Commit Graph

223 Commits

Author SHA1 Message Date
hc-github-team-secure-vault-core
5253baaded backport of commit ac1e9194da (#24522)
Co-authored-by: benz0 <benz0@benz0.com>
2023-12-13 14:03:44 -08:00
hc-github-team-secure-vault-core
711eafa353 backport of commit c2f5ee0c62 (#23686)
Co-authored-by: Jonathan Frappier <92055993+jonathanfrappier@users.noreply.github.com>
2023-10-16 20:04:39 -04:00
hc-github-team-secure-vault-core
4c785b0584 backport of commit 1d61aeb8ae (#23251)
Co-authored-by: Sergey Kutovoy <kutovoy.s@gmail.com>
2023-09-22 15:38:46 +00:00
hc-github-team-secure-vault-core
c19522fef5 backport of commit 55414e6a73 (#23197)
Co-authored-by: Aram Mirzadeh <aram535@users.noreply.github.com>
2023-09-20 14:20:48 -07:00
hc-github-team-secure-vault-core
bd039945fb backport of commit ce2851543f (#22632)
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2023-08-29 17:49:43 -07:00
hc-github-team-secure-vault-core
62e2ccd7fd docs/mssql: update schema to be generic (#22101) (#22114)
Co-authored-by: Ellie <ellie.sterner@hashicorp.com>
2023-07-31 12:39:48 -05:00
hc-github-team-secure-vault-core
be97ab8db6 docs/mssql: add admin privileges needed (#22096) (#22103)
* docs/mssql: add admin privileges needed

* remove line

* remove ddl role

* Update website/content/docs/secrets/databases/mssql.mdx



---------

Co-authored-by: Ellie <ellie.sterner@hashicorp.com>
Co-authored-by: Jason O'Donnell <2160810+jasonodonnell@users.noreply.github.com>
2023-07-31 10:51:02 -05:00
hc-github-team-secure-vault-core
dba044da75 backport of commit 5ba848dbdd (#21991)
Co-authored-by: Jason O'Donnell <2160810+jasonodonnell@users.noreply.github.com>
2023-07-20 21:17:27 +00:00
Anton Averchenkov
46863a79a3 Backport #21426 (#21922) 2023-07-18 17:08:30 -04:00
hc-github-team-secure-vault-core
6b99ca727c backport of commit 5cbb87e052 (#20671)
Co-authored-by: Equus quagga <jan.prinsloo@hashicorp.com>
2023-05-19 02:37:06 +00:00
hc-github-team-secure-vault-core
f4ae72ac5f backport of commit 68744f8c7c (#20560)
Co-authored-by: Jonathan Frappier <92055993+jonathanfrappier@users.noreply.github.com>
2023-05-11 11:32:36 +00:00
hc-github-team-secure-vault-core
6a2297e216 backport of commit 17740fcd71 (#20529)
Co-authored-by: Jens Hofmann <je.hof@web.de>
2023-05-04 23:35:32 +00:00
hc-github-team-secure-vault-core
11b9b2db71 backport of commit df80d9a4a9 (#20449)
Co-authored-by: Jonathan Frappier <92055993+jonathanfrappier@users.noreply.github.com>
2023-05-01 15:59:27 +00:00
hc-github-team-secure-vault-core
9037c26839 backport of commit 8856cc13d3 (#20348)
Co-authored-by: Braulio Gomes Rodrigues <brauliogr@gmail.com>
2023-04-25 17:40:44 +00:00
hc-github-team-secure-vault-core
ffe7a8071b backport of commit 3e663fcb38 (#19421)
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-04-21 13:33:41 +00:00
hc-github-team-secure-vault-core
c378bca98a backport of commit 547c624e51 (#19883)
Co-authored-by: Anthony Burke <pandom@users.noreply.github.com>
2023-03-31 19:03:32 +00:00
hc-github-team-secure-vault-core
8295328e41 backport of commit b3d333b67a (#19885)
Co-authored-by: Mark Lewis <56076038+ml4@users.noreply.github.com>
2023-03-31 16:16:39 +00:00
hc-github-team-secure-vault-core
ebfff04b65 backport of commit 2834ac293d (#19824)
Co-authored-by: Robert <17119716+robmonte@users.noreply.github.com>
2023-03-29 18:33:21 +00:00
hc-github-team-secure-vault-core
1e7c7b3062 backport of commit fd422cb49a (#19639)
Co-authored-by: Tom Proctor <tomhjp@users.noreply.github.com>
2023-03-21 12:53:33 +00:00
hc-github-team-secure-vault-core
48aadc6f47 backport of commit 7f14a9e424 (#19504)
Co-authored-by: Robert <17119716+robmonte@users.noreply.github.com>
2023-03-10 15:43:21 +00:00
hc-github-team-secure-vault-core
97528fed23 backport of commit 401b338a6c (#19466)
Co-authored-by: Phil Renaud <phil@riotindustries.com>
2023-03-06 18:56:58 +00:00
hc-github-team-secure-vault-core
fa204b5ac9 backport of commit 3e4262f571 (#19455)
Co-authored-by: prabhat-hashi <111032280+prabhat-hashi@users.noreply.github.com>
2023-03-03 18:37:54 +00:00
hc-github-team-secure-vault-core
20e201bdc3 backport of commit da31528fdc (#19405)
Co-authored-by: Austin Gebauer <34121980+austingebauer@users.noreply.github.com>
2023-02-28 10:55:57 -08:00
Alexander Scheel
333816e2b0 Fix documentation on CRL fixed version (#19046)
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-02-07 20:51:03 +00:00
Alexander Scheel
589cf19e4d Add suggested root rotation procedure (#19033)
* Add suggested root rotation procedure

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Clarify docs heading

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

---------

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-02-07 13:51:33 -05:00
Alexander Scheel
5710c41944 Document pki cross cluster behavior (#19031)
* Add documentation on cross-cluster CRLs

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add missing revocation queue safety buffer

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

---------

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-02-07 11:11:33 -05:00
Bryce Kalow
79f6ff191c update learn links to point to developer locations (#19026) 2023-02-06 20:34:51 -08:00
Matt Schultz
b8e74851b3 Transit Managed Keys Documentation (#18994)
* Document 'managed_key' key type for transit. Document new 'usages' parameter when creating a managed key in the system backend.

* Document new managed key parameters for transit managed key rotation.
2023-02-03 18:49:02 -06:00
Alexander Scheel
acef4c2800 Add notes on cross cluster CRLs (#18986)
* Group CRL related sections

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Fix casing

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add notes about cluster size and revocation

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Apply suggestions from code review

Thanks Yoko!

Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>

---------

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
2023-02-03 19:51:30 +00:00
Austin Gebauer
e22e5ae9ed secrets/azure: changes permission recommendation to be minimally permissive (#18937) 2023-02-01 11:07:57 -08:00
Alexander Scheel
8e7f2076a2 Remove dynamic keys from SSH Secrets Engine (#18874)
* Remove dynamic keys from SSH Secrets Engine

This removes the functionality of Vault creating keys and adding them to
the authorized keys file on hosts.

This functionality has been deprecated since Vault version 0.7.2.

The preferred alternative is to use the SSH CA method, which also allows
key generation but places limits on TTL and doesn't require Vault reach
out to provision each key on the specified host, making it much more
secure.

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Remove dynamic ssh references from documentation

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add changelog entry

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Remove dynamic key secret type entirely

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Clarify changelog language

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add removal notice to the website

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

---------

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-01-31 16:02:22 -05:00
Ashlee M Boyer
06df5b9d95 docs: Migrate link formats (#18696)
* Adding check-legacy-links-format workflow

* Adding test-link-rewrites workflow

* Updating docs-content-check-legacy-links-format hash

* Migrating links to new format

Co-authored-by: Kendall Strautman <kendallstrautman@gmail.com>
2023-01-25 16:12:15 -08:00
Alexander Scheel
dddbdbda36 Document setting manual_chain after cross-signing (#18839)
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-01-25 16:54:14 +00:00
Tom Proctor
01c7b06f37 Docs: Add ACL hints to Consul secrets engine instructions (#18750) 2023-01-19 10:48:17 +00:00
Max Coulombe
afac0f7098 * added the new redis parameter documentation (#18752)
* added the new redis parameter documentation
* added changelog
2023-01-18 15:51:15 -05:00
Divya Pola
11dbc16b7e Add documentation for KMIP features implemented in 1.13 (#18613)
* Add documentation for KMIP features implemented in 1.13

* Add release version for key format types

* Fix syntax

* Add supported hashing algorithms and padding methods

* Fix formatting

* Add  nit picks from review feedback
2023-01-11 20:33:05 +05:30
John-Michael Faircloth
e73baa4a76 docs: db plugin add link to lease docs (#18605) 2023-01-05 16:14:54 +00:00
Robert
9c0f145ac1 secrets/gcp: add documentation for impersonated account support (#18519)
Co-authored-by: John-Michael Faircloth <fairclothjm@users.noreply.github.com>
Co-authored-by: Austin Gebauer <34121980+austingebauer@users.noreply.github.com>
2023-01-02 14:18:14 -06:00
Jagger
06ea7f8937 Fix typo (#18459)
If there are other typo related changes in flight, this fix can be included there.
2022-12-19 18:30:19 +00:00
Yoko Hyakuna
0379e56695 Update the notes about Consul Connect CA issue (#18444) 2022-12-16 10:52:42 -08:00
tjperry07
12b2fab875 remove semi colon (#18220) 2022-12-02 16:02:28 -05:00
Sudharshan K S
6ec43e6039 Update nomad.mdx (#18134)
Corrected a typo
2022-11-29 09:39:15 -08:00
Chris Capurso
7d9bc82bee Add Consul Dataplane compatibility info to docs (#18041)
* add compatibility info to consul service reg docs

* fix alert formatting

* add consul dataplane compatibility partial

* add compat partial to more consul doc pages

* fix links
2022-11-22 08:56:18 -05:00
Yoko Hyakuna
8d14e54b8c Add known issue about PKI secrets engine with Consul (#18003)
* Add known issue about PKI secrets engine with Consul

* Added KB article URL

* Update website/content/docs/secrets/pki/index.mdx

Co-authored-by: Jared Kirschner <85913323+jkirschner-hashicorp@users.noreply.github.com>

Co-authored-by: Jared Kirschner <85913323+jkirschner-hashicorp@users.noreply.github.com>
2022-11-17 10:09:41 -08:00
Alexander Scheel
487f9bebe1 Fix docs by adding self-closing BRs (#17958)
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2022-11-16 10:01:43 -05:00
Alexander Scheel
5cfb477049 Clarify more documentation on audit logging (#17957)
Thanks to Khai Tran for identifying that syslogging has a lower limit
on message size and sometimes large CRLs can hit that limit.

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2022-11-16 09:21:29 -05:00
Alexander Scheel
5fd3c6db47 Docs clarifications around PKI considerations (#17916)
* Add clarifications on revocation

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Talk about rationale for separating roots from intermediates

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2022-11-15 08:43:40 -05:00
Alexander Scheel
866a47d154 PKI - Fix order of chain building writes (#17772)
* Ensure correct write ordering in rebuildIssuersChains

When troubleshooting a recent migration failure from 1.10->1.11, it was
noted that some PKI mounts had bad chain construction despite having
valid, chaining issuers. Due to the cluster's leadership trashing
between nodes, the migration logic was re-executed several times,
partially succeeding each time. While the legacy CA bundle migration
logic was written with this in mind, one shortcoming in the chain
building code lead us to truncate the ca_chain: by sorting the list of
issuers after including non-written issuers (with random IDs), these
issuers would occasionally be persisted prior to storage _prior_ to
existing CAs with modified chains.

The migration code carefully imported the active issuer prior to its
parents. However, due to this bug, there was a chance that, if write to
the pending parent succeeded but updating the active issuer didn't, the
active issuer's ca_chain field would only contain the self-reference and
not the parent's reference as well. Ultimately, a workaround of setting
and subsequently unsetting a manual chain would force a chain
regeneration.

In this patch, we simply fix the write ordering: because we need to
ensure a stable chain sorting, we leave the sort location in the same
place, but delay writing the provided referenceCert to the last
position. This is because the reference is meant to be the user-facing
action: without transactional write capabilities, other chains may
succeed, but if the last user-facing action fails, the user will
hopefully retry the action. This will also correct migration, by
ensuring the subsequent issuer import will be attempted again,
triggering another chain build and only persisting this issuer when
all other issuers have also been updated.

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Remigrate ca_chains to fix any missing issuers

In the previous commit, we identified an issue that would occur on
legacy issuer migration to the new storage format. This is easy enough
to detect for any given mount (by an operator), but automating scanning
and remediating all PKI mounts in large deployments might be difficult.

Write a new storage migration version to regenerate all chains on
upgrade, once.

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add changelog entry

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add issue to PKI considerations documentation

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Correct %v -> %w in chain building errs

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2022-11-03 11:50:03 -04:00
Mark Lewis
080133efce Update signed-ssh-certificates.mdx (#17746)
* Update signed-ssh-certificates.mdx

Add a pointer to the doc regarding reading back the pub key with the CLI

* Update website/content/docs/secrets/ssh/signed-ssh-certificates.mdx

Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
2022-10-31 12:33:46 -04:00
Bryce Kalow
47875daf53 website: fixes redirected links (#17574)
* fixes redirected links

* fix broken link to key wrapping guide
2022-10-18 14:06:27 -04:00