Skip to content

Commit

Permalink
Backport of Typo: Corrected same typo in 2 locations (on-premise to o…
Browse files Browse the repository at this point in the history
…n-premises) into stable-website (#13945)

* Use new auth modules + Login method in Go client docs (#13189)

* Updated Vault 1.9 documentation (#13194)

* post 1-9 doc changes

* fixed endpoint sample

* Update website/content/docs/release-notes/1.9.0.mdx

Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>

Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>

* docs: fixing the injector.webhookAnnotations annotation (#13181)

* docs: move deprecation notices down the navbar (#13201)

Moved from one of the first items in the navbar down to one of the last. They are not high priority information and should be grouped with upgrade and release notes.

* fixed errors in file (#13205)

* Docs deprecate token issuer validation (#13019)

* change default vaule for disable_iss_validation to be true

* mark as deprecated | remove issuer from sample

* deprecation section

* additional informaiton about when fields will be removed

* additional deprecation note under csi provider

* punctuation

* make the deprecation note more noticable

* missing issuer sentence | remove whitespace

* Update website/content/docs/platform/k8s/csi/index.mdx

Co-authored-by: Ben Ash <32777270+benashz@users.noreply.github.com>

* cleanup

* additional deprecation comments

* fix discovery link

* highlight

* no need to configure the issuer

Co-authored-by: Ben Ash <32777270+benashz@users.noreply.github.com>

* docs: updated for vault-k8s 0.14.1 vault-helm 0.18.0 (#13199)

* version bumps

* updated chart options

* Updates to 1.9 documentation (#13228)

* incorporated feedback

* fixed link

* fixed link again

* found another error

* README.md of website/ with WARNING on rebuilding (#13027)

* README.md of website/ with WARNING on rebuilding

* Update README.md

* Correct flag name: -dev-kv-v1, not dev-kv-1. (#13250)

* Docs/custom metadata updates (#13244)

* adding custom_metadata read and update changes

* adding custom metadata changes

* secrets/azure: fix API docs rendering of code block (#13245)

* Update Vault Agent intro (#13267)

* Update Vault Agent intro

* Update website/content/docs/agent/index.mdx

Co-authored-by: Brian Shumate <brianshumate@users.noreply.github.com>

* Update website/content/docs/agent/index.mdx

Co-authored-by: Brian Shumate <brianshumate@users.noreply.github.com>

* Update website/content/docs/agent/index.mdx

Co-authored-by: Brian Shumate <brianshumate@users.noreply.github.com>

* Update website/content/docs/agent/index.mdx

Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>

* Update website/content/docs/agent/index.mdx

Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>

* Update website/content/docs/agent/index.mdx

Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>

* Update website/content/docs/agent/index.mdx

Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>

* Update website/content/docs/agent/index.mdx

Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>

* Update website/content/docs/agent/index.mdx

Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>

* Update website/content/docs/agent/index.mdx

Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>

* Update website/content/docs/agent/index.mdx

Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>

* Update website/content/docs/agent/index.mdx

Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>

* Update website/content/docs/agent/index.mdx

Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>

* Update website/content/docs/agent/index.mdx

Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>

* Update website/content/docs/agent/index.mdx

Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>

* Update website/content/docs/agent/index.mdx

Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>

* Update website/content/docs/agent/index.mdx

Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>

* Update website/content/docs/agent/index.mdx

Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>

* Update website/content/docs/agent/index.mdx

Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>

* Update website/content/docs/agent/index.mdx

Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>

* Update website/content/docs/agent/index.mdx

Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>

Co-authored-by: Brian Shumate <brianshumate@users.noreply.github.com>
Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>

* secrets/azure: Fixes use_microsoft_graph_api parameter description in API docs (#13287)

* Fix case typo in docs (#13259)

* docs: added minor recommendation for k8s agent annotations  (#13239)


Co-authored-by: Theron Voran <tvoran@users.noreply.github.com>

* update custom headers to mention 1.9 is required (#13155)

* update custom headers to mention 1.9 is required

Per https://github.com/hashicorp/vault/blob/main/CHANGELOG.md#190-rc1 the custom response headers are a new feature introduced in 1.9, meaning we should explicitly call out this version requirement in documentation, otherwise users of earlier versions of Vault will unable to use the functionality and may consider it a bug.

* Update website/content/docs/configuration/listener/tcp.mdx

reads better, agreed

Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>

Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>

* Unhide or remove docs sidebar elements (#13198)

A few sidebar elements are hidden for unknown reasons. If we have a
reason to keep them hidden (vs deleting the element and associated docs),
maybe we could add `"_comment":"Hidden because ..."` to them.

A few other elements were definitely obsolete so I've removed them.

* Fix doc build (#13329)

path-help.mdx is now the reference for help.

* Vault documentation: updated client count FAQ document (#13330)

* modified based on feedback

* Update faq.mdx

fixed text

* website: fix print styles by bumping deps (#12894)

* website: fix print styles by bumping deps

* website: remove old highlight js prints style code

* fix: hashi-stack-menu selector

* improve "x_forwarded_for_hop_skips" example (#12463)

Currently the example given results in 2.3.4.5 if it is indexed from other side. This new example prevents confusion because it is now clear which side x_forwarded_for_hop_skips is indexing from

* Fix typo (#13355)

* modifed note (#13351)

* docs: winsvc update recommendations (#13280)

* docs: update custom database sample code (#13211)

* clarify more sink options (#12586)

* Update @hashicorp/react-hashi-stack-menu (#13354)

* Docs to clarify k8s auth options with short-lived tokens (#13275)

* Rework 1.21 content into one heading and add note at top
* Add notes about extended k8s token duration
* Add example of ClusterRoleBinding for using client JWTs

* [VAULT-3252] Add entity-alias behavior change to docs (#13370)

* Add entity-alias behavior change to docs

* Add upgrade note about entity-alias mapping change

* Rename 1.7-9 upgrade pages, shuffle upgrade note position

* Update website/content/partials/entity-alias-mapping.mdx

Co-authored-by: Meggie <meggie@hashicorp.com>

* Add incorrect policy issue to the docs

* Add example about entity-alias restriction

Co-authored-by: Meggie <meggie@hashicorp.com>

* Update alert banner (#13375)

* Updating website for 1.9.1 (#13378)

* auth/azure: add note about debug env (#13405)

* auth/azure: add note about debug env

* Update azure.mdx

* Update azure.mdx

* Add docs about path param restrictions (#13413)

* Add docs about path param restrictions

* Update website/content/api-docs/auth/userpass.mdx

Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>

* Update with review suggestion

Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>

* Update raftautosnapshots.mdx (#13412)

* Add paths filter doc (#13435)

* Add paths filter doc

* Add a description about the screenshot

* Update website/content/docs/enterprise/replication.mdx

Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>

* Update website/content/docs/enterprise/replication.mdx

Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>

* Update website/content/docs/enterprise/replication.mdx

Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>

* Update website/content/docs/enterprise/replication.mdx

Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>

* Update website/content/docs/enterprise/replication.mdx

Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>

* Update website/content/docs/enterprise/replication.mdx

Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>

* Update website/content/docs/enterprise/replication.mdx

Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>

* Update website/content/docs/enterprise/replication.mdx

Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>

* Update website/content/docs/enterprise/replication.mdx

Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>

* Update website/content/docs/enterprise/replication.mdx

Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>

* Update website/content/docs/enterprise/replication.mdx

Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>

* Remove extra sentense

* Update the diagram

* Update the diagram

Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>

* Homepage redesign (#13159)

* homepage setup

* [Homepage] `<IoHomeHero />` component (#13160)

* init <Hero /> component

* adds loading animation

* updates variable naming

* makes index optional

* Update hero-pattern.svg

* prefix with IoHome

* updates usage

* [Homepage] `<IoHomePreFooter />` component (#13182)

* adds <IoHomePreFooter />

* adds interfaces

* [Homepage] `<IoHomeHero />` component (#13160)

* init <Hero /> component

* adds loading animation

* updates variable naming

* makes index optional

* Update hero-pattern.svg

* prefix with IoHome

* updates usage

* adds <IoHomePreFooter />

* adds interfaces

* adds key

* [Homepage] `<IoHomeCallToAction />` component (#13164)

* adding brand to cta

* cleanup homepage

* [Homepage] `<IoHomeVideo />` component (#13161)

* init <Video /> component

* adjusts sizing and border radius

* responsive styling

* fix hover svg gitter

* adjust play icon sizing

* include temp thumbnail

* dialog implementation

* conditionally display person and show helpers

* rename component

* updates dialog naming

* add homepage styling

* simplify background color

* page level styling

* [Homepage] `<IoHomeCaseStudies />` (#13190)

* adds <IoHomeCaseStudies />

* adds interface

* animate gradient

* update min-heights

* Homepage `<IoHomeCard />` component (#13151)

* init <Card /> component

* fixes heading color

* adds product logos and hover styles

* update naming

* simplifies inset spacing

* use ternary and add key

* removes repo link

* removes need for camelCase package

* adds keys

* adds in practice cards

* adds in practice background

* use case cards

* update min col sizing

* adds feature component (#13203)

* fixes card hover bug

* [Homepage] connect homepage to dato content (#13227)

* connect homepage to dato

* Check for internal link

* fix return types

* adds youtube video

* hook up meta tags and chunk cards

* removes chunking

* fix ts return

* fix prop naming

* fix return type

* mobile sizing adjustments

* [Homepage] Usecase pages (#13240)

* init usecase page

* updates use case call to action

* card container component

* themeing

* convert to using strictly props

* responsive spacing

* reworking sections component

* adds callout and hero patterns

* adds priority

* makes feature link optional

* [Homepage] connect use case template to dato (#13295)

* Start connecting to dato

* Fix spacing when no video is present

* Remove log

* adds images

* hook up cards

* pass eyebrow and products

* Delete index.tsx

* Use card container on homepage

* use react video player

* [Homepage] fix mobile video (#13309)

* Removing attributes

* update url

* spacing adjustments

* Allow previewing draft content (#13312)

* fix heading width

* fix feature max width

* adjust in practice padding

* increase icon sizing

* adjust icon alignment

* update eyebrow

* update hero pattern

* update usecase hero pattern

* add hover scale

* [Homepage] populate use case dropdown from use case pages (#13325)

* create standard layout

* removes unused subnav data

* removes static use case pages

* removes use cases style

* bump subnav and use hashicorp vault logo

* fixes use cases paths

* removes hashistack menu

* removes subnav top border

* conditionally render video callout avatar

* hook up data and conditionals

* update components to work with other products

* extract in practice section for reuse

* use Products type

* fix type error

* rework cta logic

* removes type

* updates accent method

* fix button prop

* refactor customer case study

* refactor case studies component

* cleanup margin

* refactor data props

* Spacing updates and introduce intro component

* adds intro interface

* Delete style.css

* fix intro description color

* add revalidate code to homepage

* bump subnav

* make stats optional

* adjust border radius based on customer story

* cleanup temp files

* redirect /home to homepage

* reorder resources

* fix: move heading and description

* fix: logo alignment

* fix: section background color

* feat: optional tutorial and docs links

* fix: removes case studies background

* formatting

* feat: sort use cases in nav

* fix: card overflow (#13429)

* fix: adjust overflow method

* fix: padding on desktop

* fix: scroll padding-right on mobile

* remove debugger

* increase last item width

* card container overflow method (#13434)

* use flex

* formatting

* add comment

* Trigger Build

* Update openshift.mdx (#13372)

Consul Openshift is supported since Consul 1.9 as per https://www.hashicorp.com/blog/introducing-openshift-support-for-consul-on-kubernetes. Please verify.

* Update docs with new images (#13454)

* Update docs with new images

* Update website/content/docs/concepts/identity.mdx

Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>

* Remove extraneous Github mention

Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>

* website: Update text (#13441)

* chore: Disable alert banner (#13458)

* cherry-pick main

* add `entity-alias` parameter description (#13339)

This page is missing the `entity-alias` parameter description, available in the `vault token create --help` command

* Update index.mdx (#10873)

* Update index.mdx

Fixed typo in Setup section of the Secrets Engine documentation.

* Update index.mdx

Remove line 112.

* adjustemnt of options order (#12804)

Co-authored-by: tograla <tograla@gmail.com>

* Fix typo in policies.mdx (#13345)

Fix typo in Kubernetes policy example which prevents example from working.

* Backport of Upgrade guidance updates from VLT-172 into stable-website (#13478)

* backport of commit 7166b7f

* backport of commit e087318

Co-authored-by: Meggie Ladlow <meggie@hashicorp.com>

* Backport of Update entity-alias.mdx into stable-website (#13480)

* backport of commit aef7da3

* backport of commit cf08ac6

Co-authored-by: Jack Halford <jack@0x5.be>

* Backport of Improve databases documentation into stable-website (#13481)

* backport of commit 1aeddca

* backport of commit eb572c0

* backport of commit 72f9a6a

Co-authored-by: Jonathan Ballet <jballet@edgelab.ch>
Co-authored-by: Jonathan Ballet <jon@multani.info>

* Backport of add tencentCloud  Secrets&Auth Plugins into stable-website (#13484)

* backport of commit f127828

* backport of commit 5a633a0

* backport of commit 09de796

Co-authored-by: firingli <firingli@tencent.com>

* Backport of Adding upgrade note about 1.7.8 go version into stable-website (#13495)

* backport of commit 63cac2e

* backport of commit 2575a5d

Co-authored-by: Meggie Ladlow <meggie@hashicorp.com>

* Backport of docs: add a note regarding the backend => storage config key aliasing into stable-website (#13505)

* backport of commit 6414fad

* backport of commit b08553c

Co-authored-by: Jose Diaz-Gonzalez <email@josediazgonzalez.com>

* backport of commit 4debead (#13507)

Co-authored-by: Valerie Conklin <val@hashicorp.com>

* Backport of website: Upgrade <Subnav /> & <ProductDownloadsPage /> into stable-website (#13513)

* backport of commit 2818bc7

* backport of commit a835465

Co-authored-by: Noel Quiles <3746694+EnMod@users.noreply.github.com>

* Backport of fix: algolia-index CircleCI test into stable-website (#13519)

* backport of commit 84689f9

* backport of commit 458a945

Co-authored-by: Noel Quiles <3746694+EnMod@users.noreply.github.com>

* backport of commit fdae99d (#13525)

Co-authored-by: Jeff Escalante <jescalan@users.noreply.github.com>

* fix(docs-k8s-helm): changed server's podAntiAffinity labelSelector example to match helm default values (#13140)

* Update docs to reflect new plugin behavior. (#13543)

* Update docs to reflect that TLS connection state is now available to plugins

* Fix typo (D'oh!)

* Backport of Vault documentation: fixed broken links into stable-website (#13554)

This pull request was automerged via backport-assistant

* backport of commit db1ce43 (#13556)

This pull request was automerged via backport-assistant

* backport of commit 013705a (#13563)

This pull request was automerged via backport-assistant

* backport of commit d91ba9d (#13575)

This pull request was automerged via backport-assistant

* backport of commit 7bcae00 (#13587)

This pull request was automerged via backport-assistant

* docs: fix typo in azure auth debug log mode (#13593)

* backport of commit ff556b7 (#13623)

This pull request was automerged via backport-assistant

* Backport of Vault documentation: updated client count FAQ into stable-website (#13648)

This pull request was automerged via backport-assistant

* Backport of updating response for partial month client count into stable-website (#13652)

This pull request was automerged via backport-assistant

* Backport of secrets/keymgmt: Adds documentation for using Azure Private Link into stable-website (#13654)

This pull request was automerged via backport-assistant

* backport of commit 6afdd5a (#13656)

This pull request was automerged via backport-assistant

* Backport of docs: update oracle tls examples into stable-website (#13665)

This pull request was automerged via backport-assistant

* backport of commit f3b85a6 (#13685)

This pull request was automerged via backport-assistant

* backport of commit 555bd52 (#13694)

This pull request was automerged via backport-assistant

* backport of commit 6ad3d41 (#13709)

This pull request was automerged via backport-assistant

* Backport of docs: add known issues section to 1.9.x upgrade guide into stable-website (#13712)

This pull request was automerged via backport-assistant

* backport of commit e46313b (#13718)

This pull request was automerged via backport-assistant

* backport of commit bd784ef (#13741)

This pull request was automerged via backport-assistant

* backport of commit d24697a (#13770)

This pull request was automerged via backport-assistant

* Backport of docs/k8s: Updates for vault-k8s 0.14.2 and vault-helm 0.19.0 into stable-website (#13773)

This pull request was automerged via backport-assistant

* backport of commit a480053 (#13780)

This pull request was automerged via backport-assistant

* backport of commit 11abd48 (#13784)

This pull request was automerged via backport-assistant

* docs: add vault-plugin-secrets-jenkins to plugin portal page (#13531)

Signed-off-by: circa10a <caleblemoine@gmail.com>

* backport of commit b9cbe28 (#13791)

This pull request was automerged via backport-assistant

* backport of commit 7079d0a (#13800)

This pull request was automerged via backport-assistant

* backport of commit 7fb9a51 (#13809)

This pull request was automerged via backport-assistant

* Clarify that backend authors can specify that all or no values are sealwrapped (#13813)

* Clarify that backend authors can specify that all or no values are sealwrapped rather than the vague statement that all values _may_ be seal wrapped

* typo

* Backport of Add notes on the PKI cert generation forwarding regression into stable-website (#13817)

This pull request was automerged via backport-assistant

* backport of commit 80ed7e5 (#13823)

This pull request was automerged via backport-assistant

* Backport of Documentation updates for new keys for PKCS#11 unsealing into stable-website (#13826)

This pull request was automerged via backport-assistant

* backport of commit 4105255 (#13830)

This pull request was automerged via backport-assistant

* backport of commit 76440ae (#13834)

This pull request was automerged via backport-assistant

* backport of commit def7d94 (#13837)

This pull request was automerged via backport-assistant

* Backport of Docs: fix invalid link in the kubernetes auth api doc. into stable-website (#13845)

This pull request was automerged via backport-assistant

* Docs/auth kubernetes 1.9.3 (#13853)

* backport of commit a11b068 (#13854)

This pull request was automerged via backport-assistant

* Backport of OIDC: add note on PKCE support for code flow into stable-website (#13861)

This pull request was automerged via backport-assistant

* backport of commit f49f5b7 (#13897)

This pull request was automerged via backport-assistant

* backport of commit f852919 (#13899)

This pull request was automerged via backport-assistant

* Backport of Add missing word "database" in docs into stable-website (#13596)

* backport of commit 3e64bca

* backport of commit 9b97cb7

* backport of commit 2cb8b77

* backport of commit dc66009

* backport of commit e00c4b0

* backport of commit 7576a43

Co-authored-by: tvsaru <tvsaru@gmail.com>
Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>

* backport of commit e2008d6 (#13909)

This pull request was automerged via backport-assistant

* backport of commit c3aac0f (#13911)

This pull request was automerged via backport-assistant

* backport of commit 0a354fd (#13915)

This pull request was automerged via backport-assistant

* Backport of docs/oracle: add wallet permissions example into stable-website (#13928)

This pull request was automerged via backport-assistant

* Backport of Vault documentation: updated What is a Client section into stable-website (#13932)

This pull request was automerged via backport-assistant

* no-op commit due to failed cherry-picking

---------

Signed-off-by: circa10a <caleblemoine@gmail.com>
Co-authored-by: VAL <val@hashicorp.com>
Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>
Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
Co-authored-by: Martin Hristov <mhristov@hashicorp.com>
Co-authored-by: jweissig <jweissig@gmail.com>
Co-authored-by: Gary Frederick <hello@garyf.dev>
Co-authored-by: Ben Ash <32777270+benashz@users.noreply.github.com>
Co-authored-by: Theron Voran <tvoran@users.noreply.github.com>
Co-authored-by: aphorise <aphorise@gmail.com>
Co-authored-by: Nick Cabatoff <ncabatoff@hashicorp.com>
Co-authored-by: akshya96 <87045294+akshya96@users.noreply.github.com>
Co-authored-by: Austin Gebauer <34121980+austingebauer@users.noreply.github.com>
Co-authored-by: Brian Shumate <brianshumate@users.noreply.github.com>
Co-authored-by: Mike <mike-code@users.noreply.github.com>
Co-authored-by: Nicola Kabar <nicolaka@gmail.com>
Co-authored-by: Rowan Smith <86935689+rowansmithhc@users.noreply.github.com>
Co-authored-by: Jim Kalafut <jkalafut@hashicorp.com>
Co-authored-by: Zachary Shilton <4624598+zchsh@users.noreply.github.com>
Co-authored-by: Noel Prince <35508063+noelprince@users.noreply.github.com>
Co-authored-by: Harsimran Singh Maan <maan.harry@gmail.com>
Co-authored-by: mickael-hc <86245626+mickael-hc@users.noreply.github.com>
Co-authored-by: Calvin Leung Huang <1883212+calvn@users.noreply.github.com>
Co-authored-by: Mike Green <772413+mikegreen@users.noreply.github.com>
Co-authored-by: Noel Quiles <3746694+EnMod@users.noreply.github.com>
Co-authored-by: Tom Proctor <tomhjp@users.noreply.github.com>
Co-authored-by: Pratyoy Mukhopadhyay <35388175+pmmukh@users.noreply.github.com>
Co-authored-by: Meggie <meggie@hashicorp.com>
Co-authored-by: Brandon Romano <brandon@hashicorp.com>
Co-authored-by: Jason O'Donnell <2160810+jasonodonnell@users.noreply.github.com>
Co-authored-by: Mark Lewis <56076038+ml4@users.noreply.github.com>
Co-authored-by: Alex Carpenter <im.alexcarpenter@gmail.com>
Co-authored-by: Jason Peng <86845444+jpenghashi@users.noreply.github.com>
Co-authored-by: Kevin Wang <kwangsan@gmail.com>
Co-authored-by: Kaue Doretto Grecchi <31520323+kauedg@users.noreply.github.com>
Co-authored-by: Carlos Cisneros, Jr <52078531+lostradamus@users.noreply.github.com>
Co-authored-by: Tom <63804658+tograla@users.noreply.github.com>
Co-authored-by: tograla <tograla@gmail.com>
Co-authored-by: Vasilii Angapov <angapov@gmail.com>
Co-authored-by: Jack Halford <jack@0x5.be>
Co-authored-by: Jonathan Ballet <jballet@edgelab.ch>
Co-authored-by: Jonathan Ballet <jon@multani.info>
Co-authored-by: firingli <firingli@tencent.com>
Co-authored-by: Jose Diaz-Gonzalez <email@josediazgonzalez.com>
Co-authored-by: Jeff Escalante <jescalan@users.noreply.github.com>
Co-authored-by: Pascal Reeb <pascal@reeb.io>
Co-authored-by: Tim Peoples <tep@users.noreply.github.com>
Co-authored-by: Caleb Lemoine <21261388+circa10a@users.noreply.github.com>
Co-authored-by: Scott Miller <smiller@hashicorp.com>
Co-authored-by: tvsaru <tvsaru@gmail.com>
Co-authored-by: temp <temp@hashicorp.com>
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
  • Loading branch information
Show file tree
Hide file tree
Showing 6 changed files with 21 additions and 31 deletions.
1 change: 0 additions & 1 deletion website/content/docs/agent/index.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -61,7 +61,6 @@ func getSecretWithAppRole() (string, error) {
}

data := secret.Data["data"].(map[string]interface{})

...snip...
}
```
Expand Down
14 changes: 7 additions & 7 deletions website/content/docs/auth/approle.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -341,12 +341,12 @@ using VaultSharp.V1.AuthMethods.AppRole;
using VaultSharp.V1.AuthMethods.Token;
using VaultSharp.V1.Commons;

namespace Examples
namespace Examples
{
public class ApproleAuthExample
{
const string DefaultTokenPath = "../../../path/to/wrapping-token";

/// <summary>
/// Fetches a key-value secret (kv-v2) after authenticating to Vault via AppRole authentication
/// </summary>
Expand All @@ -356,7 +356,7 @@ namespace Examples
// The Secret ID is a value that needs to be protected, so instead of the app having knowledge of the secret ID directly,
// we have a trusted orchestrator (https://learn.hashicorp.com/tutorials/vault/secure-introduction?in=vault/app-integration#trusted-orchestrator)
// give the app access to a short-lived response-wrapping token (https://www.vaultproject.io/docs/concepts/response-wrapping).
// Read more at: https://learn.hashicorp.com/tutorials/vault/approle-best-practices?in=vault/auth-methods#secretid-delivery-best-practices
// Read more at: https://learn.hashicorp.com/tutorials/vault/approle-best-practices?in=vault/auth-methods#secretid-delivery-best-practices
var vaultAddr = Environment.GetEnvironmentVariable("VAULT_ADDR");
if(String.IsNullOrEmpty(vaultAddr))
{
Expand All @@ -382,9 +382,9 @@ namespace Examples
// We pass null here instead of the wrapping token to avoid depleting its single usage
// given that we already initialized our client with the wrapping token
Secret<Dictionary<string, object>> secretIdData = vaultClientForUnwrapping.V1.System
.UnwrapWrappedResponseDataAsync<Dictionary<string, object>>(null).Result;
.UnwrapWrappedResponseDataAsync<Dictionary<string, object>>(null).Result;

var secretId = secretIdData.Data["secret_id"]; // Grab the secret_id
var secretId = secretIdData.Data["secret_id"]; // Grab the secret_id
// We create a second VaultClient and initialize it with the AppRole auth method and our new credentials.
IAuthMethodInfo authMethod = new AppRoleAuthMethodInfo(roleId, secretId.ToString());
Expand All @@ -395,9 +395,9 @@ namespace Examples
// We can retrieve the secret from VaultClient
Secret<SecretData> kv2Secret = null;
kv2Secret = vaultClient.V1.Secrets.KeyValue.V2.ReadSecretAsync(path: "/creds").Result;

var password = kv2Secret.Data.Data["password"];

return password.ToString();
}
}
Expand Down
14 changes: 7 additions & 7 deletions website/content/docs/auth/aws.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -834,9 +834,9 @@ using VaultSharp.V1.SecretsEngines.AWS;

namespace Examples
{
public class AwsAuthExample
public class AwsAuthExample
{
/// <summary>
/// <summary>
/// Fetches a key-value secret (kv-v2) after authenticating to Vault via AWS IAM,
/// one of two auth methods used to authenticate with AWS (the other is EC2 auth).
/// </summary>
Expand All @@ -857,12 +857,12 @@ namespace Examples
var amazonSecurityTokenServiceConfig = new AmazonSecurityTokenServiceConfig();

// Initialize BasicAWS Credentials w/ an accessKey and secretKey
Amazon.Runtime.AWSCredentials awsCredentials = new BasicAWSCredentials(accessKey: Environment.GetEnvironmentVariable("AWS_ACCESS_KEY_ID"),
Amazon.Runtime.AWSCredentials awsCredentials = new BasicAWSCredentials(accessKey: Environment.GetEnvironmentVariable("AWS_ACCESS_KEY_ID"),
secretKey: Environment.GetEnvironmentVariable("AWS_SECRET_ACCESS_KEY"));

// Construct the IAM Request and add necessary headers
var iamRequest = GetCallerIdentityRequestMarshaller.Instance.Marshall(new GetCallerIdentityRequest());

iamRequest.Endpoint = new Uri(amazonSecurityTokenServiceConfig.DetermineServiceURL());
iamRequest.ResourcePath = "/";

Expand All @@ -884,9 +884,9 @@ namespace Examples
// We can retrieve the secret from the VaultClient object
Secret<SecretData> kv2Secret = null;
kv2Secret = vaultClient.V1.Secrets.KeyValue.V2.ReadSecretAsync(path: "/creds").Result;

var password = kv2Secret.Data.Data["password"];

return password.ToString();
}
}
Expand Down
1 change: 0 additions & 1 deletion website/content/docs/configuration/listener/tcp.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,6 @@ specify [`api_addr`][api-addr] and [`cluster_addr`][cluster-addr] so Vault will
advertise the correct address to other nodes.

## Listener's custom response headers

As of version 1.9, Vault supports defining custom HTTP response headers for the root path (`/`) and also on API endpoints (`/v1/*`).
The headers are defined based on the returned status code. For example, a user can define a list of
custom response headers for the `200` status code, and another list of custom response headers for
Expand Down
15 changes: 0 additions & 15 deletions website/content/docs/internals/security.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -60,21 +60,6 @@ The following are not parts of the Vault threat model:
to inspect the memory state of a running Vault instance then the confidentiality
of data may be compromised.

- Protecting against flaws in external systems or services used by Vault.
Some authentication methods or secrets engines delegate sensitive operations to
systems external to Vault. If an attacker can compromise credentials or otherwise
exploit a vulnerability in these external systems, then the confidentiality or
integrity of data may be compromised.

- Protecting against malicious plugins or code execution on the underlying host.
If an attacker can gain code execution or write privileges to the underlying host,
then the confidentiality or the integrity of data may be compromised.

- Protecting against flaws in clients or systems that access Vault. If an attacker
can compromise a Vault client (e.g., system, browser) and obtain this client’s Vault
credentials, they can access Vault with the level of privilege associated with this
client.

# External Threat Overview

Given the architecture of Vault, there are 3 distinct systems we are concerned
Expand Down
7 changes: 7 additions & 0 deletions website/next.config.js
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,13 @@ console.log(`VERCEL_ENV: ${process.env.VERCEL_ENV}`)
console.log(`MKTG_CONTENT_API: ${process.env.MKTG_CONTENT_API}`)
console.log(`ENABLE_VERSIONED_DOCS: ${process.env.ENABLE_VERSIONED_DOCS}`)

// log out our primary environment variables for clarity in build logs
console.log(`HASHI_ENV: ${process.env.HASHI_ENV}`)
console.log(`NODE_ENV: ${process.env.NODE_ENV}`)
console.log(`VERCEL_ENV: ${process.env.VERCEL_ENV}`)
console.log(`MKTG_CONTENT_API: ${process.env.MKTG_CONTENT_API}`)
console.log(`ENABLE_VERSIONED_DOCS: ${process.env.ENABLE_VERSIONED_DOCS}`)

module.exports = withHashicorp({
dato: {
// This token is safe to be in this public repository, it only has access to content that is publicly viewable on the website
Expand Down

0 comments on commit 6bfbb0d

Please sign in to comment.