Skip to content

Commit 2a4ec69

Browse files
(DOCSP-23247): Fix URL structures (#1255)
* (DOCSP-23247): Fix URL structures * adjust refs to fix build errors * review feedback
1 parent bb4edce commit 2a4ec69

28 files changed

+44
-46
lines changed

config/redirects

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2012,6 +2012,8 @@ raw: ${prefix}/${version}/applications/drivers -> ${base}/drivers/
20122012
(v5.3-*]: ${prefix}/${version}/tutorial/manage-client-side-encryption-data-keys -> ${base}/${version}/core/csfle/fundamentals/manage-keys
20132013
(v5.3-*]: ${prefix}/${version}/reference/security-client-side-encryption-limitations -> ${base}/${version}/core/csfle/reference/limitations
20142014
(v5.3-*]: ${prefix}/${version}/reference/security-client-side-query-aggregation-support -> ${base}/${version}/core/csfle/reference/supported-operations
2015+
(v5.3-*]: ${prefix}/${version}/reference/security-client-side-encryption -> ${base}/${version}/core/csfle
2016+
(v5.3-*]: ${prefix}/${version}/core/queryable-encryption/queryable-encryption/ -> ${base}/${version}/core/queryable-encryption
20152017

20162018
# CSFLE Cleanup Redirects for versions 5.3 and earlier
20172019

@@ -2037,3 +2039,4 @@ raw: ${prefix}/${version}/applications/drivers -> ${base}/drivers/
20372039
[*-v5.3]: ${prefix}/${version}/core/csfle/reference/cryptographic-primitives/ -> ${base}/${version}/core/security-client-side-encryption
20382040
[*-v5.3]: ${prefix}/${version}/core/csfle/reference/cryptographic-primitives/ -> ${base}/${version}/core/security-client-side-encryption
20392041
[*-v5.3]: ${prefix}/${version}/core/csfle/reference/mongocryptd/ -> ${base}/${version}/reference/security-client-side-encryption-appendix/
2042+
[*-v5.3]: ${prefix}/${version}/core/queryable-encryption -> ${base}/${version}/core/security-client-side-encryption

snooty.toml

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -47,6 +47,7 @@ toc_landing_pages = [
4747
"/core/authorization",
4848
"/core/backups",
4949
"/core/crud",
50+
"/core/csfle",
5051
"/core/csfle/fundamentals/",
5152
"/core/csfle/reference",
5253
"/core/csfle/tutorials",
@@ -67,11 +68,8 @@ toc_landing_pages = [
6768
"/core/replica-set-high-availability",
6869
"/core/replica-set-members",
6970
"/core/replica-set-secondary",
70-
"/core/security-automatic-client-side-encryption",
71-
"/core/security-client-side-encryption-key-management",
72-
"/core/security-client-side-encryption",
7371
"/core/security-encryption-at-rest",
74-
"/core/queryable-encryption/queryable-encryption/",
72+
"/core/queryable-encryption/",
7573
"/core/queryable-encryption/fundamentals/",
7674
"/core/queryable-encryption/tutorials/",
7775
"/core/queryable-encryption/reference/",

source/administration/security-checklist.txt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,7 @@ Pre-production Checklist/Considerations
9696
MongoDB data using file-system permissions. MongoDB data includes data
9797
files, configuration files, auditing logs, and key files.
9898

99-
- You can use :doc:`/core/security-client-side-encryption` to encrypt
99+
- You can use :ref:`manual-csfle-feature` to encrypt
100100
fields in documents application-side prior to transmitting data over
101101
the wire to the server.
102102

source/core/csfle/install.txt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Before you can use {+csfle-abbrev+}, you must set up the following items
2626
in your development environment:
2727

2828
- Install :manual:`MongoDB Enterprise Edition version 4.2 or later </installation/#mongodb-enterprise-edition-installation-tutorials>`.
29-
- Install a :manual:`MongoDB Driver Compatible with CSFLE </core/security-client-side-encryption/#driver-compatibility-table>`.
29+
- Install a :ref:`MongoDB Driver Compatible with CSFLE <csfle-driver-compatibility>`.
3030
- Install `OpenSSL <https://www.openssl.org/source/>`__ *optional*.
3131
- Start a
3232
:manual:`MongoDB instance </tutorial/manage-mongodb-processes/#start-mongod-processes>`

source/core/queryable-encryption/features.txt

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,8 +31,8 @@ randomized encryption, while maintaining equality queryability.
3131
Sensitive data is transparently encrypted and decrypted by the client
3232
and only communicated to and from the server in encrypted form.
3333

34-
Unlike :manual:`Client-Side Field Level Encryption </core/security-client-side-encryption>`
35-
that can use :manual:`Deterministic Encryption </core/security-client-side-encryption#deterministic-encryption>`,
34+
Unlike :ref:`Client-Side Field Level Encryption <manual-csfle-feature>`
35+
that can use :ref:`Deterministic Encryption <csfle-deterministic-encryption>`,
3636
{+qe+} uses fast, searchable encryption schemes that always encrypt a
3737
given input value to a different encrypted output value.
3838

source/core/security-encryption-at-rest.txt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -185,7 +185,7 @@ per-document basis within the application layer.
185185

186186
MongoDB 4.2-series drivers provides a client-side field level
187187
encryption framework. For more information, see
188-
:doc:`/core/security-client-side-encryption`.
188+
:ref:`manual-csfle-feature`.
189189

190190
To encrypt full documents, write custom encryption and decryption
191191
routines or use a commercial solution.

source/core/security-in-use-encryption.txt

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,5 +11,5 @@ In-Use Encryption
1111
.. toctree::
1212
:titlesonly:
1313

14-
/core/queryable-encryption/queryable-encryption
15-
/core/security-client-side-encryption
14+
/core/queryable-encryption
15+
/core/csfle

source/core/timeseries/timeseries-limitations.txt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ The following features are not supported for
2626

2727
* :atlas:`Atlas Search </atlas-search>`
2828
* :doc:`Change streams </changeStreams>`
29-
* :doc:`Client-side field level encryption </core/security-client-side-encryption>`
29+
* :ref:`{+csfle+} <manual-csfle-feature>`
3030
* :realm:`Database Triggers </triggers/database-triggers>`
3131
* :realm:`GraphQL API </graphql>`
3232
* :realm:`Realm Sync </sync>`

source/includes/extracts-client-side-field-level-encryption.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ content: |
4040
.. warning::
4141
4242
Do not drop the unique index created by :method:`getKeyVault()`.
43-
Client-side field level encryption operations depend on
43+
{+csfle+} operations depend on
4444
server-enforced uniqueness of ``keyAltNames``. Removing the index
4545
may lead to unexpected or unpredictable behavior.
4646
@@ -131,4 +131,4 @@ content: |
131131
4.2.1 legacy :binary:`~bin.mongo` shell do not support the AWS KMS
132132
service due to an unexpected change in the KMS response object.
133133
See :issue:`SERVER-44721` for more information.
134-
...
134+
...

source/includes/steps-csfle-shell-aws-create-key.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,7 @@ content: |
108108
109109
.. important::
110110
111-
Client-side field level encryption depends on server-enforced
111+
{+csfle+} depends on server-enforced
112112
uniqueness of key alternate names. :method:`getKeyVault()`
113113
creates a :ref:`unique index <index-type-unique>` on
114114
``keyAltNames`` if one does not exist. Do **not** drop the

source/includes/steps-csfle-shell-aws-manage-key-altname.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ content: |
4242
Add Key Alternate Name
4343
.. important::
4444
45-
Client-side field level encryption depends on server-enforced
45+
{+csfle+} depends on server-enforced
4646
uniqueness of key alternate names. Validate that a unique
4747
index exists on ``keyAltNames`` **prior** to adding a new
4848
key alternate name. If the unique index was dropped, you *must*

source/includes/steps-csfle-shell-azure-create-key.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ content: |
107107
108108
.. important::
109109
110-
Client-side field level encryption depends on server-enforced
110+
{+csfle+} depends on server-enforced
111111
uniqueness of key alternate names. :method:`getKeyVault()`
112112
creates a :ref:`unique index <index-type-unique>` on
113113
``keyAltNames`` if one does not exist. Do **not** drop the

source/includes/steps-csfle-shell-azure-manage-key-altname.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ content: |
4242
Add Key Alternate Name
4343
.. important::
4444
45-
Client-side field level encryption depends on server-enforced
45+
{+csfle+} depends on server-enforced
4646
uniqueness of key alternate names. Validate that a unique
4747
index exists on ``keyAltNames`` **prior** to adding a new
4848
key alternate name. If the unique index was dropped, you *must*

source/includes/steps-csfle-shell-gcp-create-key.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -104,7 +104,7 @@ content: |
104104
105105
.. important::
106106
107-
Client-side field level encryption depends on server-enforced
107+
{+csfle+} depends on server-enforced
108108
uniqueness of key alternate names. :method:`getKeyVault()`
109109
creates a :ref:`unique index <index-type-unique>` on
110110
``keyAltNames`` if one does not exist. Do **not** drop the

source/includes/steps-csfle-shell-gcp-manage-key-altname.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ content: |
4242
Add Key Alternate Name
4343
.. important::
4444
45-
Client-side field level encryption depends on server-enforced
45+
{+csfle+} depends on server-enforced
4646
uniqueness of key alternate names. Validate that a unique
4747
index exists on ``keyAltNames`` **prior** to adding a new
4848
key alternate name. If the unique index was dropped, you *must*

source/includes/steps-csfle-shell-local-create-key.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -119,7 +119,7 @@ content: |
119119
120120
.. important::
121121
122-
Client-side field level encryption depends on server-enforced
122+
{+csfle+} depends on server-enforced
123123
uniqueness of key alternate names. :method:`getKeyVault()`
124124
creates a :ref:`unique index <index-type-unique>` on
125125
``keyAltNames`` if one does not exist. Do **not** drop the

source/includes/steps-csfle-shell-local-manage-key-altname.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ content: |
5050
Add Key Alternate Name
5151
.. important::
5252
53-
Client-side field level encryption depends on server-enforced
53+
{+csfle+} depends on server-enforced
5454
uniqueness of key alternate names. Validate that a unique
5555
index exists on ``keyAltNames`` **prior** to adding a new
5656
key alternate name. If the unique index was dropped, you *must*

source/index.txt

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -147,12 +147,13 @@ Work with your data in MongoDB
147147

148148
.. step:: Encrypt your most sensitive data
149149

150-
Client-side field level encryption protects data while it is
150+
{+csfle+} protects data while it is
151151
in-use by the database. Fields are encrypted before they
152152
leave your application, protecting them over the network, in
153153
memory and at rest.
154154

155-
:doc:`To learn more, see Client-Side Field Level Encryption </core/security-client-side-encryption>`
155+
To learn more, see :ref:`Client-Side Field Level Encryption
156+
<manual-csfle-feature>`.
156157

157158
.. image:: /images/security.png
158159
:alt: MongoDB Security

source/reference/method/KeyVault.createDataKey.txt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ KeyVault.createDataKey()
1515
.. method:: KeyVault.createDataKey(keyManagementService, customerMasterKey, ["keyAltName"])
1616

1717
Adds a data encryption key to the key vault associated to the
18-
database connection. :ref:`Client-side field level encryption
18+
database connection. :ref:`{+csfle+}
1919
<csfle-guide-intro>` uses data encryption keys
2020
for supporting encryption and decryption of field values.
2121

source/reference/method/KeyVault.createKey.txt

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,9 +17,9 @@ KeyVault.createKey()
1717
.. method:: KeyVault.createKey(keyManagementService, customerMasterKey, ["keyAltName"])
1818

1919
Adds a data encryption key to the key vault associated to the
20-
database connection. :doc:`Client-side field level encryption
21-
</core/security-client-side-encryption>` uses data encryption keys
22-
for supporting encryption and decryption of field values.
20+
database connection. :ref:`{+csfle+}
21+
<manual-csfle-feature>` uses data encryption keys for supporting
22+
encryption and decryption of field values.
2323

2424
:method:`~KeyVault.createKey()` has the following syntax:
2525

source/reference/method/Mongo.txt

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ Description
5151
.. versionadded:: 4.2
5252

5353
Configuration parameters for enabling
54-
:doc:`/core/security-client-side-encryption`.
54+
:ref:`manual-csfle-feature`.
5555

5656
``ClientSideFieldLevelEncryptionOptions`` overrides the
5757
existing client-side field level encryption configuration of
@@ -75,7 +75,7 @@ Description
7575
.. versionadded:: 4.2
7676

7777
The ``ClientSideFieldLevelEncryptionOptions`` document specifies
78-
configuration options for :doc:`/core/security-client-side-encryption`.
78+
configuration options for :ref:`manual-csfle-feature`.
7979
If the database connection has an existing client-side field level
8080
encryption configuration, specifying
8181
``ClientSideFieldLevelEncryptionOptions`` overrides that configuration.
@@ -155,7 +155,7 @@ following parameters:
155155
field level encryption uses the CMK for encrypting and decrypting
156156
data encryption keys.
157157

158-
Client-side field level encryption supports the following KMS
158+
{+csfle+} supports the following KMS
159159
providers:
160160

161161
- :ref:`Amazon Web Services KMS <field-level-encryption-aws-kms>`

source/reference/method/getClientEncryption.txt

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -14,11 +14,10 @@ getClientEncryption()
1414

1515
.. method:: getClientEncryption()
1616

17-
Returns the ``ClientEncryption`` object for the current database collection.
18-
The ``ClientEncryption`` object supports explicit (manual) encryption
19-
and decryption of field values for
20-
:doc:`Client-Side field level encryption
21-
</core/security-client-side-encryption>`.
17+
Returns the ``ClientEncryption`` object for the current database
18+
collection. The ``ClientEncryption`` object supports explicit
19+
(manual) encryption and decryption of field values for
20+
:ref:`Client-Side field level encryption <manual-csfle-feature>`.
2221

2322
:method:`getClientEncryption()` has the following syntax:
2423

source/reference/method/getKeyVault.txt

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,8 +16,7 @@ getKeyVault()
1616

1717
Returns the ``KeyVault`` object for the current database connection.
1818
The ``KeyVault`` object supports data encryption key management for
19-
:doc:`Client-side field level encryption
20-
</core/security-client-side-encryption>`.
19+
:ref:`{+csfle+} <manual-csfle-feature>`.
2120

2221
:method:`getKeyVault()` has the following syntax:
2322

source/reference/program/mongo.txt

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -933,7 +933,7 @@ Client-Side Field Level Encryption Options
933933
AWS Key Management Service (KMS). The :program:`mongo` shell uses the specified
934934
:option:`--awsAccessKeyId` to access the KMS.
935935

936-
:option:`--awsAccessKeyId` is required for enabling :doc:`/core/security-client-side-encryption`
936+
:option:`--awsAccessKeyId` is required for enabling :ref:`manual-csfle-feature`
937937
for the :program:`mongo` shell session. :option:`--awsAccessKeyId` requires *all* of the following
938938
command line options:
939939

@@ -953,7 +953,7 @@ Client-Side Field Level Encryption Options
953953
An AWS `Secret Key <https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_access-keys.html>`__
954954
associated to the specified :option:`--awsAccessKeyId`.
955955

956-
:option:`--awsSecretAccessKey` is required for enabling :doc:`/core/security-client-side-encryption`
956+
:option:`--awsSecretAccessKey` is required for enabling :ref:`manual-csfle-feature`
957957
for the :program:`mongo` shell session. :option:`--awsSecretAccessKey` requires *all* of the following
958958
command line options:
959959

@@ -973,7 +973,7 @@ Client-Side Field Level Encryption Options
973973
An AWS `Session Token <https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_access-keys.html>`__
974974
associated to the specified :option:`--awsAccessKeyId`.
975975

976-
:option:`--awsSessionToken` is required for enabling :doc:`/core/security-client-side-encryption`
976+
:option:`--awsSessionToken` is required for enabling :ref:`manual-csfle-feature`
977977
for the :program:`mongo` shell session. :option:`--awsSessionToken` requires *all* of the following
978978
command line options:
979979

@@ -992,7 +992,7 @@ Client-Side Field Level Encryption Options
992992

993993

994994
The full namespace (``<database>.<collection>``) of the collection used as a
995-
key vault for :doc:`/core/security-client-side-encryption`. :option:`--keyVaultNamespace` is
995+
key vault for :ref:`manual-csfle-feature`. :option:`--keyVaultNamespace` is
996996
required for enabling client-side field level encryption. for the :program:`mongo`
997997
shell session. :program:`mongo` creates the specified namespace if it does not
998998
exist.
@@ -1455,5 +1455,3 @@ to enclose the JavaScript, using the following form:
14551455
- :doc:`/reference/method`
14561456
- :doc:`/reference/mongo`
14571457
- :method:`isInteractive()`
1458-
1459-

source/release-notes/4.2.txt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -990,7 +990,7 @@ Automatic encryption of fields
990990

991991

992992
For complete documentation on client-side field level encryption,
993-
see :doc:`/core/security-client-side-encryption`.
993+
see :ref:`manual-csfle-feature`.
994994

995995
General Security Enhancements
996996
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

source/release-notes/5.0.txt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -766,7 +766,7 @@ Starting in MongoDB 5.0 (and MongoDB 4.4.5), the Google Cloud Platform
766766
KMS and Azure Key Vault are supported in both :binary:`~bin.mongosh`
767767
and the legacy :binary:`~bin.mongo` shell as
768768
:ref:`Key Management Service (KMS) <field-level-encryption-kms>`
769-
providers for :doc:`/core/security-client-side-encryption`.
769+
providers for :ref:`manual-csfle-feature`.
770770

771771
Using a KMS, you can centrally and securely store Customer Master Keys
772772
(CMKs), which are used to encrypt and decrypt data encryption keys as

0 commit comments

Comments
 (0)