5
0
Fork 0
mirror of https://github.com/hashicorp/vault-action.git synced 2025-11-07 07:06:56 +00:00

docs: promote non-key syntax sections

This commit is contained in:
Richard Simpson 2020-03-11 14:12:53 -05:00
parent 198a7ed7d2
commit cb2908ac94

View file

@ -18,7 +18,7 @@ By default, this action pulls from [Version 2](https://www.vaultproject.io/docs
- [Adding Extra Headers](#adding-extra-headers)
- [Vault Enterprise Features](#vault-enterprise-features)
- [Namespace](#namespace)
- [Masking](#masking)
- [Mashing - Secrets in Logs](#mashing---secrets-in-logs)
<!-- /TOC -->
@ -149,7 +149,7 @@ with:
kv-version: 1
```
### Custom K/V Engine Path
## Custom K/V Engine Path
When you enable the K/V Engine, by default it's placed at the path `secret`, so a secret named `ci` will be accessed from `secret/ci`. However, [if you enabled the secrets engine using a custom `path`](https://www.vaultproject.io/docs/commands/secrets/enable/#inlinecode--path-4), you
can pass it as follows:
@ -162,7 +162,7 @@ with:
This way, the `ci` secret in the example above will be retrieved from `my-secrets/ci`.
### Other Secret Engines
## Other Secret Engines
While this action primarily supports the K/V engine, it is possible to request secrets from other engines in Vault.
@ -220,7 +220,7 @@ would work fine.
NOTE: The `Secret Key` is pulled from the `data` property of the response.
### Adding Extra Headers
## Adding Extra Headers
If you ever need to add extra headers to the vault request, say if you need to authenticate with a firewall, all you need to do is set `extraHeaders`:
@ -258,6 +258,6 @@ steps:
ci npm_token
```
## Masking
## Mashing - Secrets in Logs
This action uses Github Action's built in masking, so all variables will automatically be masked if printed to the console or to logs.
This action uses Github Action's built in masking, so all variables will automatically be masked (aka hidden) if printed to the console or to logs.