Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Backport of Typo: Corrected same typo in 2 locations (on-premise to on-premises) into stable-website #13945

Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
106 commits
Select commit Hold shift + click to select a range
b04b351
Use new auth modules + Login method in Go client docs (#13189)
digivava Nov 17, 2021
317e016
Updated Vault 1.9 documentation (#13194)
taoism4504 Nov 17, 2021
a32a17c
docs: fixing the injector.webhookAnnotations annotation (#13181)
martinhristov90 Nov 18, 2021
a5563d8
docs: move deprecation notices down the navbar (#13201)
jweissig Nov 18, 2021
619e605
fixed errors in file (#13205)
taoism4504 Nov 18, 2021
c904c07
Docs deprecate token issuer validation (#13019)
imthaghost Nov 18, 2021
bdce9eb
docs: updated for vault-k8s 0.14.1 vault-helm 0.18.0 (#13199)
tvoran Nov 19, 2021
288d262
Updates to 1.9 documentation (#13228)
taoism4504 Nov 19, 2021
c2ba443
README.md of website/ with WARNING on rebuilding (#13027)
aphorise Nov 19, 2021
3bf9280
Correct flag name: -dev-kv-v1, not dev-kv-1. (#13250)
ncabatoff Nov 23, 2021
34ea8da
Docs/custom metadata updates (#13244)
akshya96 Nov 23, 2021
bde260e
secrets/azure: fix API docs rendering of code block (#13245)
austingebauer Nov 24, 2021
4b79b63
Update Vault Agent intro (#13267)
yhyakuna Nov 24, 2021
e4a6874
secrets/azure: Fixes use_microsoft_graph_api parameter description in…
austingebauer Nov 27, 2021
06274f0
Fix case typo in docs (#13259)
mike-code Nov 29, 2021
1943b15
docs: added minor recommendation for k8s agent annotations (#13239)
nicolaka Nov 29, 2021
f231126
update custom headers to mention 1.9 is required (#13155)
rowansmithhc Dec 1, 2021
41b31fc
Unhide or remove docs sidebar elements (#13198)
Dec 2, 2021
efc7dda
Fix doc build (#13329)
Dec 2, 2021
5082d9f
Vault documentation: updated client count FAQ document (#13330)
taoism4504 Dec 2, 2021
36bc341
website: fix print styles by bumping deps (#12894)
zchsh Dec 3, 2021
a57b62b
improve "x_forwarded_for_hop_skips" example (#12463)
noelprince Dec 6, 2021
29dede6
Fix typo (#13355)
harsimranmaan Dec 7, 2021
4f62f9a
modifed note (#13351)
taoism4504 Dec 7, 2021
9479b6b
docs: winsvc update recommendations (#13280)
mickael-hc Dec 7, 2021
91dfc32
docs: update custom database sample code (#13211)
calvn Dec 7, 2021
19c7c6d
clarify more sink options (#12586)
mikegreen Dec 7, 2021
d14d7f9
Update @hashicorp/react-hashi-stack-menu (#13354)
EnMod Dec 7, 2021
05665ce
Docs to clarify k8s auth options with short-lived tokens (#13275)
tomhjp Dec 8, 2021
6607cf1
[VAULT-3252] Add entity-alias behavior change to docs (#13370)
pmmukh Dec 8, 2021
d361633
Update alert banner (#13375)
Dec 9, 2021
f11d240
Updating website for 1.9.1 (#13378)
mladlow Dec 9, 2021
9760eea
auth/azure: add note about debug env (#13405)
jasonodonnell Dec 13, 2021
044d75f
Add docs about path param restrictions (#13413)
pmmukh Dec 14, 2021
356d0cc
Update raftautosnapshots.mdx (#13412)
ml4 Dec 14, 2021
a62d885
Add paths filter doc (#13435)
yhyakuna Dec 15, 2021
40e12d9
Homepage redesign (#13159)
alexcarpenter Dec 15, 2021
6327e0e
Trigger Build
alexcarpenter Dec 15, 2021
a0d88b7
Update openshift.mdx (#13372)
jpenghashi Dec 15, 2021
e580370
Update docs with new images (#13454)
pmmukh Dec 16, 2021
905c8e8
website: Update text (#13441)
EnMod Dec 16, 2021
a5ce16b
chore: Disable alert banner (#13458)
EnMod Dec 16, 2021
d579493
cherry-pick main
thiskevinwang Dec 17, 2021
3782094
add `entity-alias` parameter description (#13339)
kauedg Dec 17, 2021
8b5b9a0
Update index.mdx (#10873)
lostradamus Dec 18, 2021
1d5a2a3
adjustemnt of options order (#12804)
tograla Dec 18, 2021
35d23ff
Fix typo in policies.mdx (#13345)
angapov Dec 20, 2021
8967293
Backport of Upgrade guidance updates from VLT-172 into stable-website…
hc-github-team-secure-vault-core Dec 20, 2021
3dc6234
Backport of Update entity-alias.mdx into stable-website (#13480)
hc-github-team-secure-vault-core Dec 20, 2021
f88e3ec
Backport of Improve databases documentation into stable-website (#13481)
hc-github-team-secure-vault-core Dec 20, 2021
96fa3a5
Backport of add tencentCloud Secrets&Auth Plugins into stable-websit…
hc-github-team-secure-vault-core Dec 21, 2021
57fcfc1
Backport of Adding upgrade note about 1.7.8 go version into stable-we…
hc-github-team-secure-vault-core Dec 21, 2021
14a5779
Backport of docs: add a note regarding the backend => storage config …
hc-github-team-secure-vault-core Dec 22, 2021
5c0e2c8
backport of commit 4debead027f677509f1c0f07bc3de08595fd0c7b (#13507)
hc-github-team-secure-vault-core Dec 22, 2021
d032bc3
Backport of website: Upgrade <Subnav /> & <ProductDownloadsPage /> in…
hc-github-team-secure-vault-core Dec 22, 2021
794b562
Backport of fix: algolia-index CircleCI test into stable-website (#13…
hc-github-team-secure-vault-core Dec 23, 2021
02fae10
backport of commit fdae99d03c4fdbb36af20a5355af4b358c42c7c7 (#13525)
hc-github-team-secure-vault-core Dec 25, 2021
6d16381
fix(docs-k8s-helm): changed server's podAntiAffinity labelSelector ex…
pree Jan 3, 2022
bb2c3ce
Update docs to reflect new plugin behavior. (#13543)
tep Jan 3, 2022
d541bc9
Backport of Vault documentation: fixed broken links into stable-websi…
hc-github-team-secure-vault-core Jan 3, 2022
6a7e6d2
backport of commit db1ce43ef8cc52e527bd328e6d360e91476d27ad (#13556)
hc-github-team-secure-vault-core Jan 4, 2022
cb2e5ff
backport of commit 013705aae86d29a9eb60836bdcbffa40d69d4714 (#13563)
hc-github-team-secure-vault-core Jan 4, 2022
b33678c
backport of commit d91ba9dce0a356814af49fb176ae474d57cac5f0 (#13575)
hc-github-team-secure-vault-core Jan 5, 2022
e54dd86
backport of commit 7bcae00f155412175144eaa98281226e6ccc6994 (#13587)
hc-github-team-secure-vault-core Jan 6, 2022
94c070c
docs: fix typo in azure auth debug log mode (#13593)
jasonodonnell Jan 7, 2022
ae01de9
backport of commit ff556b7d26bd3c84865b3a07be5e0f1c16fceec8 (#13623)
hc-github-team-secure-vault-core Jan 11, 2022
3566164
Backport of Vault documentation: updated client count FAQ into stable…
hc-github-team-secure-vault-core Jan 13, 2022
a5c3469
Backport of updating response for partial month client count into sta…
hc-github-team-secure-vault-core Jan 13, 2022
e951465
Backport of secrets/keymgmt: Adds documentation for using Azure Priva…
hc-github-team-secure-vault-core Jan 13, 2022
fe3528d
backport of commit 6afdd5adeddf1a3aeec7419a24c3cd2ede784809 (#13656)
hc-github-team-secure-vault-core Jan 13, 2022
76e3cc6
Backport of docs: update oracle tls examples into stable-website (#13…
hc-github-team-secure-vault-core Jan 14, 2022
cc604e1
backport of commit f3b85a663e2c9011dc831749b718922239212236 (#13685)
hc-github-team-secure-vault-core Jan 18, 2022
54ed387
backport of commit 555bd52b989e507c8ea753a531156f77779c4a1a (#13694)
hc-github-team-secure-vault-core Jan 18, 2022
d4c59cb
backport of commit 6ad3d41e366cd18d5730ff29c63e7f310ceb9a1f (#13709)
hc-github-team-secure-vault-core Jan 19, 2022
267661e
Backport of docs: add known issues section to 1.9.x upgrade guide int…
hc-github-team-secure-vault-core Jan 19, 2022
9e49088
backport of commit e46313bb644c544ac800b7091cef65f20ab51c6a (#13718)
hc-github-team-secure-vault-core Jan 19, 2022
b687cfd
backport of commit bd784efce56d4b1db3ec29efa0c54db3426e9498 (#13741)
hc-github-team-secure-vault-core Jan 21, 2022
eae3340
backport of commit d24697abb9b2d0f8b86601e3be68efed4b01c9ed (#13770)
hc-github-team-secure-vault-core Jan 24, 2022
a623fd6
Backport of docs/k8s: Updates for vault-k8s 0.14.2 and vault-helm 0.1…
hc-github-team-secure-vault-core Jan 24, 2022
8a81ad0
backport of commit a480053b48b68afdbcef923140a2753a24eab1d6 (#13780)
hc-github-team-secure-vault-core Jan 25, 2022
b17384e
backport of commit 11abd485a2be8c7e22f6cc5cb25f5ab0545a5914 (#13784)
hc-github-team-secure-vault-core Jan 25, 2022
86f8743
docs: add vault-plugin-secrets-jenkins to plugin portal page (#13531)
circa10a Jan 25, 2022
02a1441
backport of commit b9cbe28cc26ec0e388528430c9eeb12d0738387a (#13791)
hc-github-team-secure-vault-core Jan 26, 2022
83eab2f
backport of commit 7079d0ae84a68a948db89302216e38aecc9390e0 (#13800)
hc-github-team-secure-vault-core Jan 26, 2022
cd167bf
backport of commit 7fb9a51538eeb9c103956845a03fe4b22504c647 (#13809)
hc-github-team-secure-vault-core Jan 27, 2022
42a6d06
Clarify that backend authors can specify that all or no values are se…
sgmiller Jan 27, 2022
3a40060
Backport of Add notes on the PKI cert generation forwarding regressio…
hc-github-team-secure-vault-core Jan 27, 2022
5672dbf
backport of commit 80ed7e582f4ddb9bcf692380cd661abca7465b18 (#13823)
hc-github-team-secure-vault-core Jan 28, 2022
423c008
Backport of Documentation updates for new keys for PKCS#11 unsealing …
hc-github-team-secure-vault-core Jan 28, 2022
44ed6b4
backport of commit 41052558729f4c728f6192572e563afba5d8a29c (#13830)
hc-github-team-secure-vault-core Jan 28, 2022
29e4bc9
backport of commit 76440aee9a992607f37802dbe7b2592210e7bc83 (#13834)
hc-github-team-secure-vault-core Jan 28, 2022
a9fa85c
backport of commit def7d9425299084e5ebefec0f2d873bb4801970e (#13837)
hc-github-team-secure-vault-core Jan 28, 2022
9129795
Backport of Docs: fix invalid link in the kubernetes auth api doc. in…
hc-github-team-secure-vault-core Jan 31, 2022
583865e
Docs/auth kubernetes 1.9.3 (#13853)
tvoran Jan 31, 2022
e864d8c
backport of commit a11b0685e290fc869525fd6c3a1dab3559fdb88a (#13854)
hc-github-team-secure-vault-core Jan 31, 2022
c73387a
Backport of OIDC: add note on PKCE support for code flow into stable-…
hc-github-team-secure-vault-core Feb 1, 2022
769b90a
backport of commit f49f5b76b95c71150e45fd8ff25cf0b618d68dfd (#13897)
hc-github-team-secure-vault-core Feb 4, 2022
4bdc238
backport of commit f852919af80a38a1fcc93fcef265acd86939a0ab (#13899)
hc-github-team-secure-vault-core Feb 4, 2022
b460a61
Backport of Add missing word "database" in docs into stable-website (…
hc-github-team-secure-vault-core Feb 4, 2022
2b8823e
backport of commit e2008d681f24fbfefa2f661f6e5c40f199da52a0 (#13909)
hc-github-team-secure-vault-core Feb 4, 2022
98fab91
backport of commit c3aac0fc37453cef768c5aa55018bd82fb8eefe2 (#13911)
hc-github-team-secure-vault-core Feb 4, 2022
f71d7fa
backport of commit 0a354fd852320d5ac67770ca17c60ebd521bc157 (#13915)
hc-github-team-secure-vault-core Feb 4, 2022
82dfcae
Backport of docs/oracle: add wallet permissions example into stable-w…
hc-github-team-secure-vault-core Feb 7, 2022
cbf3d34
Backport of Vault documentation: updated What is a Client section int…
hc-github-team-secure-vault-core Feb 7, 2022
1426b46
no-op commit due to failed cherry-picking
Feb 8, 2022
43ffa9b
Merge remote-tracking branch 'origin/stable-website' into backport/do…
schavis Aug 16, 2023
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 0 additions & 1 deletion website/content/docs/agent/index.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -61,7 +61,6 @@ func getSecretWithAppRole() (string, error) {
}

data := secret.Data["data"].(map[string]interface{})

...snip...
}
```
Expand Down
14 changes: 7 additions & 7 deletions website/content/docs/auth/approle.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -341,12 +341,12 @@ using VaultSharp.V1.AuthMethods.AppRole;
using VaultSharp.V1.AuthMethods.Token;
using VaultSharp.V1.Commons;

namespace Examples
namespace Examples
{
public class ApproleAuthExample
{
const string DefaultTokenPath = "../../../path/to/wrapping-token";

/// <summary>
/// Fetches a key-value secret (kv-v2) after authenticating to Vault via AppRole authentication
/// </summary>
Expand All @@ -356,7 +356,7 @@ namespace Examples
// The Secret ID is a value that needs to be protected, so instead of the app having knowledge of the secret ID directly,
// we have a trusted orchestrator (https://learn.hashicorp.com/tutorials/vault/secure-introduction?in=vault/app-integration#trusted-orchestrator)
// give the app access to a short-lived response-wrapping token (https://www.vaultproject.io/docs/concepts/response-wrapping).
// Read more at: https://learn.hashicorp.com/tutorials/vault/approle-best-practices?in=vault/auth-methods#secretid-delivery-best-practices
// Read more at: https://learn.hashicorp.com/tutorials/vault/approle-best-practices?in=vault/auth-methods#secretid-delivery-best-practices
var vaultAddr = Environment.GetEnvironmentVariable("VAULT_ADDR");
if(String.IsNullOrEmpty(vaultAddr))
{
Expand All @@ -382,9 +382,9 @@ namespace Examples
// We pass null here instead of the wrapping token to avoid depleting its single usage
// given that we already initialized our client with the wrapping token
Secret<Dictionary<string, object>> secretIdData = vaultClientForUnwrapping.V1.System
.UnwrapWrappedResponseDataAsync<Dictionary<string, object>>(null).Result;
.UnwrapWrappedResponseDataAsync<Dictionary<string, object>>(null).Result;

var secretId = secretIdData.Data["secret_id"]; // Grab the secret_id
var secretId = secretIdData.Data["secret_id"]; // Grab the secret_id

// We create a second VaultClient and initialize it with the AppRole auth method and our new credentials.
IAuthMethodInfo authMethod = new AppRoleAuthMethodInfo(roleId, secretId.ToString());
Expand All @@ -395,9 +395,9 @@ namespace Examples
// We can retrieve the secret from VaultClient
Secret<SecretData> kv2Secret = null;
kv2Secret = vaultClient.V1.Secrets.KeyValue.V2.ReadSecretAsync(path: "/creds").Result;

var password = kv2Secret.Data.Data["password"];

return password.ToString();
}
}
Expand Down
14 changes: 7 additions & 7 deletions website/content/docs/auth/aws.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -834,9 +834,9 @@ using VaultSharp.V1.SecretsEngines.AWS;

namespace Examples
{
public class AwsAuthExample
public class AwsAuthExample
{
/// <summary>
/// <summary>
/// Fetches a key-value secret (kv-v2) after authenticating to Vault via AWS IAM,
/// one of two auth methods used to authenticate with AWS (the other is EC2 auth).
/// </summary>
Expand All @@ -857,12 +857,12 @@ namespace Examples
var amazonSecurityTokenServiceConfig = new AmazonSecurityTokenServiceConfig();

// Initialize BasicAWS Credentials w/ an accessKey and secretKey
Amazon.Runtime.AWSCredentials awsCredentials = new BasicAWSCredentials(accessKey: Environment.GetEnvironmentVariable("AWS_ACCESS_KEY_ID"),
Amazon.Runtime.AWSCredentials awsCredentials = new BasicAWSCredentials(accessKey: Environment.GetEnvironmentVariable("AWS_ACCESS_KEY_ID"),
secretKey: Environment.GetEnvironmentVariable("AWS_SECRET_ACCESS_KEY"));

// Construct the IAM Request and add necessary headers
var iamRequest = GetCallerIdentityRequestMarshaller.Instance.Marshall(new GetCallerIdentityRequest());

iamRequest.Endpoint = new Uri(amazonSecurityTokenServiceConfig.DetermineServiceURL());
iamRequest.ResourcePath = "/";

Expand All @@ -884,9 +884,9 @@ namespace Examples
// We can retrieve the secret from the VaultClient object
Secret<SecretData> kv2Secret = null;
kv2Secret = vaultClient.V1.Secrets.KeyValue.V2.ReadSecretAsync(path: "/creds").Result;

var password = kv2Secret.Data.Data["password"];

return password.ToString();
}
}
Expand Down
1 change: 0 additions & 1 deletion website/content/docs/configuration/listener/tcp.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,6 @@ specify [`api_addr`][api-addr] and [`cluster_addr`][cluster-addr] so Vault will
advertise the correct address to other nodes.

## Listener's custom response headers

As of version 1.9, Vault supports defining custom HTTP response headers for the root path (`/`) and also on API endpoints (`/v1/*`).
The headers are defined based on the returned status code. For example, a user can define a list of
custom response headers for the `200` status code, and another list of custom response headers for
Expand Down
15 changes: 0 additions & 15 deletions website/content/docs/internals/security.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -60,21 +60,6 @@ The following are not parts of the Vault threat model:
to inspect the memory state of a running Vault instance then the confidentiality
of data may be compromised.

- Protecting against flaws in external systems or services used by Vault.
Some authentication methods or secrets engines delegate sensitive operations to
systems external to Vault. If an attacker can compromise credentials or otherwise
exploit a vulnerability in these external systems, then the confidentiality or
integrity of data may be compromised.

- Protecting against malicious plugins or code execution on the underlying host.
If an attacker can gain code execution or write privileges to the underlying host,
then the confidentiality or the integrity of data may be compromised.

- Protecting against flaws in clients or systems that access Vault. If an attacker
can compromise a Vault client (e.g., system, browser) and obtain this client’s Vault
credentials, they can access Vault with the level of privilege associated with this
client.

# External Threat Overview

Given the architecture of Vault, there are 3 distinct systems we are concerned
Expand Down
7 changes: 7 additions & 0 deletions website/next.config.js
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,13 @@ console.log(`VERCEL_ENV: ${process.env.VERCEL_ENV}`)
console.log(`MKTG_CONTENT_API: ${process.env.MKTG_CONTENT_API}`)
console.log(`ENABLE_VERSIONED_DOCS: ${process.env.ENABLE_VERSIONED_DOCS}`)

// log out our primary environment variables for clarity in build logs
console.log(`HASHI_ENV: ${process.env.HASHI_ENV}`)
console.log(`NODE_ENV: ${process.env.NODE_ENV}`)
console.log(`VERCEL_ENV: ${process.env.VERCEL_ENV}`)
console.log(`MKTG_CONTENT_API: ${process.env.MKTG_CONTENT_API}`)
console.log(`ENABLE_VERSIONED_DOCS: ${process.env.ENABLE_VERSIONED_DOCS}`)

module.exports = withHashicorp({
dato: {
// This token is safe to be in this public repository, it only has access to content that is publicly viewable on the website
Expand Down