From c858c79a5821c4bf2e3ab6760c166274e70b8840 Mon Sep 17 00:00:00 2001 From: Sebastian Luna-Valero Date: Tue, 14 May 2024 07:39:12 +0200 Subject: [PATCH] fixes #656 --- .../en/users/security/secrets-store/architecture/_index.md | 2 +- content/en/users/security/secrets-store/cli/_index.md | 6 +++--- content/en/users/security/secrets-store/gui/_index.md | 2 +- 3 files changed, 5 insertions(+), 5 deletions(-) diff --git a/content/en/users/security/secrets-store/architecture/_index.md b/content/en/users/security/secrets-store/architecture/_index.md index 005de9e75b..f1f414eef0 100644 --- a/content/en/users/security/secrets-store/architecture/_index.md +++ b/content/en/users/security/secrets-store/architecture/_index.md @@ -47,7 +47,7 @@ node endpoints is not recommended: if a server is down, its endpoint is not accessible.{{% /alert %}} For convenience and high availability, you should use the -[generic endpoint](https://vault.services.fedcloud.eu:8200) to access the +[generic endpoint](https://secrets.egi.eu) to access the service. This generic endpoint will be pointed to one of the service nodes automatically via [Dynamic DNS](../../../compute/cloud-compute/dynamic-dns/). A simple cron script periodically checks and assigns the generic hostname to diff --git a/content/en/users/security/secrets-store/cli/_index.md b/content/en/users/security/secrets-store/cli/_index.md index 793b691a82..9d2fe751dd 100644 --- a/content/en/users/security/secrets-store/cli/_index.md +++ b/content/en/users/security/secrets-store/cli/_index.md @@ -524,7 +524,7 @@ need a Vault token. You can get one from your EGI Check-in access token. To get a Vault token: ```shell -$ export VAULT_ADDR=https://vault.services.fedcloud.eu:8200 +$ export VAULT_ADDR=https://secrets.egi.eu $ export VAULT_TOKEN=$(vault write auth/jwt/login jwt=$OIDC_ACCESS_TOKEN | grep -Po 'token\s+\K[^\s]+$') ``` @@ -534,7 +534,7 @@ $ export VAULT_TOKEN=$(vault write auth/jwt/login jwt=$OIDC_ACCESS_TOKEN | To get a Vault token: ```powershell -> $env:VAULT_ADDR="https://vault.services.fedcloud.eu:8200" +> $env:VAULT_ADDR="https://secrets.egi.eu" > $env:VAULT_TOKEN=$(vault write auth/jwt/login jwt=$env:OIDC_ACCESS_TOKEN ` | Select-String -Pattern "(?<=token\s+)[^\s]+(?=$)" ` | %{$_.Matches.value}) @@ -545,7 +545,7 @@ To get a Vault token: To get a Vault token: ```shell -> set VAULT_ADDR=https://vault.services.fedcloud.eu:8200 +> set VAULT_ADDR=https://secrets.egi.eu > for /f "delims=" %a in ('vault write auth/jwt/login "jwt=%OIDC_ACCESS_TOKEN%" ^| findstr /r /c:"token[ ][ ]*[^^ ]*"') do @set VAULT_TOKEN=%a:token=% > set VAULT_TOKEN=%VAULT_TOKEN: =% ``` diff --git a/content/en/users/security/secrets-store/gui/_index.md b/content/en/users/security/secrets-store/gui/_index.md index 227af81d03..7e5adaf3e1 100644 --- a/content/en/users/security/secrets-store/gui/_index.md +++ b/content/en/users/security/secrets-store/gui/_index.md @@ -21,7 +21,7 @@ are available on the Follow the steps below to access the web interface of EGI Secrets Store: -- Open https://vault.services.fedcloud.eu:8200 in your browser. +- Open https://secrets.egi.eu in your browser. - Choose the _OIDC authentication_ method in the pulldown menu, then click _Sign in with OIDC provider_. - Login via _EGI Check-in_ and authorize the Vault GUI.