Skip to content

Commit 2bbe09f

Browse files
Adding in latest changes from repo
1 parent fba4885 commit 2bbe09f

File tree

7 files changed

+83
-15
lines changed

7 files changed

+83
-15
lines changed

content/hcp-docs/content/docs/changelog.mdx

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,9 @@ description: |-
77

88
# Changelog
99

10+
### 2025-10-03
11+
**HCP Vault 1.20.3 on AWS and Azure:** Vault 1.20.3 has started rolling out to HCP Vault Dedicated clusters on AWS and Azure. Refer to [1.20.3 Enterprise release notes](https://github.com/hashicorp/vault/blob/main/CHANGELOG.md#1203) in GitHub to learn more about what's new in 1.20.3.
12+
1013
### 2025-10-01
1114
**HCP Europe now available**: With HCP Europe, your resources are hosted, managed, and billed separately to meet European data residency requirements. For more information, refer to [HCP Europe](/hcp/docs/hcp/europe).
1215

content/hcp-docs/content/docs/packer/store/sbom.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ Refer to the [`UploadSboms` API reference](/hcp/api-docs/packer#PackerService_Up
4949

5050
You can view information about an SBOM and download SBOM files from the HCP Packer registry using the UI or the API.
5151

52-
### View packages in HCP Terraform
52+
### View packages in HCP Packer
5353

5454
In the artifact version build, HCP Packer lists all packages, their version, and the SBOM they're included in under the **Packages** section. You can filter packages by name with the **Search package names** text box.
5555

content/hcp-docs/content/docs/vault-radar/agent/deploy.mdx

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,7 @@ between secrets found by Vault Radar that are store in Vault Enterprise.
1414

1515
- Access to HCP with an account that can create service principals
1616
- Vault Radar CLI installed
17+
- `git` must be installed on the host machine(s) or image
1718
- The agent requires the following environment variables to run and connect to HCP:
1819

1920
- `HCP_CLIENT_ID`

content/hcp-docs/content/docs/vault-radar/cli/changelog.mdx

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,10 @@ description: |-
99

1010
Keep track of changes to the Vault Radar CLI
1111

12+
### 0.34.0
13+
- `scan folder` and `scan s3` support uploading results to a users HCP Vault Radar project
14+
- Minor bug fixes and performance improvementsg
15+
1216
### 0.33.0
1317
- Minor bug fixes and performance improvements
1418

content/hcp-docs/content/docs/vault-radar/cli/configuration/write-custom-ignore-rules.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,5 +40,5 @@ Create a `$HOME/.hashicorp/vault-radar/ignore.yaml` file or relative to your wor
4040
| ------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------- |
4141
| `paths` | To skip risks found in particular **files**, add the rule to `paths` section. Each entry can be a concrete file path or a glob mask. |
4242
| `secret_values` | To skip particular **values**, add the rule to `secret_values` section. Each entry is a regex, if the risk value matches the regex, it will be ignored. |
43-
| `secret_types` | To skip particular **types**, add the rule to `secret_types` section. Each entry is a regex, if the risk value matches the regex, it will be ignored. |
43+
| `secret_types` | To skip particular **types**, add the rule to `secret_types` section. You enter the secret type value in all lower case. For a full list of all event types, refer to the Event rules in the Settings section of the HCP Portal. |
4444

content/hcp-docs/content/docs/vault-radar/cli/index.mdx

Lines changed: 0 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -14,13 +14,6 @@ security vulnerability.
1414

1515
## Download and install CLI
1616

17-
<Note title="CLI download instruction">
18-
19-
Contact your customer success manager to enable HCP Vault Radar or for a license to run the
20-
CLI in offline mode.
21-
22-
</Note>
23-
2417
The HCP Vault Radar CLI is available for download from
2518
[releases.hashicorp.com/vault-radar](https://releases.hashicorp.com/vault-radar/)
2619
as a zip archive and from popular package managers. It is also available as an image

content/hcp-docs/redirects.jsonc

Lines changed: 73 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -18,16 +18,47 @@
1818
"destination": "/hcp/docs/hcp/admin/iam/users",
1919
"permanent": true,
2020
},
21+
// File moved by https://github.com/hashicorp/hcp-docs/pull/966
22+
{
23+
"source": "/hcp/docs/hcp/admin/iam/groups",
24+
"destination": "/hcp/docs/hcp/iam/groups",
25+
"permanent": true,
26+
},
27+
{
28+
"source": "/hcp/iam/sso/default-role",
29+
"destination": "/hcp/docs/hcp/iam/sso/default-role",
30+
"permanent": true,
31+
},
2132
{
2233
"source": "/hcp/docs/hcp/security/mfa",
23-
"destination": "/hcp/docs/hcp/admin/iam/mfa",
34+
"destination": "/hcp/docs/hcp/iam/mfa",
35+
"permanent": true,
36+
},
37+
{
38+
"source": "/hcp/docs/hcp/admin/iam/mfa",
39+
"destination": "/hcp/docs/hcp/iam/mfa",
40+
"permanent": true,
41+
},
42+
{
43+
"source": "/hcp/docs/hcp/admin/iam/sso/default-role",
44+
"destination": "/hcp/docs/hcp/iam/sso/default-role",
45+
"permanent": true,
46+
},
47+
{
48+
"source": "/hcp/docs/hcp/admin/iam/sso",
49+
"destination": "/hcp/docs/hcp/iam/sso",
2450
"permanent": true,
2551
},
2652
{
2753
"source": "/hcp/docs/hcp/security/service-principals",
2854
"destination": "/hcp/docs/hcp/admin/iam/service-principals",
2955
"permanent": true,
3056
},
57+
{
58+
"source": "/hcp/docs/hcp/admin/iam/service-principals",
59+
"destination": "/hcp/docs/hcp/iam/service-principal",
60+
"permanent": true,
61+
},
3162
{
3263
"source": "/hcp/docs/hcp/security/sso",
3364
"destination": "/hcp/docs/hcp/admin/iam/sso",
@@ -38,21 +69,41 @@
3869
"destination": "/hcp/docs/hcp/admin/iam/sso/sso-okta",
3970
"permanent": true,
4071
},
72+
{
73+
"source": "/hcp/docs/hcp/admin/iam/sso/sso-okta",
74+
"destination": "/hcp/docs/hcp/iam/sso",
75+
"permanent": true,
76+
},
4177
{
4278
"source": "/hcp/docs/hcp/security/sso/sso-okta-oidc",
4379
"destination": "/hcp/docs/hcp/admin/iam/sso/sso-okta-oidc",
4480
"permanent": true,
4581
},
82+
{
83+
"source": "/hcp/docs/hcp/admin/iam/sso/sso-okta-oidc",
84+
"destination": "/hcp/docs/hcp/iam/sso/setup/oidc",
85+
"permanent": true,
86+
},
4687
{
4788
"source": "/hcp/docs/hcp/security/sso/sso-aad",
4889
"destination": "/hcp/docs/hcp/admin/iam/sso/sso-aad",
4990
"permanent": true,
5091
},
92+
{
93+
"source": "/hcp/docs/hcp/admin/iam/sso/sso-aad",
94+
"destination": "/hcp/docs/hcp/iam/sso",
95+
"permanent": true,
96+
},
5197
{
5298
"source": "/hcp/docs/hcp/security/sso/sso-aad-oidc",
5399
"destination": "/hcp/docs/hcp/admin/iam/sso/sso-aad-oidc",
54100
"permanent": true,
55101
},
102+
{
103+
"source": "/hcp/docs/hcp/admin/iam/sso/sso-aad-oidc",
104+
"destination": "/hcp/docs/hcp/iam/sso/setup/oidc",
105+
"permanent": true,
106+
},
56107
{
57108
"source": "/hcp/docs/consul/specifications",
58109
"destination": "/hcp/docs/consul",
@@ -272,6 +323,11 @@
272323
"destination": "/hcp/docs/manage/channel",
273324
"permanent": true,
274325
},
326+
{
327+
"source": "/hcp/docs/manage/channel",
328+
"destination": "/hcp/docs/packer/manage/channel",
329+
"permanent": true,
330+
},
275331
{
276332
"source": "/hcp/docs/boundary/self-managed-workers/support-considerations",
277333
"destination": "hcp/docs/boundary/support-policy",
@@ -367,11 +423,11 @@
367423
"destination": "/hcp/docs/consul/dedicated/:slug*",
368424
"permanent": true,
369425
},
370-
{
371-
"source": "/hcp/docs/hcp/admin/iam/:slug*",
372-
"destination": "/hcp/docs/hcp/iam/:slug*",
373-
"permanent": true,
374-
},
426+
// {
427+
// "source": "/hcp/docs/hcp/admin/iam/:slug*",
428+
// "destination": "/hcp/docs/hcp/iam/:slug*",
429+
// "permanent": true,
430+
// },
375431
{
376432
"source": "/hcp/docs/vault-secrets/tiers-and-features",
377433
"destination":
@@ -384,6 +440,12 @@
384440
"/hcp/docs/vault-secrets/get-started/plan-implementation/constraints-limitations",
385441
"permanent": true,
386442
},
443+
{
444+
"source": "/hcp/docs/vault-secrets/get-started/plan-implementation/constraints-limitations",
445+
"destination":
446+
"/hcp/docs/vault-secrets/get-started/plan-implementation/constraints-considerations",
447+
"permanent": true,
448+
},
387449
{
388450
"source": "/hcp/docs/vault-secrets/permissions",
389451
"destination":
@@ -433,6 +495,11 @@
433495
"destination": "/hcp/docs/iam/service-principal",
434496
"permanent": true,
435497
},
498+
{
499+
"source": "/hcp/docs/iam/service-principal",
500+
"destination": "/hcp/docs/hcp/iam/service-principal",
501+
"permanent": true,
502+
},
436503
{
437504
"source": "/hcp/docs/security/audit-log/:slug",
438505
"destination": "/hcp/docs/audit-log/:slug",

0 commit comments

Comments
 (0)