* VAULT-21427 change ui references from K/V to KV
* references in docs/
* website json data
* go command errors
* replace Key/Value with Key Value
* add changelog
* update test
* update secret list header badge
* two more test updates
Adding an overview doc for using AWS auth with Vault Secrets Operator
under Secret Sources/Vault/Auth Methods/.
Had to move the AWS and GCP auth pages down one directory to get
around a "mismatched parent directories" error.
---------
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
Added clarification for 32 character limit on STS tokens.
Forcing suggestion commit so we can merge and publish the changes.
---------
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
* Added `vault operator raft snapshot inspect` usage
* Update website/content/docs/commands/operator/raft.mdx
Forcing suggestion commit so we can merge and publish the changes.
---------
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
* Creating a Vault version explainer
The explainer is a partial that can be used on multiple pages. It gives an overview of our policies and version format and offers some recommendations about staying current.
* Apostrophe typo
Not saying I got all the typos, but got one anyway.
* Add a note about the very rare 4th digit
* Conform to subtitle best practices
Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
---------
Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
* fix -log-file so that it uses the correct name and only adds timestamps on rotation
* added some tests for naming/rotation
* changelog
* revert to previous way of getting created time
* remove unused stat
* comment shuffle
* Update changelog/24297.txt
Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
* Update website/content/docs/agent-and-proxy/agent/index.mdx
Update 'agent' docs page
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
* Update website/content/docs/agent-and-proxy/proxy/index.mdx
Update 'proxy' docs page
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
* Update website/content/docs/commands/server.mdx
Update 'server' docs page
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
* fix typos
---------
Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
* Pulls in github.com/go-secure-stdlib/plugincontainer@v0.3.0 which exposes a new `Config.Rootless` option to opt in to extra container configuration options that allow establishing communication with a non-root plugin within a rootless container runtime.
* Adds a new "rootless" option for plugin runtimes, so Vault needs to be explicitly told whether the container runtime on the machine is rootless or not. It defaults to false as rootless installs are not the default.
* Updates `run_config.go` to use the new option when the plugin runtime is rootless.
* Adds new `-rootless` flag to `vault plugin runtime register`, and `rootless` API option to the register API.
* Adds rootless Docker installation to CI to support tests for the new functionality.
* Minor test refactor to minimise the number of test Vault cores that need to be made for the external plugin container tests.
* Documentation for the new rootless configuration and the new (reduced) set of restrictions for plugin containers.
* As well as adding rootless support, we've decided to drop explicit support for podman for now, but there's no barrier other than support burden to adding it back again in future so it will depend on demand.
Adding overview docs for using GKE workload identity with Vault
Secrets Operator under Secret Sources/Vault/Auth Methods/. Updates the
Vault Auth method section in the Vault/Auth Methods overview page with
links to the VSO API sections for the other supported auth methods
(until they have their own pages).
---------
Co-authored-by: Tom Proctor <tomhjp@users.noreply.github.com>
* remove partial references from release-notes that link to upgrade guides, and change link in partial to anchor
* Clarify leak is memory consumption
There is no leak of information.
* update references in table
* update table to include range for affected versions
---------
Co-authored-by: Meggie Ladlow <meggie@hashicorp.com>
* update known issue
* update known issue partial
* fix links
* Update website/content/partials/known-issues/ephemeral-loggers-memory-leak.mdx
Co-authored-by: Mike Palmiotto <mike.palmiotto@hashicorp.com>
* standardize on sub-loggers
* update known issue
* update versions
* update messaging to include reference to previous known issue
---------
Co-authored-by: Mike Palmiotto <mike.palmiotto@hashicorp.com>
* VAULT-19278 First draft of static secret caching docs
* VAULT-19278 Add warning to Agent docs, fix capitalization
* VAULT-19278 typos/formatting
* VAULT-19278 changelog
* VAULT-19278 update based on PR feedback
* VAULT-19278 review feedback
* VAULT-19278 Update based on review
* VAULT-19278 update based on PR feedback
* VAULT-19278 incorporate a lot of PR feedback
* VAULT-19278 Rest of the suggestions
* VAULT-19278 I missed a suggestion
* VAULT-19278 More updates
* VAULT-19278 add docs for disable dynamic secret caching
* VAULT-19278 update changelog
* VAULT-19278 update based on comments
* server: fix bug where deadlock detection was on for expiration and quotas
* trim spaces
* Add tests
* Use trimspace and lower
* Update test
* changelog
* fix config parsing