Skip to content

Commit a73a23c

Browse files
authored
Merge pull request #494 from smallstep/carl/link-fixes
Link checker tweaks
2 parents 63979d5 + 5281cc5 commit a73a23c

3 files changed

Lines changed: 12 additions & 6 deletions

File tree

.github/mdl.config.json

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,6 +33,9 @@
3333
{
3434
"pattern": "^https://admin.google.com"
3535
},
36+
{
37+
"pattern": "^https://trustedcomputinggroup.org"
38+
},
3639
{
3740
"pattern": "^https://azure.microsoft.com"
3841
},
@@ -43,14 +46,17 @@
4346
"pattern": "^https://.*freedesktop.org"
4447
},
4548
{
46-
"pattern": "^https://www.hashicorp.com"
49+
"pattern": "^https://.*.hashicorp.com"
4750
},
4851
{
4952
"pattern": "^https://github.com/Neilpang/acme.sh/issues/2422"
5053
},
5154
{
5255
"pattern": "^https://arubanetworking.hpe.com"
5356
},
57+
{
58+
"pattern": "^mailto:.*"
59+
},
5460
{
5561
"pattern": "^https://www.w3.org"
5662
}

step-ca/registration-authority-ra-mode.mdx

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -331,7 +331,7 @@ you'll need to set up your Google Cloud project using the `gcloud` CLI:
331331
## Hashicorp Vault RA mode
332332

333333
The RA mode in `step-ca` can peer with Vault's PKI secrets engine, using it as an upstream CA.
334-
From the [Vault Documentation](https://www.vaultproject.io/docs/secrets/pki):
334+
From the [Vault Documentation](https://developer.hashicorp.com/vault/docs/secrets/pki):
335335

336336
> "The PKI secrets engine generates dynamic X.509 certificates. With this secrets engine, services can get certificates without going through the usual manual process of generating a private key and CSR, submitting to a CA, and waiting for a verification and signing process to complete."
337337
@@ -343,7 +343,7 @@ Then we'll configure `step-ca`'s RA mode to use Vault to sign certificates.
343343
### Requirements
344344

345345
* [`step-ca`](https://smallstep.com/docs/step-ca/installation)
346-
* A [Hashicorp Vault](https://learn.hashicorp.com/tutorials/vault/getting-started-deploy) server
346+
* A [Hashicorp Vault](https://developer.hashicorp.com/vault/install) server
347347
* The [`jq`](https://jqlang.github.io/jq/) tool to parse JSON output
348348

349349
### Creating a Vault PKI
@@ -354,7 +354,7 @@ For a proof of concept, you can run `vault server -dev` in a terminal window to
354354

355355
In production, you'll need to run Vault as a daemon and use HTTPS.
356356
Vault supports both server TLS verification, and mutual TLS authentication.
357-
See Vault's [Environment Variables](https://www.vaultproject.io/docs/commands#environment-variables) documentation for more.
357+
See Vault's [Environment Variables](https://developer.hashicorp.com/vault/docs/commands#configure-environment-variables) documentation for more.
358358

359359
If you're running Vault in dev mode, set `VAULT_ADDR`:
360360

@@ -479,7 +479,7 @@ vault policy write smallstep policy.hcl
479479
In this example, Vault will sign certificates of all three key types for the RA server: EC, RSA, and Ed25519.
480480
EC must always be enabled, because it's required for `step-ca`'s internal TLS certificate.
481481
However, if your PKI will not use RSA or Ed25519, please restrict your Vault policy to the key types you will use.
482-
Vault's [Policy documentation](https://www.vaultproject.io/docs/concepts/policies) describes the policy langauge used by Vault.
482+
Vault's [Policy documentation](https://developer.hashicorp.com/vault/docs/concepts/policies) describes the policy langauge used by Vault.
483483

484484
#### 4. Enable Vault authentication for your RA.
485485

tutorials/ssh-certificate-login.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ OpenSSH and SSHD have supported SSH certificate login for almost ten years. In t
2525

2626
- **Open Source -** This tutorial assumes you have initialized and started up a `step-ca`instance using the steps in [Getting Started](../step-ca/getting-started.mdx).
2727
- **[Smallstep Certificate Manager](https://smallstep.com/certificate-manager) -** Please contact [Smallstep Customer Success](mailto:support@smallstep.com) if you would like to activate SSH certificates on your Certificate Manager account.
28-
- [Vagrant](https://www.vagrantup.com/docs/installation)
28+
- [Vagrant](https://developer.hashicorp.com/vagrant/docs/installation)
2929

3030

3131
## Overview

0 commit comments

Comments
 (0)