* Update oracle-tde.mdx to remove deprecated sqlnet.ora configuration steps
* Remove text regarding updating sqlnet.ora in the Enable TDE section.
* Add steps to set the wallet location using parameters.
* Update Oracle Documentation references from 12c docs to 19c docs.
* Update website/content/docs/enterprise/pkcs11-provider/oracle-tde.mdx
---------
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
* Fix link formatting in Vault lambda extension docs
The link pointing to supported lambda runtimes does not use correct markdown formatting so it is not rendered as a link on developer.hashicorp.com. This commit renders it as a link again.
* Add changelog entry
---------
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
* add escape hatch to use feature flag for reversion of audit behavior
* Setup pipeline which ends with a NoopSink
* explicitly call out old way of running test
* old behavior for audit trail tests
* More manual forcing of tests to legacy audit system
* Add NOTE: to suggest that the feature flag is temporary
* Clarify Tokens use and structure recommendation
* Update website/content/docs/concepts/tokens.mdx
---------
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
* add a test to show the bug
* do not output a "Success!" message if a specific field was requested
* Create 21545.txt
* Fix changelog name
---------
Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
* Add api-docs for PKI CIEPS sign-intermediate
- This adds the CIEPS sign-intermediate api-docs and tweaks the existing CIEPS apis to mark the policy url argument as optional.
* Define CIEPS in the first use per section
* Add Alicia's edits to clarify log timing and other details
* Update website/content/docs/enterprise/license/utilization-reporting.mdx
---------
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
* updated the clarification note for performance_multiplier
* Put some original text related to performance_multiplier back.
* Update website/content/docs/configuration/storage/raft.mdx
Force committing TW suggestions as PR appears abandoned
* Update website/content/docs/configuration/storage/raft.mdx
Force committing TW suggestions as PR appears abandoned
---------
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
* Prevent a deadlock that occurs when Restore grabs lease lock then pending lock, while a revocationJob's OnFailure grabs those lock in the reverse order.
* Fix lock
* Add CL
* Grab lock before markLeaseIrrevocable
---------
Co-authored-by: hc-github-team-secure-vault-core <github-team-secure-vault-core@hashicorp.com>
* Update JWT docs to not recommend `-path` for `vault write
`-path` is valid for `vault login`, but not for `vault write` leading to confusion when trying to log in to using the JWT backend using the CLI.
* Update website/content/docs/auth/jwt/index.mdx
---------
Co-authored-by: tjperry07 <tjperry07@users.noreply.github.com>
Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
Clarification added by a customer's request, as tls_disable_client_certs being set to false was found to also be necessary for TLS cert authentication.
* Support GET requests for aws-iam
This is required to support presigned requests from aws-sdk-go-v2
* Add GET method tests for aws-iam auth login path
* Update Website Documenation
* Validate GET action even if iam-server header is not set
* Combine URL checks
* Add const amzSignedHeaders to aws credential builtin
* Add test for multiple GET request actions
* Add Changelog Entry
---------
Co-authored-by: Max Coulombe <109547106+maxcoulombe@users.noreply.github.com>
* add description for vaultsharp
calling our features and cross platform capabilities along with Enterprise Vault support for enterprise vault users
* Update libraries.mdx for VaultSharp description
---------
Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
* Correct doctype
This is not a valid doctype, the 'lang' belongs to the html element.
* Create 22153.txt
---------
Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
* Add metadata policy requirement for KV-V2 list.mdx
Customer requested change as our API docs page does not state the token policy must have access to metadata in the policy when listing KV-V2 secrets. I let them know it exists here: https://developer.hashicorp.com/vault/docs/secrets/kv/kv-v2#acl-rules, in the ACL section, but they wanted to have it added to the API docs as well.
* Update website/content/api-docs/secret/kv/kv-v2.mdx
---------
Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>