Commit Graph

18720 Commits

Author SHA1 Message Date
Kyle Schochenmaier
ec610f273f [docs] update docs for latest 0.26.0 release (#23890)
* update docs for latest release
* update to 0.26.1
2023-10-31 11:19:57 -07:00
Marc Boudreau
6af8bc7ce0 replace nytimes/gziphandler with klauspost/compress/gzhttp (#23898) 2023-10-31 12:38:07 -04:00
davidadeleon
9b1120b083 Skip unnecessary deriving of policies from entity on Login MFA check (#23894)
* skip unnecessary deriving of policies from entity on Login MFA check

* add changelog
2023-10-31 10:15:44 -04:00
Nick Downs
b9b72ec321 Fix undelete for mount paths that are deeper than one level (#19811)
* Fix for undelete for mount paths

* Pulled in a fix from kv_delete.go that adds partialPath to
  the mountPath to support paths that are multiple levels deep.
* Added undelete tests to validate that KV secrets can be successfully
  undeleted when mounted at a multi-level mount path.
* Added changelog txt file

* Update changelog to specify KV impact

---------

Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
2023-10-31 09:08:12 -04:00
Jordan Reimer
21a07110e1 fixes flaky enterprise control group test (#23911) 2023-10-30 16:39:12 -06:00
Paul Banks
063456495a Fix race that can lead to panic during seal (#23906)
* Fix race that can lead to panic during seal

* Add changelog
2023-10-30 18:26:33 +00:00
Jason O'Donnell
66494c8129 core: fix bug where deadlock detection was always on for expiration and quotas (#23902)
* server: fix bug where deadlock detection was on for expiration and quotas

* trim spaces

* Add tests

* Use trimspace and lower

* Update test

* changelog

* fix config parsing
2023-10-30 12:49:46 -04:00
Hamid Ghaf
26bae55997 fix a bug reading auth mount using sys/internal/ui/mount endpoint when filter paths are enforced (#23802)
* fix a bug reading auth mount using sys/internal/ui/mount endpoint

* CL

* fix CL
2023-10-30 08:15:15 -07:00
aphorise
40e00d812f Core: interactive CLI improvement VAULT_ADDR warning message (#17076) 2023-10-30 11:08:55 -04:00
Ellie
b0e8471b87 docs/update docs with known issue (#23866)
* update docs with known issue

* Update website/content/partials/internal-error-namespace-missing-policy.mdx

Co-authored-by: davidadeleon <56207066+davidadeleon@users.noreply.github.com>

* Update website/content/partials/internal-error-namespace-missing-policy.mdx

Co-authored-by: davidadeleon <56207066+davidadeleon@users.noreply.github.com>

* add upgrade and release notes and change file location

* add 1.13 and 1.14 release and upgrade docs

---------

Co-authored-by: davidadeleon <56207066+davidadeleon@users.noreply.github.com>
2023-10-27 16:21:23 -05:00
Jordan Reimer
fdfbc25c87 Revert Namespace Test Fix Attempt (#23888)
* Revert "attempts to fix flaky namespace test (#23867)"

This reverts commit 0e36973825.

* skips flaky namespace test

* fixes typo in comment

* adds comment as to why test is being skipped
2023-10-27 20:16:26 +00:00
Kianna
04676c0eb5 UI: [VAULT-17700] Part 3 HDS button (#23830) 2023-10-27 10:13:44 -07:00
Kianna
2b51e09bda UI: Add copyright header to swagger-ui-test (#23843)
Co-authored-by: Angel Garbarino <Monkeychip@users.noreply.github.com>
2023-10-27 09:37:15 -07:00
Marc Boudreau
987294660b fix test that breaks when VersionMetadata is set by compiler (#23883) 2023-10-27 12:21:21 -04:00
Josh Black
425b1e333d etcd backend listing should only require keys (#23872)
* listing should only require keys

* correct misspelling

* add changelog
2023-10-27 09:17:50 -07:00
Jason O'Donnell
29d8929824 api/seal-status: fix deadlock when namespace is set on seal-status calls (#23861)
* api/seal-status: fix deadlock when namespace is set on seal-status calls

* changelog
2023-10-27 09:59:50 -04:00
miagilepner
fb97a459ec VAULT-3825: Wildcard ACL policies without a trailing slash should match LIST operations (#23874)
* allow lists to match without trailing slash

* changelog
2023-10-27 15:59:41 +02:00
Victor Rodriguez
40e9fcde49 Remove the Seal HA beta feature flag (#23820) 2023-10-27 09:13:06 -04:00
mickael-hc
a76f71cc60 fix security-scanner: temporarily pin semgrep to 1.45.0 (#23855) 2023-10-27 07:30:04 -04:00
Jordan Reimer
0e36973825 attempts to fix flaky namespace test (#23867) 2023-10-26 15:41:11 -06:00
Ryan Cragun
a46def288f [QT-616] Add seal_ha enos scenario (#23812)
Add support for testing Vault Enterprise with HA seal support by adding
a new `seal_ha` scenario that configures more than one seal type for a
Vault cluster. We also extend existing scenarios to support testing
with or without the Seal HA code path enabled.

* Extract starting vault into a separate enos module to allow for better
  handling of complex clusters that need to be started more than once.
* Extract seal key creation into a separate module and provide it to
  target modules. This allows us to create more than one seal key and
  associate it with instances. This also allows us to forego creating
  keys when using shamir seals.
* [QT-615] Add support for configuring more that one seal type to
  `vault_cluster` module.
* [QT-616] Add `seal_ha` scenario
* [QT-625] Add `seal_ha_beta` variant to existing scenarios to test with
  both code paths.
* Unpin action-setup-terraform
* Add `kms:TagResource` to service user IAM profile

Signed-off-by: Ryan Cragun <me@ryan.ec>
2023-10-26 15:13:30 -06:00
Steven Clark
8c9929bed2 Update specifics around managed keys support in Transit (#23795) 2023-10-26 13:45:15 -04:00
Marc Boudreau
550c99ae3b VAULT-20669: Add New Authenticated Endpoint for Version (#23740)
* add sys/internal/ui/version path

* add read capability for sys/internal/ui/version in default policy

* add changelog file

* doc: add api-docs page for sys/internal/ui/version

* add godoc for pathInternalUIVersion function

* add tests for functions in version package

* remove unreachable code

* use closure to restore version at end of test function

* use an example version in sample response

* Update website/content/api-docs/system/internal-ui-version.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Apply suggestions from code review

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/api-docs/system/internal-ui-version.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* add copyright header to version_test.go

---------

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2023-10-26 12:52:52 -04:00
Theron Voran
41cc3b31bf docs/vault-helm: updates for the last release (v0.25.0) (#23844) 2023-10-26 08:37:54 -07:00
Scott Miller
cd761dfa0a Document the seal HA metrics and use labels for seal names (#23837)
* Document the seal HA metrics and use labels for seal names

* changelog
2023-10-26 10:07:34 -05:00
Scott Miller
307d27ef77 Add a couple more places with entropy augmentation (#23854) 2023-10-26 10:07:14 -05:00
hc-github-team-secure-vault-core
b7a97cba92 Update hashicorp/vault-plugin-secrets-mongodbatlas to v0.10.2 (#23849)
* Automated dependency upgrades

* Add changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
2023-10-26 09:23:42 -04:00
Andreas Gruhler
548b7a094b Fix backticks for cluster_aia_path (#23845) 2023-10-26 08:28:16 -04:00
akshya96
8c95d904f7 Fix segments fragments loss (#23781)
* add ent changes

* add changelog

* make fmt
2023-10-25 21:02:58 +00:00
Violet Hynes
363557d045 VAULT-19232 Add static secret capability manager to Vault Proxy (#23677)
* VAULT-19232 static secret capability manager so far

* VAULT-19232 mostly finish renewal job logic

* VAULT-19232 some clean up, tests, etc

* VAULT-19232 integrate capability manager with proxy, add E2E test

* VAULT-19232 boltdb stuff

* VAULT-19232 finishing touches

* VAULT-19232 typo

* VAULT-19232 add capabilities index cachememdb tests

* Remove erroneous "the"

Co-authored-by: Kuba Wieczorek <kuba.wieczorek@hashicorp.com>

---------

Co-authored-by: Kuba Wieczorek <kuba.wieczorek@hashicorp.com>
2023-10-25 16:43:24 -04:00
Jonathan Frappier
c0ad3f6ce2 Update link for MongoDB Atlas database secrets engine (#23831)
* Update link for MongoDB Atlas database secrets engine

* Fix callout spacing
2023-10-25 15:17:43 -04:00
Cinthia Conti
b0b4851ac1 Update CHANGELOG.md for 1.15.1, 1.14.5, 1.13.9 (#23815)
* Update CHANGELOG.md for 1.15.1, 1.14.5, 1.13.9

* Update CHANGELOG.md

Co-authored-by: Meggie <meggie@hashicorp.com>

* Update CHANGELOG.md

Co-authored-by: Meggie <meggie@hashicorp.com>

* remove entry from changelog

---------

Co-authored-by: Meggie <meggie@hashicorp.com>
2023-10-25 15:01:02 -04:00
Theron Voran
8d7c81019b docs/vault-k8s: v1.3.1 release updates (#23826) 2023-10-25 11:56:08 -07:00
Chelsea Shaw
d562cd50dc UI: fix changelog anchor (#23821) 2023-10-25 17:41:52 +00:00
Chelsea Shaw
080538fd19 Add copyright headers to reset-password code (#23822) 2023-10-25 12:24:16 -05:00
Angel Garbarino
6de5b2fb3c Update packages and OpenApi styling (#23700)
* update packages

* changelog

* wip better

* clean up

* and it works, it always worked we just hid it working :/

* clean up

* playing around with adding the queryparam, not working

* the fix no queryparams

* lets just see how this works out.

* maybe this will help

* remove copy/pasta

* Update ui/lib/open-api-explorer/addon/components/swagger-ui.js

Co-authored-by: Jordan Reimer <zofskeez@gmail.com>

---------

Co-authored-by: Jordan Reimer <zofskeez@gmail.com>
2023-10-25 17:06:06 +00:00
Yoko Hyakuna
adb025542c Fix reported link issue (#23813) 2023-10-25 08:38:45 -07:00
Cinthia Conti
7b1fa4fa15 Update LICENSE to 1.15.1 (#23816)
Update LICENSE to 1.15.1
2023-10-25 10:06:45 -04:00
Peter Wilson
3d37a2507b Use two differing timeouts for keyring persistence (#23796)
* add two differing timeouts to keyring persistence

* typo

* Removed second longer timeout and using supplied ctx

* make fmt strangeness
2023-10-24 22:43:42 +01:00
Chelsea Shaw
3fdb3bec85 UI: mirage endpoints for reduced disclosure (#23807) 2023-10-24 15:51:31 -05:00
Chelsea Shaw
3337035de7 UI: Clean up date-format and tests (#23799) 2023-10-24 20:46:59 +00:00
Chelsea Shaw
b7708875e1 UI: Allow userpass user to update their own password (#23797) 2023-10-24 20:01:30 +00:00
Steven Clark
a10685c521 Pin curl docker image to a specific docker version instead of latest (#23763)
- Try to avoid these build failures as our proxy does seem to have
   issues around pulling images with the 'latest' tag at times.

```
acme_test.go:206:
	Error Trace:	/home/runner/actions-runner/_work/vault-enterprise/vault-enterprise/builtin/logical/pkiext/pkiext_binary/acme_test.go:206
          	        /home/runner/actions-runner/_work/vault-enterprise/vault-enterprise/builtin/logical/pkiext/pkiext_binary/acme_test.go:75
	Error:      	Received unexpected error:
				container create failed: Error response from daemon: No such image: docker.mirror.hashicorp.services/curlimages/curl:latest
	Test:       	Test_ACME/group/caddy_http_eab
	Messages:   	could not start cURL container
```
2023-10-24 10:04:23 -04:00
Jordan Reimer
dff1d5d443 fixes flaky policies test (#23798) 2023-10-23 15:08:24 -06:00
Steven Clark
3623dfc227 Add support for plugins to specify binary request paths (#23729)
* wip

* more pruning

* Integrate OCSP into binary paths PoC

 - Simplify some of the changes to the router
 - Remove the binary test PKI endpoint
 - Switch OCSP to use the new binary paths backend variable

* Fix proto generation and test compilation

* Add unit test for binary request handling

---------

Co-authored-by: Scott G. Miller <smiller@hashicorp.com>
2023-10-23 17:04:42 -04:00
Robert
0df5b14b64 Update 23010 changelog (#23794) 2023-10-23 18:46:42 +00:00
Hamid Ghaf
87376a1f5c Normalize error response messages when invalid credentials are provided (#23786)
* Normalize error response messages when invalid credentials are provided

* CL

* Update changelog/23786.txt

Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>

---------

Co-authored-by: Peter Wilson <peter.wilson@hashicorp.com>
Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
2023-10-23 15:59:26 +00:00
Hamid Ghaf
4281487b07 run copywrite headers (#23788) 2023-10-23 15:53:56 +00:00
claire bontempo
db4819427a docs/add line separators to curl requests secrets sync (#23681)
* add line separators to curl requests

* revert unsync change
2023-10-23 08:29:26 -07:00
Violet Hynes
aeb6d14ebd Update the default kv factory to kv.Factory (#23584)
* Update the default kv mount to kv.Factory

* Imports

* Set some tests that care about leaseapssthroughbackend to use it

* extra newline

* More test updates

* Test updates

* Refactor KV mounting in tests

* Re-add comment
2023-10-23 11:20:22 -04:00