Commit graph

82 commits

Author SHA1 Message Date
Jeff Mitchell f0203741ff Change default TTL from 30 to 32 to accommodate monthly operations (#1942) 2016-09-28 18:32:49 -04:00
Jeff Mitchell 96afb1d27a Update getting started docs since root can no longer be used from github 2016-09-26 13:09:26 -04:00
John c39eeecaea tip to override VAULT_ADDR in getting started guide (#1915) 2016-09-23 19:34:07 -04:00
Michael Warkentin 14f2a673e2 Out of date code
Looks like the `500` is now a `405`:

```
$ vault read aws/config/root
Error reading aws/config/root: Error making API request.

URL: GET http://127.0.0.1:8200/v1/aws/config/root
Code: 405. Errors:

* 1 error(s) occurred:

* unsupported operation
```
2016-09-12 15:58:25 -04:00
Brian Shumate e34146d9d8 Update deploy.html.md
Corrected link to Using PGP, GPG, and Keybase
2016-06-21 12:14:58 -04:00
Jeff Mitchell 33764e85b1 Merge pull request #1324 from hashicorp/sethvargo/doc_gpg
Add a page for step-by-step gpg/keybase
2016-06-03 13:24:57 -04:00
Jeff Mitchell a147c3346c Make some updates to PGP documentation 2016-06-03 13:23:20 -04:00
Sami Rageb 2dba9b180b Fixed & clarified grammar around HCL & JSON
- Fixed the statement that HCL is JSON compatible, it's vice versa
- Added that HCL is a superset of JSON to eliminate any lingering confusion
2016-05-26 20:14:59 -05:00
vishalnayak 5c336297ad Provide clarity for output statements of idempotent calls. 2016-04-14 15:46:45 +00:00
vishalnayak b7178846c1 Clarify token-revoke operation 2016-04-14 15:34:01 +00:00
Seth Vargo 54c414abb2
Clarify delete operation
One thing that has been a point of confusion for users is Vault's
response when deleting a key that does not actually exist in the system.
For example, consider:

    $ vault delete secret/foo
    Success! Deleted 'secret/foo'

This message is misleading if the secret does not exist, especially if
the same command is run twice in a row.

Obviously the reason for this is clear - returning an error if a secret
does not exist would reveal the existence of a secret (the same reason
everything on S3 is a 403 or why GitHub repos 404 instead of 403 if you
do not have permission to view them).

I think we can make the UX a little bit better by adding just a few
words to the output:

    $ vault delete secret/foo
    Success! Deleted 'secret/foo' if it existed

This makes it clear that the operation was only performed if the secret
existed, but it does not reveal any more information.
2016-04-14 10:38:10 +01:00
Seth Vargo 2926be9ca7 Add a page for step-by-step gpg/keybase 2016-04-12 21:44:07 +01:00
Jeff Mitchell 0f923d8da5 Merge pull request #1301 from gliptak/patch-3
Update vault read output
2016-04-06 11:26:55 -04:00
Gábor Lipták fa08142921 Update token-create/auth output 2016-04-06 11:14:27 -04:00
Gábor Lipták b2f4d95c27 Update toke-create output 2016-04-06 10:24:19 -04:00
Gábor Lipták f0d3f49601 Update vault read output 2016-04-06 09:13:39 -04:00
Seth Vargo e40c77ff27 Use HTTPS + www where appropriate 2016-01-14 13:42:47 -05:00
Jeff Mitchell ffa196da0e Note that the dev server does not fork
Fixes #710.
2015-10-30 12:47:56 -04:00
Jeremiah Johnson d4a8c08feb fix typo in first-secret.html.md 2015-10-22 12:04:22 -06:00
mkb 1d29ae940a Minor grammar fix. 2015-10-20 13:42:46 -07:00
Jeff Mitchell 44706da08c Merge pull request #691 from hashicorp/sethvargo/tabs_spaces_oh_my
Remove tabs from terminal output
2015-10-12 12:39:44 -04:00
Seth Vargo 50f720bc06 Remove tabs from terminal output
This also standardizes on the indentation we use for multi-line commands as
well as prefixes all commands with a $ to indicate a shell.
2015-10-12 12:10:22 -04:00
Jeff Mitchell 55c26a909e Documentation updates to remove lease id and duration from generic
backend example.
2015-10-12 10:01:15 -04:00
Curtis Allen c9213a809d update acl example
Without `auth/token/lookup-self` read access you are unable to
authenticate. Update example to work as well as use new command output.
2015-10-02 09:06:42 -06:00
Ivan Povalyukhin 0bced67170 [code-gardening] fix typo in the documentation 2015-09-28 19:34:57 -07:00
vishalnayak 142cb563a6 Improve documentation of token renewal 2015-09-11 21:08:32 -04:00
Neo 4e3e9c38a2 Typo fix 2015-09-08 02:43:01 +02:00
David Winterbottom 9fd6837d7b Fix typo in ACL doc 2015-08-19 07:36:16 +01:00
Seth Vargo 564f6d3743 Small tutorial fixes and tweaks 2015-07-19 16:52:11 -04:00
Daniel Somerfield 30920dc751 Finished draft of api tutorial and worked it into the flow. 2015-07-19 12:29:06 -07:00
Daniel Somerfield 89e0ed22db More work on apis doc. 2015-07-16 06:29:52 -07:00
Daniel Somerfield 3f45692500 Added start of page in intro that explains / demos the REST apis 2015-07-15 06:28:04 -07:00
Armon Dadgar 3042452def website: fixing lots of references to vault help 2015-07-13 20:12:09 +10:00
Armon Dadgar 768a6e33b0 website: clarify changes in addition to feedback 2015-07-06 11:10:09 -06:00
Armon Dadgar 37b68d6dce website: clarify getting started ACL docs 2015-07-05 18:40:05 -06:00
Seth Vargo d90b63a520 Merge pull request #282 from whit537/patch-3
Add a missing word
2015-05-31 15:52:21 -07:00
Seth Vargo 68c9b9dd83 Merge pull request #283 from whit537/patch-4
revisions to Getting Started > Dynamic Secrets
2015-05-31 15:52:08 -07:00
Seth Vargo dba3fde064 Merge pull request #284 from whit537/patch-5
revisions to Getting Started > Built-in Help
2015-05-31 15:51:51 -07:00
Seth Vargo 83ad07bb72 Merge pull request #285 from whit537/patch-6
revisions to Getting Started > Authentication
2015-05-31 15:51:39 -07:00
Seth Vargo 1514dd5a14 Merge pull request #286 from whit537/patch-7
revisions to Getting Started > Access Control Policies
2015-05-31 15:51:08 -07:00
Chad Whitacre e7cc5649dd Fix punctuation
We want an apostrophe (for the contraction, not the possessive), but we don't want an extra period.
2015-05-31 17:00:44 -04:00
Chad Whitacre 2df20f0c8c Remove an errant article 2015-05-31 16:47:15 -04:00
Chad Whitacre 1629f9ac93 Fix number of a noun 2015-05-31 16:42:29 -04:00
Chad Whitacre b1b2a4be7c Fix another broken passive 2015-05-31 16:34:34 -04:00
Chad Whitacre fcc7cbaee5 Fix a broken verb voice 2015-05-31 16:31:10 -04:00
Chad Whitacre 4a4d944bcc Charges don't incur themselves 2015-05-31 16:24:03 -04:00
Chad Whitacre 11cd9eb6f5 Add a missing word 2015-05-31 16:19:38 -04:00
Christian Berg 69e501a2e5 Fix typo 2015-05-29 10:24:29 +02:00
Armon Dadgar e72ed2fa87 Merge pull request #269 from sheldonh/getting_started_deploy_consul
Use local Consul instance in deploy walkthrough
2015-05-28 10:06:36 -07:00
Sheldon Hearn 9126cf576f Use local Consul instance in deploy walkthrough
As per hashicorp/vault#217, demo.consul.io prevents sessions from being
created, which means you can't use it as a backend for Vault.
2015-05-28 14:11:34 +02:00