From 98b6b8e3835f97c975d8133d031678d84c8ecb88 Mon Sep 17 00:00:00 2001 From: Sean Ellefson Date: Mon, 20 Oct 2025 14:39:09 -0700 Subject: [PATCH] Updating example plugin name in Oracle DB examples As of Vault v1.9.0 (per commit 30a483088d8e3ed9f659f6072c9ee5f3a6dae90e), Vault's UI does not support custom plugin names. The OracleDB plugin's officially supported name is `vault-plugin-database-oracle'. Using another name will cause Vault's UI to throw a warning to the user, and redirect them to the CLI/API. This change just updates the plugin name used in the examples for the Oracle Database Secret Engine doc to use the officially support name, so as to reduce confusion for customers who may encounter this warning in the UI. --- .../vault/v1.10.x/content/docs/secrets/databases/oracle.mdx | 4 ++-- .../vault/v1.11.x/content/docs/secrets/databases/oracle.mdx | 4 ++-- .../vault/v1.12.x/content/docs/secrets/databases/oracle.mdx | 4 ++-- .../vault/v1.13.x/content/docs/secrets/databases/oracle.mdx | 4 ++-- .../vault/v1.14.x/content/docs/secrets/databases/oracle.mdx | 4 ++-- .../vault/v1.15.x/content/docs/secrets/databases/oracle.mdx | 4 ++-- .../vault/v1.16.x/content/docs/secrets/databases/oracle.mdx | 4 ++-- .../vault/v1.17.x/content/docs/secrets/databases/oracle.mdx | 4 ++-- .../vault/v1.18.x/content/docs/secrets/databases/oracle.mdx | 4 ++-- .../vault/v1.19.x/content/docs/secrets/databases/oracle.mdx | 6 +++--- .../vault/v1.20.x/content/docs/secrets/databases/oracle.mdx | 6 +++--- .../v1.21.x (rc)/content/docs/secrets/databases/oracle.mdx | 6 +++--- .../vault/v1.9.x/content/docs/secrets/databases/oracle.mdx | 4 ++-- 13 files changed, 29 insertions(+), 29 deletions(-) diff --git a/content/vault/v1.10.x/content/docs/secrets/databases/oracle.mdx b/content/vault/v1.10.x/content/docs/secrets/databases/oracle.mdx index 45f09bdf15..6003198510 100644 --- a/content/vault/v1.10.x/content/docs/secrets/databases/oracle.mdx +++ b/content/vault/v1.10.x/content/docs/secrets/databases/oracle.mdx @@ -53,7 +53,7 @@ you will need to enable ipc_lock capabilities for the plugin binary. 1. Download and register the plugin: ```shell - $ vault write sys/plugins/catalog/database/oracle-database-plugin \ + $ vault write sys/plugins/catalog/database/vault-plugin-database-oracle \ sha256="..." \ command=vault-plugin-database-oracle ``` @@ -62,7 +62,7 @@ you will need to enable ipc_lock capabilities for the plugin binary. ```shell $ vault write database/config/my-oracle-database \ - plugin_name=oracle-database-plugin \ + plugin_name=vault-plugin-database-oracle \ connection_url="{{username}}/{{password}}@localhost:1521/OraDoc.localhost" \ allowed_roles="my-role" \ username="VAULT_SUPER_USER" \ diff --git a/content/vault/v1.11.x/content/docs/secrets/databases/oracle.mdx b/content/vault/v1.11.x/content/docs/secrets/databases/oracle.mdx index 7c0f77dcb5..5baaa6635c 100644 --- a/content/vault/v1.11.x/content/docs/secrets/databases/oracle.mdx +++ b/content/vault/v1.11.x/content/docs/secrets/databases/oracle.mdx @@ -55,7 +55,7 @@ you will need to enable ipc_lock capabilities for the plugin binary. 1. Download and register the plugin: ```shell - $ vault write sys/plugins/catalog/database/oracle-database-plugin \ + $ vault write sys/plugins/catalog/database/vault-plugin-database-oracle \ sha256="..." \ command=vault-plugin-database-oracle ``` @@ -64,7 +64,7 @@ you will need to enable ipc_lock capabilities for the plugin binary. ```shell $ vault write database/config/my-oracle-database \ - plugin_name=oracle-database-plugin \ + plugin_name=vault-plugin-database-oracle \ connection_url="{{username}}/{{password}}@localhost:1521/OraDoc.localhost" \ allowed_roles="my-role" \ username="VAULT_SUPER_USER" \ diff --git a/content/vault/v1.12.x/content/docs/secrets/databases/oracle.mdx b/content/vault/v1.12.x/content/docs/secrets/databases/oracle.mdx index e33a37816a..865d404a10 100644 --- a/content/vault/v1.12.x/content/docs/secrets/databases/oracle.mdx +++ b/content/vault/v1.12.x/content/docs/secrets/databases/oracle.mdx @@ -95,7 +95,7 @@ you will need to enable ipc_lock capabilities for the plugin binary. 1. Download and register the plugin: ```shell-session - $ vault write sys/plugins/catalog/database/oracle-database-plugin \ + $ vault write sys/plugins/catalog/database/vault-plugin-database-oracle \ sha256="..." \ command=vault-plugin-database-oracle ``` @@ -104,7 +104,7 @@ you will need to enable ipc_lock capabilities for the plugin binary. ```shell-session $ vault write database/config/my-oracle-database \ - plugin_name=oracle-database-plugin \ + plugin_name=vault-plugin-database-oracle \ connection_url="{{username}}/{{password}}@localhost:1521/OraDoc.localhost" \ allowed_roles="my-role" \ username="VAULT_SUPER_USER" \ diff --git a/content/vault/v1.13.x/content/docs/secrets/databases/oracle.mdx b/content/vault/v1.13.x/content/docs/secrets/databases/oracle.mdx index 8479d4bd68..7e28d0bde6 100644 --- a/content/vault/v1.13.x/content/docs/secrets/databases/oracle.mdx +++ b/content/vault/v1.13.x/content/docs/secrets/databases/oracle.mdx @@ -95,7 +95,7 @@ you will need to enable ipc_lock capabilities for the plugin binary. 1. Download and register the plugin: ```shell-session - $ vault write sys/plugins/catalog/database/oracle-database-plugin \ + $ vault write sys/plugins/catalog/database/vault-plugin-database-oracle \ sha256="..." \ command=vault-plugin-database-oracle ``` @@ -104,7 +104,7 @@ you will need to enable ipc_lock capabilities for the plugin binary. ```shell-session $ vault write database/config/my-oracle-database \ - plugin_name=oracle-database-plugin \ + plugin_name=vault-plugin-database-oracle \ connection_url="{{username}}/{{password}}@localhost:1521/OraDoc.localhost" \ allowed_roles="my-role" \ username="VAULT_SUPER_USER" \ diff --git a/content/vault/v1.14.x/content/docs/secrets/databases/oracle.mdx b/content/vault/v1.14.x/content/docs/secrets/databases/oracle.mdx index 9576b5bcb2..2669f3ec98 100644 --- a/content/vault/v1.14.x/content/docs/secrets/databases/oracle.mdx +++ b/content/vault/v1.14.x/content/docs/secrets/databases/oracle.mdx @@ -95,7 +95,7 @@ you will need to enable ipc_lock capabilities for the plugin binary. 1. Download and register the plugin: ```shell-session - $ vault write sys/plugins/catalog/database/oracle-database-plugin \ + $ vault write sys/plugins/catalog/database/vault-plugin-database-oracle \ sha256="..." \ command=vault-plugin-database-oracle ``` @@ -104,7 +104,7 @@ you will need to enable ipc_lock capabilities for the plugin binary. ```shell-session $ vault write database/config/my-oracle-database \ - plugin_name=oracle-database-plugin \ + plugin_name=vault-plugin-database-oracle \ connection_url="{{username}}/{{password}}@localhost:1521/OraDoc.localhost" \ allowed_roles="my-role" \ username="VAULT_SUPER_USER" \ diff --git a/content/vault/v1.15.x/content/docs/secrets/databases/oracle.mdx b/content/vault/v1.15.x/content/docs/secrets/databases/oracle.mdx index 0629232a87..ba8e8dac6f 100644 --- a/content/vault/v1.15.x/content/docs/secrets/databases/oracle.mdx +++ b/content/vault/v1.15.x/content/docs/secrets/databases/oracle.mdx @@ -95,7 +95,7 @@ you will need to enable ipc_lock capabilities for the plugin binary. 1. Download and register the plugin: ```shell-session - $ vault write sys/plugins/catalog/database/oracle-database-plugin \ + $ vault write sys/plugins/catalog/database/vault-plugin-database-oracle \ sha256="..." \ command=vault-plugin-database-oracle ``` @@ -104,7 +104,7 @@ you will need to enable ipc_lock capabilities for the plugin binary. ```shell-session $ vault write database/config/my-oracle-database \ - plugin_name=oracle-database-plugin \ + plugin_name=vault-plugin-database-oracle \ connection_url="{{username}}/{{password}}@localhost:1521/OraDoc.localhost" \ allowed_roles="my-role" \ username="VAULT_SUPER_USER" \ diff --git a/content/vault/v1.16.x/content/docs/secrets/databases/oracle.mdx b/content/vault/v1.16.x/content/docs/secrets/databases/oracle.mdx index 731d219d82..e225b38688 100644 --- a/content/vault/v1.16.x/content/docs/secrets/databases/oracle.mdx +++ b/content/vault/v1.16.x/content/docs/secrets/databases/oracle.mdx @@ -108,7 +108,7 @@ you will need to enable ipc_lock capabilities for the plugin binary. 1. Download and register the plugin: ```shell-session - $ vault write sys/plugins/catalog/database/oracle-database-plugin \ + $ vault write sys/plugins/catalog/database/vault-plugin-database-oracle \ sha256="..." \ command=vault-plugin-database-oracle ``` @@ -117,7 +117,7 @@ you will need to enable ipc_lock capabilities for the plugin binary. ```shell-session $ vault write database/config/my-oracle-database \ - plugin_name=oracle-database-plugin \ + plugin_name=vault-plugin-database-oracle \ connection_url="{{username}}/{{password}}@localhost:1521/OraDoc.localhost" \ allowed_roles="my-role" \ username="VAULT_SUPER_USER" \ diff --git a/content/vault/v1.17.x/content/docs/secrets/databases/oracle.mdx b/content/vault/v1.17.x/content/docs/secrets/databases/oracle.mdx index 731d219d82..e225b38688 100644 --- a/content/vault/v1.17.x/content/docs/secrets/databases/oracle.mdx +++ b/content/vault/v1.17.x/content/docs/secrets/databases/oracle.mdx @@ -108,7 +108,7 @@ you will need to enable ipc_lock capabilities for the plugin binary. 1. Download and register the plugin: ```shell-session - $ vault write sys/plugins/catalog/database/oracle-database-plugin \ + $ vault write sys/plugins/catalog/database/vault-plugin-database-oracle \ sha256="..." \ command=vault-plugin-database-oracle ``` @@ -117,7 +117,7 @@ you will need to enable ipc_lock capabilities for the plugin binary. ```shell-session $ vault write database/config/my-oracle-database \ - plugin_name=oracle-database-plugin \ + plugin_name=vault-plugin-database-oracle \ connection_url="{{username}}/{{password}}@localhost:1521/OraDoc.localhost" \ allowed_roles="my-role" \ username="VAULT_SUPER_USER" \ diff --git a/content/vault/v1.18.x/content/docs/secrets/databases/oracle.mdx b/content/vault/v1.18.x/content/docs/secrets/databases/oracle.mdx index 99f11a6799..48869c22f2 100644 --- a/content/vault/v1.18.x/content/docs/secrets/databases/oracle.mdx +++ b/content/vault/v1.18.x/content/docs/secrets/databases/oracle.mdx @@ -108,7 +108,7 @@ you will need to enable ipc_lock capabilities for the plugin binary. 1. Download and register the plugin: ```shell-session - $ vault write sys/plugins/catalog/database/oracle-database-plugin \ + $ vault write sys/plugins/catalog/database/vault-plugin-database-oracle \ sha256="..." \ command=vault-plugin-database-oracle ``` @@ -117,7 +117,7 @@ you will need to enable ipc_lock capabilities for the plugin binary. ```shell-session $ vault write database/config/my-oracle-database \ - plugin_name=oracle-database-plugin \ + plugin_name=vault-plugin-database-oracle \ connection_url="{{username}}/{{password}}@localhost:1521/OraDoc.localhost" \ allowed_roles="my-role" \ username="VAULT_SUPER_USER" \ diff --git a/content/vault/v1.19.x/content/docs/secrets/databases/oracle.mdx b/content/vault/v1.19.x/content/docs/secrets/databases/oracle.mdx index 8810ba9b02..62b8e233db 100644 --- a/content/vault/v1.19.x/content/docs/secrets/databases/oracle.mdx +++ b/content/vault/v1.19.x/content/docs/secrets/databases/oracle.mdx @@ -108,7 +108,7 @@ you will need to enable ipc_lock capabilities for the plugin binary. 1. Download and register the plugin: ```shell-session - $ vault write sys/plugins/catalog/database/oracle-database-plugin \ + $ vault write sys/plugins/catalog/database/vault-plugin-database-oracle \ sha256="..." \ command=vault-plugin-database-oracle ``` @@ -117,7 +117,7 @@ you will need to enable ipc_lock capabilities for the plugin binary. ```shell-session $ vault write database/config/my-oracle-database \ - plugin_name=oracle-database-plugin \ + plugin_name=vault-plugin-database-oracle \ connection_url="{{username}}/{{password}}@localhost:1521/OraDoc.localhost" \ allowed_roles="my-role" \ username="VAULT_SUPER_USER" \ @@ -198,7 +198,7 @@ Vault does not support dynamic roles/credentials with rootless DB connections. ```shell-session $ vault write database/config/my-oracle-database \ - plugin_name="oracle-database-plugin" \ + plugin_name="vault-plugin-database-oracle" \ allowed_roles="my-role" \ connection_url="{{username}}/{{password}}@//localhost:1521/database-name" \ self_managed=true diff --git a/content/vault/v1.20.x/content/docs/secrets/databases/oracle.mdx b/content/vault/v1.20.x/content/docs/secrets/databases/oracle.mdx index ad59a883ff..d6c795870e 100644 --- a/content/vault/v1.20.x/content/docs/secrets/databases/oracle.mdx +++ b/content/vault/v1.20.x/content/docs/secrets/databases/oracle.mdx @@ -108,7 +108,7 @@ you will need to enable ipc_lock capabilities for the plugin binary. 1. Download and register the plugin: ```shell-session - $ vault write sys/plugins/catalog/database/oracle-database-plugin \ + $ vault write sys/plugins/catalog/database/vault-plugin-database-oracle \ sha256="..." \ command=vault-plugin-database-oracle ``` @@ -117,7 +117,7 @@ you will need to enable ipc_lock capabilities for the plugin binary. ```shell-session $ vault write database/config/my-oracle-database \ - plugin_name=oracle-database-plugin \ + plugin_name=vault-plugin-database-oracle \ connection_url="{{username}}/{{password}}@localhost:1521/OraDoc.localhost" \ allowed_roles="my-role" \ username="VAULT_SUPER_USER" \ @@ -198,7 +198,7 @@ Vault does not support dynamic roles/credentials with rootless DB connections. ```shell-session $ vault write database/config/my-oracle-database \ - plugin_name="oracle-database-plugin" \ + plugin_name="vault-plugin-database-oracle" \ allowed_roles="my-role" \ connection_url="{{username}}/{{password}}@//localhost:1521/database-name" \ self_managed=true diff --git a/content/vault/v1.21.x (rc)/content/docs/secrets/databases/oracle.mdx b/content/vault/v1.21.x (rc)/content/docs/secrets/databases/oracle.mdx index 8810ba9b02..62b8e233db 100644 --- a/content/vault/v1.21.x (rc)/content/docs/secrets/databases/oracle.mdx +++ b/content/vault/v1.21.x (rc)/content/docs/secrets/databases/oracle.mdx @@ -108,7 +108,7 @@ you will need to enable ipc_lock capabilities for the plugin binary. 1. Download and register the plugin: ```shell-session - $ vault write sys/plugins/catalog/database/oracle-database-plugin \ + $ vault write sys/plugins/catalog/database/vault-plugin-database-oracle \ sha256="..." \ command=vault-plugin-database-oracle ``` @@ -117,7 +117,7 @@ you will need to enable ipc_lock capabilities for the plugin binary. ```shell-session $ vault write database/config/my-oracle-database \ - plugin_name=oracle-database-plugin \ + plugin_name=vault-plugin-database-oracle \ connection_url="{{username}}/{{password}}@localhost:1521/OraDoc.localhost" \ allowed_roles="my-role" \ username="VAULT_SUPER_USER" \ @@ -198,7 +198,7 @@ Vault does not support dynamic roles/credentials with rootless DB connections. ```shell-session $ vault write database/config/my-oracle-database \ - plugin_name="oracle-database-plugin" \ + plugin_name="vault-plugin-database-oracle" \ allowed_roles="my-role" \ connection_url="{{username}}/{{password}}@//localhost:1521/database-name" \ self_managed=true diff --git a/content/vault/v1.9.x/content/docs/secrets/databases/oracle.mdx b/content/vault/v1.9.x/content/docs/secrets/databases/oracle.mdx index 2ddec03e14..e414ed47b7 100644 --- a/content/vault/v1.9.x/content/docs/secrets/databases/oracle.mdx +++ b/content/vault/v1.9.x/content/docs/secrets/databases/oracle.mdx @@ -53,7 +53,7 @@ you will need to enable ipc_lock capabilities for the plugin binary. 1. Download and register the plugin: ```shell - $ vault write sys/plugins/catalog/database/oracle-database-plugin \ + $ vault write sys/plugins/catalog/database/vault-plugin-database-oracle \ sha256="..." \ command=vault-plugin-database-oracle ``` @@ -62,7 +62,7 @@ you will need to enable ipc_lock capabilities for the plugin binary. ```shell $ vault write database/config/my-oracle-database \ - plugin_name=oracle-database-plugin \ + plugin_name=vault-plugin-database-oracle \ connection_url="{{username}}/{{password}}@localhost:1521/OraDoc.localhost" \ allowed_roles="my-role" \ username="VAULT_SUPER_USER" \