020-06-25 09:36:23 -07:00
Jason O'Donnell 9a19916d53
doc: update vault helm enterprise image examples (#9299)
* doc: update vault helm enterprise image examples

* fix tar reference
2020-06-23 16:20:34 -04:00
Calvin Leung Huang c45bdca0b3
raft: add support for using backend for ha_storage (#9193)
* raft: initial work on raft ha storage support

* add note on join

* add todo note

* raft: add support for bootstrapping and joining existing nodes

* raft: gate bootstrap join by reading leader api address from storage

* raft: properly check for raft-only for certain conditionals

* raft: add bootstrap to api and cli

* raft: fix bootstrap cli command

* raft: add test for setting up new cluster with raft HA

* raft: extend TestRaft_HA_NewCluster to include inmem and consul backends

* raft: add test for updating an existing cluster to use raft HA

* raft: remove debug log lines, clean up verifyRaftPeers

* raft: minor cleanup

* raft: minor cleanup

* Update physical/raft/raft.go

Co-authored-by: Brian Kassouf <briankassouf@users.noreply.github.com>

* Update vault/ha.go

Co-authored-by: Brian Kassouf <briankassouf@users.noreply.github.com>

* Update vault/ha.go

Co-authored-by: Brian Kassouf <briankassouf@users.noreply.github.com>

* Update vault/logical_system_raft.go

Co-authored-by: Brian Kassouf <briankassouf@users.noreply.github.com>

* Update vault/raft.go

Co-authored-by: Brian Kassouf <briankassouf@users.noreply.github.com>

* Update vault/raft.go

Co-authored-by: Brian Kassouf <briankassouf@users.noreply.github.com>

* address feedback comments

* address feedback comments

* raft: refactor tls keyring logic

* address feedback comments

* Update vault/raft.go

Co-authored-by: Alexander Bezobchuk <alexanderbez@users.noreply.github.com>

* Update vault/raft.go

Co-authored-by: Alexander Bezobchuk <alexanderbez@users.noreply.github.com>

* address feedback comments

* testing: fix import ordering

* raft: rename var, cleanup comment line

* docs: remove ha_storage restriction note on raft

* docs: more raft HA interaction updates with migration and recovery mode

* docs: update the raft join command

* raft: update comments

* raft: add missing isRaftHAOnly check for clearing out state set earlier

* raft: update a few ha_storage config checks

* Update command/operator_raft_bootstrap.go

Co-authored-by: Vishal Nayak <vishalnayak@users.noreply.github.com>

* raft: address feedback comments

* raft: fix panic when checking for config.HAStorage.Type

* Update vault/raft.go

Co-authored-by: Alexander Bezobchuk <alexanderbez@users.noreply.github.com>

* Update website/pages/docs/commands/operator/raft.mdx

Co-authored-by: Alexander Bezobchuk <alexanderbez@users.noreply.github.com>

* raft: remove bootstrap cli command

* Update vault/raft.go

Co-authored-by: Brian Kassouf <briankassouf@users.noreply.github.com>

* Update vault/raft.go

Co-authored-by: Brian Kassouf <briankassouf@users.noreply.github.com>

* raft: address review feedback

* raft: revert vendored sdk

* raft: don't send applied index and node ID info if we're HA-only

Co-authored-by: Brian Kassouf <briankassouf@users.noreply.github.com>
Co-authored-by: Alexander Bezobchuk <alexanderbez@users.noreply.github.com>
Co-authored-by: Vishal Nayak <vishalnayak@users.noreply.github.com>
2020-06-23 12:04:13 -07:00
Mark Gritter 6bd17d7e91
Document new and previously undocumented telemetry metrics: (#9283)
usage metrics
 vault.route.*
 vault.core.unsealed
2020-06-23 13:49:45 -05:00
Calvin Leung Huang 4a5bef48c4
docs: add additional info around transform for tweak and template type (#9203) 2020-06-23 10:32:54 -07:00
Austin Gebauer 965f95239a
docs: clarify when plugin executables must also be given mlock syscall ability (#9275) 2020-06-22 10:05:15 -07:00
Johnathan Schmidt ab4e072bb6
Add the static-roles feature for MSSQL (#9062) 2020-06-19 23:01:06 -07:00
Michael Golowka 7502813335
Add password_policy field to Azure docs (#9249)
* Add password_policy field
* Updated vault-plugin-secrets-azure to v0.6.1
* A bunch of other libraries also got updated at the same time because of the plugin update
2020-06-18 13:25:59 -06:00
Calvin Leung Huang 2e7e63f78c
docs: add sample revocation for mongodb (#9245) 2020-06-17 08:25:56 -07:00
Scott Miller 632c86ecc1
Add new Telemetry config options (#9238)
* Add new Telemetry config options

Add cluster_name, maximum_gauge_cardinality, and usage_gauge_period
configuration options to the config stanza.

Update unit tests.

Document.

Co-authored-by: Mark Gritter <mgritter@hashicorp.com>
2020-06-17 10:07:33 -05:00
Jason O'Donnell e8db47f92d
docs/agent: add overview for consul template fetches (#9227)
* docs/vault-k8s: add overview for consul template fetches

* Add dynamic role link

* move to agent documentation, add link

* fix typo in certificate doc

* fix note about leased secrets

* update secret vs token, add note to pki

* add more secret vs token notes

* add note about caching
2020-06-15 15:49:35 -04:00
Austin Gebauer d9fbd04a33
docs: fix typo in gcp and gcpkms secrets (#9228) 2020-06-15 11:57:51 -07:00
Matt Whiteley 922f9374c6
Fix typo (#9217)
correct parameter is `leader_ca_cert_file`
2020-06-15 14:36:15 -04:00
Michael Golowka 1a8b7765bc
Add password policies to Active Directory secret engine (#9144)
* Also updates AD docs to reflect password policies
2020-06-15 10:36:17 -06:00
Jim Kalafut 320e9ecb92
Minor transform docs rewording (#9223) 2020-06-14 20:53:36 -07:00
Roman Iuvshyn 889c9d6f06
add disable_iss_validation option to k8s auth docs (#9142) 2020-06-11 19:02:20 -07:00
Michael Golowka a89f09802d
Integrate password policies into RabbitMQ secret engine (#9143)
* Add password policies to RabbitMQ & update docs
* Also updates some parts of the password policies to aid/fix testing
2020-06-11 16:08:20 -06:00
ncabatoff 9cc77b94a8
Clarify cache setting. (#9204) 2020-06-11 16:20:36 -04:00
Jeff Hemmen 7a2eabde69
Simple typos (#9119) 2020-06-11 14:22:49 -04:00
Andy Assareh e8a36eb752
replacing "a key usage mode" as it is confusing (#9194)
Since the context of this page is transit and encryption keys, the use of the word "key" to mean effectively common seems ill advised. Proposing an alternative wording.
2020-06-11 07:50:31 -04:00
Mike Wickett 5ca6057295
website: remove whitepaper link from subnav (#9190) 2020-06-10 16:01:23 -04:00
Theron Voran e1a432a167
AWS: Add iam_groups parameter to role create/update (#8811)
Allows vault roles to be associated with IAM groups in the AWS
secrets engine, since IAM groups are a recommended way to manage
IAM user policies. IAM users generated against a vault role will
be added to the IAM Groups. For a credential type of
`assumed_role` or `federation_token`, the policies sent to the
corresponding AWS call (sts:AssumeRole or sts:GetFederation) will
be the policies from each group in `iam_groups` combined with the
`policy_document` and `policy_arns` parameters.

Co-authored-by: Jim Kalafut <jkalafut@hashicorp.com>
2020-06-09 16:56:12 -07:00
ncabatoff 315d1ba9c5
Explain what lease tidy does. (#9178) 2020-06-09 16:54:06 -04:00
joe miller 15661719fa
document all of the supported elliptic curves (#8722) 2020-06-08 11:26:56 -04:00