Seth Vargo
53f26e6bd7
Update getting started walkthrough
2017-10-24 09:34:30 -04:00
Seth Vargo
51a27b758b
Resolve the most painful merge conflict known on earth
2017-10-24 09:34:12 -04:00
Seth Vargo
c5665920f6
Standardize on "auth method"
...
This removes all references I could find to:
- credential provider
- authentication backend
- authentication provider
- auth provider
- auth backend
in favor of the unified:
- auth method
2017-10-24 09:32:15 -04:00
Chris Hoffman
1029ad3b33
Rename "generic" secret backend to "kv" ( #3292 )
2017-09-15 09:02:29 -04:00
Chris Maki
7b5978634f
Update policies.html.md
...
Using the latest vault release, I was getting the following error when the policy used `write`:
Error: Error making API request.
URL: PUT http://0.0.0.0:8200/v1/sys/policy/secret
Code: 400. Errors:
* Failed to parse policy: path "secret/*": invalid capability 'write'
I think `create` is the correct new Capability.
2017-08-17 12:26:29 -07:00
Brian Kassouf
406396603a
Fix a few links ( #3188 )
2017-08-16 10:27:12 -07:00
Jonathan Duncan
8e9f54fc70
Updated policy format to use capabilities keyword ( #3063 )
...
The `policy` key name is deprecated and has been replaced with `capabilities`.
2017-07-26 14:05:11 -04:00
Seth Vargo
ce1808f77d
Update Policies and Auth concepts pages ( #3011 )
2017-07-14 11:15:22 -04:00
Jeff Mitchell
40ef2e5c85
More cleanup
...
Ping #2894
2017-06-20 10:46:24 -04:00
Ken McVicker
3a354343af
Update install.html.md
...
Updates list of commands with the output of 0.6.4. Missing commands list, unwrap, capabilities, generate-root
2017-05-12 14:13:06 -06:00
Seth Vargo
6931bbd091
Links
2017-03-17 14:27:32 -04:00
Seth Vargo
d4390d103e
/docs/http -> /api
2017-03-17 14:06:03 -04:00
Michael
412aad7c6e
Updated doc to match real output ( #2443 )
...
Regards hashicorp/vault#2116
2017-03-06 10:39:34 -05:00
Jack Harris
d5b1cc7ebe
Add correct output to unmount documentation ( #2352 )
...
Simply adding the actual output of: 'vault unmount generic/'
2017-02-08 10:40:56 -05:00
windowsrefund
64e7e99755
prevent startup error when user has multiple private IPs configured locally
2017-01-03 15:24:11 -05:00
James Turnbull
0b082bff42
Edits to the deploy guide
2016-12-14 11:17:50 -05:00
James Turnbull
e2ef0b75b6
Edits to the authorization/acl guide
2016-12-14 11:11:14 -05:00
James Turnbull
c47c8343b5
Edits to the authentication guide
2016-12-14 11:06:42 -05:00
James Turnbull
73ce47d0fe
Formatting and language updates to help guide
2016-12-14 10:55:11 -05:00
James Turnbull
ce6c0dcf95
Minor formatting fix to dynamic secrets guide
2016-12-14 10:51:56 -05:00
James Turnbull
f1b5377e81
Updated some formatting and language in the secret backends doc
2016-12-14 10:46:14 -05:00
James Turnbull
73324e2cba
Updated some formatting and language in the first secret doc
2016-12-14 10:39:45 -05:00
James Turnbull
3a981ae7b4
Updated some language and formatting in the dev-server guide
2016-12-14 10:34:52 -05:00
James Turnbull
49dd4f70df
Edits to the install doc in getting started
2016-12-14 10:15:26 -05:00
James Turnbull
6df55a3126
Added next step to install section
2016-12-14 10:13:15 -05:00
Andrea Crotti
d1c3367168
return code is 403 not 400 ( #2128 )
2016-11-25 06:47:27 -08:00
Em Smith
1812ce8d4a
Change command examples for First Secrets #2116 ( #2117 )
...
These were discovered to be out of date as per https://github.com/hashicorp/vault/issues/2116
2016-11-22 12:44:17 -05:00
vishalnayak
260424244b
s/localhost/127.0.0.1
2016-10-28 09:23:05 -04:00
vishalnayak
4ab6bd41c4
Using AppRole as an example. Removed 'root' policy being used in examples
2016-10-28 01:24:25 -04:00
vishalnayak
557bf45de6
Update the getting started API doc to not use 'root' policy
2016-10-11 16:07:48 -04:00
Jeff Mitchell
f0203741ff
Change default TTL from 30 to 32 to accommodate monthly operations ( #1942 )
2016-09-28 18:32:49 -04:00
Jeff Mitchell
96afb1d27a
Update getting started docs since root can no longer be used from github
2016-09-26 13:09:26 -04:00
John
c39eeecaea
tip to override VAULT_ADDR in getting started guide ( #1915 )
2016-09-23 19:34:07 -04:00
Michael Warkentin
14f2a673e2
Out of date `code`
...
Looks like the `500` is now a `405`:
```
$ vault read aws/config/root
Error reading aws/config/root: Error making API request.
URL: GET http://127.0.0.1:8200/v1/aws/config/root
Code: 405. Errors:
* 1 error(s) occurred:
* unsupported operation
```
2016-09-12 15:58:25 -04:00
Brian Shumate
e34146d9d8
Update deploy.html.md
...
Corrected link to Using PGP, GPG, and Keybase
2016-06-21 12:14:58 -04:00
Jeff Mitchell
33764e85b1
Merge pull request #1324 from hashicorp/sethvargo/doc_gpg
...
Add a page for step-by-step gpg/keybase
2016-06-03 13:24:57 -04:00
Jeff Mitchell
a147c3346c
Make some updates to PGP documentation
2016-06-03 13:23:20 -04:00
Sami Rageb
2dba9b180b
Fixed & clarified grammar around HCL & JSON
...
- Fixed the statement that HCL is JSON compatible, it's vice versa
- Added that HCL is a superset of JSON to eliminate any lingering confusion
2016-05-26 20:14:59 -05:00
vishalnayak
5c336297ad
Provide clarity for output statements of idempotent calls.
2016-04-14 15:46:45 +00:00
vishalnayak
b7178846c1
Clarify token-revoke operation
2016-04-14 15:34:01 +00:00
Seth Vargo
54c414abb2
Clarify delete operation
...
One thing that has been a point of confusion for users is Vault's
response when deleting a key that does not actually exist in the system.
For example, consider:
$ vault delete secret/foo
Success! Deleted 'secret/foo'
This message is misleading if the secret does not exist, especially if
the same command is run twice in a row.
Obviously the reason for this is clear - returning an error if a secret
does not exist would reveal the existence of a secret (the same reason
everything on S3 is a 403 or why GitHub repos 404 instead of 403 if you
do not have permission to view them).
I think we can make the UX a little bit better by adding just a few
words to the output:
$ vault delete secret/foo
Success! Deleted 'secret/foo' if it existed
This makes it clear that the operation was only performed if the secret
existed, but it does not reveal any more information.
2016-04-14 10:38:10 +01:00
Seth Vargo
2926be9ca7
Add a page for step-by-step gpg/keybase
2016-04-12 21:44:07 +01:00
Jeff Mitchell
0f923d8da5
Merge pull request #1301 from gliptak/patch-3
...
Update vault read output
2016-04-06 11:26:55 -04:00
Gábor Lipták
fa08142921
Update token-create/auth output
2016-04-06 11:14:27 -04:00
Gábor Lipták
b2f4d95c27
Update toke-create output
2016-04-06 10:24:19 -04:00
Gábor Lipták
f0d3f49601
Update vault read output
2016-04-06 09:13:39 -04:00
Seth Vargo
e40c77ff27
Use HTTPS + www where appropriate
2016-01-14 13:42:47 -05:00
Jeff Mitchell
ffa196da0e
Note that the dev server does not fork
...
Fixes #710 .
2015-10-30 12:47:56 -04:00
Jeremiah Johnson
d4a8c08feb
fix typo in first-secret.html.md
2015-10-22 12:04:22 -06:00
mkb
1d29ae940a
Minor grammar fix.
2015-10-20 13:42:46 -07:00