Matthew Irish
2f43a20ebe
fix broken link ( #4329 )
2018-04-10 11:11:38 -05:00
Brian Kassouf
a8b8ca136e
KV: Update 'versioned' naming to 'v2' ( #4293 )
...
* Update 'versioned' naming to 'v2'
* Make sure options are set
* Fix description of auth flag
* Review feedback
2018-04-09 09:39:32 -07:00
Chris Hoffman
19f9f6ee89
Root Credential Rotation Docs ( #4312 )
...
* updating root credential docs
* more docs updates
* more docs updates
2018-04-09 12:20:29 -04:00
Chris Hoffman
cbcf31c570
remove token from curl request for login paths ( #4303 )
2018-04-06 18:10:59 -04:00
Andy Manoske
9c1db25639
Update index.html.md
2018-04-05 15:16:28 -07:00
Seth Vargo
a90467289a
Rename Google things to say "Google", update telemetry ( #4267 )
2018-04-04 10:37:44 -04:00
Brian Kassouf
62ce5ec91d
Versioned K/V docs ( #4259 )
...
* Work on kv docs
* Add more kv docs
* Update kv docs
* More docs updates
* address some review coments
2018-04-03 23:22:41 -07:00
Roy Sindre Norangshol
a9c717b44e
project is now project_id ( #4251 )
...
Verified both via vault CLI and direct curl'ing towards API endpoints.
2018-04-03 17:11:47 -04:00
Vishal Nayak
032ca979dc
move identity docs from ent docs to oss ( #4235 )
2018-04-01 13:59:43 -04:00
LeSuisse
cdd7cc1635
Update usage of the deprecated generated-root command in the documentation ( #4232 )
2018-03-31 11:17:08 -04:00
Seth Vargo
b48a9878e7
Add HA support to the Google Cloud Storage backend ( #4226 )
2018-03-30 12:36:37 -04:00
Brian Shumate
bf1b8709a6
Update Consuls Secrets quick start ( #4224 )
...
- Fix typo in role name
- Drop ordered list formatting on get credential example
2018-03-30 10:46:05 -04:00
Jon Benson
d1b0d6efb3
Update mfa-totp.html.md ( #4220 )
2018-03-29 16:51:13 -04:00
Jeff Mitchell
2f90e0c2e1
Merge branch 'master-oss' into 0.10-beta
2018-03-27 12:40:30 -04:00
vishalnayak
37153482be
docs: update aws ec2 auth step
2018-03-26 17:26:48 -04:00
Jeff Mitchell
e8fc0a11ce
Remove a few more vault.rocks usages
2018-03-26 15:02:22 -04:00
Wilhelmina Drengwitz
a10f02ef7b
Add general recommendation for the api_addr
config value ( #4198 )
...
We ran into some confusion about what we should be setting the api_addr config value to. I feel this general recommendation should nudge any others into a better understanding of what this value should point to.
2018-03-26 13:46:54 -04:00
Jeff Mitchell
65d8eb0914
Add more docs around list paths in policies.
...
CC #4199
2018-03-26 11:30:58 -04:00
Seth Vargo
0b827774ae
Drop vault.rocks ( #4186 )
2018-03-23 11:41:51 -04:00
Chris Hoffman
b7ef4a3a6f
adding Azure docs ( #4185 )
...
Adding Azure Auth Method docs
2018-03-22 18:28:42 -04:00
Jim Kalafut
7842557e62
Fix minor docs and help text issues ( #4184 )
2018-03-22 09:29:59 -04:00
Brian Kassouf
3324d6dd12
Add kv backend ( #4181 )
2018-03-21 22:56:52 -04:00
emily
f9b6f4b1c5
Docs for Vault GCP secrets plugin ( #4159 )
2018-03-21 15:02:38 -04:00
Josh Soref
73b1fde82f
Spelling ( #4119 )
2018-03-20 14:54:10 -04:00
Jeff Mitchell
9e46f0f84a
Explicitly call out that we use aes-256 gcm-96 for the barrier.
...
Fixes #2913
2018-03-19 19:53:12 -04:00
Roger Berlind
753f8a8545
Fixed broken k8s TokenReview API link ( #4144 )
2018-03-17 21:23:41 -04:00
immutability
04d1202426
Plugins need setcap too for syscall mlock ( #4138 )
2018-03-16 06:05:01 -07:00
Jim Kalafut
3f1ed4eb0d
Fix description of parameter value globbing ( #4131 )
2018-03-14 17:03:00 -04:00
Edward Z. Yang
ac98730578
Vault user needed to use STS Federation Tokens ( #4108 )
...
If you try to use role authorization to get an STS token, you'll get this error:
* Error generating STS keys: AccessDenied: Cannot call GetFederationToken with session credentials
2018-03-14 10:24:29 -04:00
Malte
a0776eb703
Fix typo in recommended vault auth iam policy ( #4128 )
...
The resource arn for the `sts:AssumeRole` action is missing a `:` for the region and therefore invalid.
2018-03-14 03:45:21 -04:00
Brian Shumate
bbd4d7ab4c
Docs: grammatical clarification around community supported note ( #4122 )
2018-03-13 10:32:28 -04:00
Jeff Mitchell
9d2a0dc31f
Update text around default policy to make it clear that it is user-modifiable
2018-03-08 15:48:11 -05:00
Jim Kalafut
079de043e3
Fix instruction in installation docs ( #4097 )
2018-03-08 11:02:04 -05:00
Aleksandar
a8304e5d4d
Add the chunk_size optional parameter to gcs storage ( #4060 )
2018-03-05 08:32:48 -05:00
Mike
eb1c2b0732
Correct endpoint's path in Doc ( #4074 )
...
Fix typo in endpoint's path
2018-03-05 07:41:53 -05:00
Jim Kalafut
ef4537e5d4
Change "mount" to "secrets enable" in docs
2018-03-02 12:54:28 -08:00
Joel Thompson
e4949d644b
auth/aws: Allow lists in binds ( #3907 )
...
* auth/aws: Allow lists in binds
In the aws auth method, allow a number of binds to take in lists
instead of a single string value. The intended semantic is that, for
each bind type set, clients must match at least one of each of the bind
types set in order to authenticate.
2018-03-02 11:09:14 -05:00
Andy Manoske
942aa9bbdc
Update index.html.md
...
Updated for Unbound
2018-02-28 16:20:54 -08:00
Jeff Mitchell
20157fd56a
Fix broken link on Consul docs
2018-02-26 13:28:15 -05:00
chris trott
78df6a630e
Configurable Consul Service Address ( #3971 )
...
* Consul service address is blank
Setting an explicit service address eliminates the ability for Consul
to dynamically decide what it should be based on its translate_wan_addrs
setting.
translate_wan_addrs configures Consul to return its lan address to nodes
in its same datacenter but return its wan address to nodes in foreign
datacenters.
* service_address parameter for Consul storage backend
This parameter allows users to override the use of what Vault knows to
be its HA redirect address.
This option is particularly commpelling because if set to a blank
string, Consul will leverage the node configuration where the service is
registered which includes the `translate_wan_addrs` option. This option
conditionally associates nodes' lan or wan address based on where
requests originate.
* Add TestConsul_ServiceAddress
Ensures that the service_address configuration parameter is setting the
serviceAddress field of ConsulBackend instances properly.
If the "service_address" parameter is not set, the ConsulBackend
serviceAddress field must instantiate as nil to indicate that it can be
ignored.
2018-02-23 11:15:29 -05:00
Yoko
5389550cdc
Changed the layout category menu ( #4007 )
...
* Changed the layout category menu
* Fixed typos
* Fixed a typo, and removed the duplicated generate-root guide
* Fixed the redirect.txt
2018-02-22 16:24:01 -08:00
Jeff Mitchell
2dda3f6363
Make docs around regenerate_key more specific
2018-02-22 09:09:20 -05:00
Jeff Mitchell
c2ae25d588
Update PKCS11 seal information
2018-02-21 09:05:36 -05:00
Jeff Mitchell
857cdaeb2b
Add some info about cert reloading behavior on SIGHUP
...
CC #3990
2018-02-15 17:11:48 -05:00
Seth Vargo
cd930b1173
Add support for Google Cloud Spanner ( #3977 )
2018-02-14 20:31:20 -05:00
Jeff Mitchell
35906aaa6c
Add ChaCha20-Poly1305 support to transit ( #3975 )
2018-02-14 11:59:46 -05:00
Nick
11f197dfa5
Update lease.html.md ( #3759 )
2018-02-14 09:44:34 -05:00
Brian Shumate
e6bf69b96b
DOCS: update Telemetry with more coverage ( #3968 )
...
- Add initial secrets engines metrics
- Update metrics types/values
- Update language for auth methods, secrets engines, audit devices
- Add more linking to relevant documentation
2018-02-14 09:39:51 -05:00
Brian Shumate
bbc196a6e5
Clarify with example of file-backend specific metrics ( #3913 )
2018-02-13 11:04:11 -05:00
Brian Shumate
492b3e2277
DOCS: update Telemetry ( #3964 )
...
- Correct time to millis
- Correct storage backend summaries from # ops to duration of ops
2018-02-13 10:15:19 -05:00