Welcome to mirror list, hosted at ThFree Co, Russian Federation.

gitlab.com/gitlab-org/gitlab-foss.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
Diffstat (limited to 'doc/integration/vault.md')
-rw-r--r--doc/integration/vault.md12
1 files changed, 6 insertions, 6 deletions
diff --git a/doc/integration/vault.md b/doc/integration/vault.md
index 8bd0897548a..ea3aeeb0f64 100644
--- a/doc/integration/vault.md
+++ b/doc/integration/vault.md
@@ -30,13 +30,13 @@ The following assumes you already have Vault installed and running.
Open a terminal session and run the following command to enable the OpenID Connect authentication provider in Vault:
- ```bash
+ ```shell
vault auth enable oidc
```
You should see the following output in the terminal:
- ```bash
+ ```shell
Success! Enabled oidc auth method at: oidc/
```
@@ -48,7 +48,7 @@ The following assumes you already have Vault installed and running.
Replace `your_application_id` and `your_secret` in the example below with the application ID and secret generated for your app:
- ```bash
+ ```shell
$ vault write auth/oidc/config \
oidc_discovery_url="https://gitlab.com" \
oidc_client_id="your_application_id" \
@@ -59,7 +59,7 @@ The following assumes you already have Vault installed and running.
You should see the following output in the terminal:
- ```bash
+ ```shell
Success! Data written to: auth/oidc/config
```
@@ -69,7 +69,7 @@ The following assumes you already have Vault installed and running.
This configuration is saved under the name of the role you are creating. In this case, we are creating a `demo` role. Later, we'll show how you can access this role through the Vault CLI.
- ```bash
+ ```shell
vault write auth/oidc/role/demo \
user_claim="sub" \
allowed_redirect_uris="http://localhost:8250/oidc/callback,http://127.0.0.1:8200/ui/vault/auth/oidc/oidc/callback" \
@@ -96,7 +96,7 @@ The following assumes you already have Vault installed and running.
After writing the same configurations from above, you can run the command below in your terminal to sign in with the role configuration created in step 4 above:
- ```bash
+ ```shell
vault login -method=oidc port=8250 role=demo
```