Commit Graph

18722 Commits

Author SHA1 Message Date
claire bontempo
25985e76bf U: preparation for HDS adoption to replace <Modal> (#23353)
* add autoRefresh to codemirror

* fix codemirror arg

* move scroll to body to accommodate hds mdoals
2023-09-27 18:21:25 -05:00
Ryan Cragun
460b5de47b test: increase wait timers in new modules (#23355)
Increase default retries for modules used in replication.

Signed-off-by: Ryan Cragun <me@ryan.ec>
2023-09-27 17:19:57 -06:00
Ryan Cragun
5cdce48a6a replication: wait longer for replication to resync (#23336)
Signed-off-by: Ryan Cragun <me@ryan.ec>
2023-09-27 20:50:28 +00:00
Kuba Wieczorek
6685565b7e [VAULT-20073] Docs: update docs on Sentinel RGP group policy application (#23292)
Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
Co-authored-by: Peter Wilson <peter.wilson@hashicorp.com>
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2023-09-27 21:38:29 +01:00
Kuba Wieczorek
521f69bc25 [VAULT-20073] Docs: update upgrade guide for 1.15 with information on Sentinel RGP group policy application (#23296)
Co-authored-by: Peter Wilson <peter.wilson@hashicorp.com>
2023-09-27 21:36:43 +01:00
Sarah Chavis
827bb275be [DOCS] Fix restricted endpoint info (#23333)
* Update restricted API list and alert tags
* add cli commands w/o public endpoints
2023-09-27 20:31:00 +00:00
Meggie
28c15bbc10 Updating the changelog for 1.15.0 (#23310)
* Updating the changelog for 1.15.0

Also includes updates for 1.14.4 and 1.13.8

* Removing some docs entries

From PR review - thanks Calvin!
2023-09-27 16:24:45 -04:00
Sarah Chavis
db081e3f20 [DOCS] Correct VSO version (#23335) 2023-09-27 13:24:22 -07:00
Sarah Chavis
450dd1c330 [DOCS] 1.15 release notes (#23237)
Co-authored-by: finnstech <43624055+finnstech@users.noreply.github.com>
Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
2023-09-27 12:49:46 -07:00
Max Coulombe
7106e6c22f * fix remove endpoint doc (#23329) 2023-09-27 15:40:07 -04:00
Ryan Cragun
7725117846 enos: remove old initial version from upgrades (#23323)
* Remove old initial versions from the upgrade scenario as they're
  unreliable.
* Ensure that shellcheck is available on runners for linting job.

Signed-off-by: Ryan Cragun <me@ryan.ec>
2023-09-27 12:24:08 -06:00
Nick Cabatoff
547bff752e Prevent long delays in ExpirationManager.Stop due to blanking a large pending map (#23282) 2023-09-27 13:30:39 -04:00
Steven Clark
d7e4447ec0 Fix formatting issues within pki health-check cli documentation (#23288)
* Fix formatting issue within pki health-check cli

 - Missing a ``` within the CRL validity period which caused a bunch of sections to be collected within the box
 - One shell session was shifted over too much in the Too many certificates section

* Add missing '$' in front of the command

* Reorder pki entry in nav bar and add more missing $ in vault commands

---------

Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
2023-09-27 13:29:40 -04:00
Angel Garbarino
7356f3aae0 move pagination inside logical statement with items (#23308) 2023-09-27 09:49:59 -06:00
Violet Hynes
20c1f54906 Add support for true/false string literals for agent injector (#22996)
* Add support for true/false string literals for agent injector

* Add extra test

* Changelog

* parseutil

* Godocs
2023-09-27 10:46:44 -04:00
Tom Proctor
2631217227 Docs: Containerized plugins usage (#23186)
Co-authored-by: Christopher Swenson <christopher.swenson@hashicorp.com>
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
Co-authored-by: Theron Voran
Co-authored-by: John-Michael Faircloth
2023-09-27 14:28:39 +01:00
Max Coulombe
03732eb158 Secrets-Sync/vault-18673-documentation (#23189)
* secrets sync initial documentation for beta version

Co-authored-by: vinay-gopalan <86625824+vinay-gopalan@users.noreply.github.com>
Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>
Co-authored-by: robmonte <17119716+robmonte@users.noreply.github.com>
Co-authored-by: vinay-gopalan <86625824+vinay-gopalan@users.noreply.github.com>
Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
Co-authored-by: Raymond Ho <raymond.ho@hashicorp.com>
2023-09-27 08:56:39 -04:00
Austin Gebauer
e3617218df auth/saml: adds documentation (#23183)
* auth/saml: adds documentation

* Update website/content/api-docs/auth/saml.mdx

Co-authored-by: John-Michael Faircloth <fairclothjm@users.noreply.github.com>

* use sentence case for titles

* Update website/content/api-docs/auth/saml.mdx

Co-authored-by: Rémi Lapeyre <remi.lapeyre@lenstra.fr>

* Update website/content/docs/auth/saml.mdx

Co-authored-by: Rémi Lapeyre <remi.lapeyre@lenstra.fr>

* Update website/content/docs/auth/saml.mdx

Co-authored-by: Rémi Lapeyre <remi.lapeyre@lenstra.fr>

* Update website/content/docs/auth/saml.mdx

Co-authored-by: Rémi Lapeyre <remi.lapeyre@lenstra.fr>

* Update website/content/docs/auth/saml.mdx

Co-authored-by: Rémi Lapeyre <remi.lapeyre@lenstra.fr>

* Update website/content/api-docs/auth/saml.mdx

Co-authored-by: Rémi Lapeyre <remi.lapeyre@lenstra.fr>

* Update website/content/api-docs/auth/saml.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/api-docs/auth/saml.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/api-docs/auth/saml.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/api-docs/auth/saml.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/api-docs/auth/saml.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/api-docs/auth/saml.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/api-docs/auth/saml.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/api-docs/auth/saml.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/api-docs/auth/saml.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* fixup technical detail on bound_subjects

* Update website/content/api-docs/auth/saml.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/api-docs/auth/saml.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/api-docs/auth/saml.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/api-docs/auth/saml.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/api-docs/auth/saml.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* fixup relay state

* Update website/content/api-docs/auth/saml.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/docs/auth/saml.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/docs/auth/saml.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/docs/auth/saml.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/docs/auth/saml.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* updates wording for bound_attributes

* updates bound_attributes_type

* updates groups_attribute

* lowercase saml entities, add note to unauthenticated APIs

* updates token api description

* adds section for replication configuration

* adds section for namespace config of acs

* use tabs for authentication section

* change word

---------

Co-authored-by: John-Michael Faircloth <fairclothjm@users.noreply.github.com>
Co-authored-by: Rémi Lapeyre <remi.lapeyre@lenstra.fr>
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2023-09-27 15:34:43 +09:00
Ryan Cragun
e55d653cab actions: fix actionlint error and linting logic (#23305)
Signed-off-by: Ryan Cragun <me@ryan.ec>
2023-09-26 16:38:49 -06:00
claire bontempo
ef727eafde UI: Policy JSON Editor Toolbar Styling Fix (#23297) 2023-09-26 15:14:57 -07:00
Ryan Cragun
391cc1157a [QT-602] Run proxy and agent test scenarios (#23176)
Update our `proxy` and `agent` scenarios to support new variants and
perform baseline verification and their scenario specific verification.
We integrate these updated scenarios into the pipeline by adding them
to artifact samples.

We've also improved the reliability of the `autopilot` and `replication`
scenarios by refactoring our IP address gathering. Previously, we'd ask
vault for the primary IP address and use some Terraform logic to determine
followers. The leader IP address gathering script was also implicitly
responsible for ensuring that a found leader was within a given group of
hosts, and thus waiting for a given cluster to have a leader, and also for
doing some arithmetic and outputting `replication` specific output data.
We've broken these responsibilities into individual modules, improved their
error messages, and fixed various races and bugs, including:
* Fix a race between creating the file audit device and installing and starting
  vault in the `replication` scenario.
* Fix how we determine our leader and follower IP addresses. We now query
  vault instead of a prior implementation that inferred the followers and sometimes
  did not allow all nodes to be an expected leader.
* Fix a bug where we'd always always fail on the first wrong condition
  in the `vault_verify_performance_replication` module.

We also performed some maintenance tasks on Enos scenarios  byupdating our
references from `oss` to `ce` to handle the naming and license changes. We
also enabled `shellcheck` linting for enos module scripts.

* Rename `oss` to `ce` for license and naming changes.
* Convert template enos scripts to scripts that take environment
  variables.
* Add `shellcheck` linting for enos module scripts.
* Add additional `backend` and `seal` support to `proxy` and `agent`
  scenarios.
* Update scenarios to include all baseline verification.
* Add `proxy` and `agent` scenarios to artifact samples.
* Remove IP address verification from the `vault_get_cluster_ips`
  modules and implement a new `vault_wait_for_leader` module.
* Determine follower IP addresses by querying vault in the
  `vault_get_cluster_ips` module.
* Move replication specific behavior out of the `vault_get_cluster_ips`
  module and into it's own `replication_data` module.
* Extend initial version support for the `upgrade` and `autopilot`
  scenarios.

We also discovered an issue with undo_logs that has been described in
the VAULT-20259. As such, we've disabled the undo_logs check until
it has been fixed.

Signed-off-by: Ryan Cragun <me@ryan.ec>
2023-09-26 15:37:28 -06:00
Steven Clark
b0fef53184 Do not attempt to shutdown ACME thread on non-active nodes (#23293) 2023-09-26 16:32:52 -04:00
Steven Clark
dbfaa6f81a Stop processing ACME verifications when active node is stepped down (#23278)
- Do not load existing ACME challenges persisted within storage on non-active nodes. This was the main culprit of the issues, secondary nodes would load existing persisted challenges trying to resolve them but writes would fail leading to the excessive logging.
    - We now handle this by not starting the ACME background thread on non-active nodes, while also checking within the scheduling loop and breaking out. That will force a re-reading of the Closing channel that should have been called by the PKI plugin's Cleanup method.

- If a node is stepped down from being the active node while it is actively processing a verification, we could get into an infinite loop due to an ErrReadOnly error attempting to clean up a challenge entry

- Add a maximum number of retries for errors around attempting to decode,fetch challenge/authorization entries from disk. We use double the number of "normal" max attempts for these types of errors, than we would for normal ACME retry attempts to avoid collision issues. Note that these additional retry attempts are not persisted to disk and will restart on every node start

- Add a 1 second backoff to any disk related error to not immediately spin on disk/io errors for challenges.
2023-09-26 13:59:13 -04:00
Angel Garbarino
6db476da41 UI: HDS adoption replace <ListPagination> component (#23169)
* change currentPage to page to be consistent

* replace pagination in listview and always show pagination

* wip

* fix query param issue

* access identity aliases index

* leases done and dusted

* policies and secrets backend

* remove list Pagination

* changelog
2023-09-26 16:27:14 +00:00
claire bontempo
88ed074287 UI: add warning before downloading secret data (#23260)
* add confirm modal for downloading masked data

* close modal if user clicks download

* add changelog;

* pass onSuccess function instead

* only render modal on DOM if download is allowed
2023-09-22 20:19:38 +00:00
Thy Ton
ac9f411949 add type parameter to plugin runtime list API (#23254) 2023-09-22 11:32:56 -07:00
Scott Miller
036cbcebd9 First draft of Seal HA documentation (#23252)
* wip

* Initial draft of Seal HA docs

* nav data

* Fix env var name

* title

* Note partially wrapped values and disabled seal participation

* Update website/data/docs-nav-data.json

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>

* correct initial upgrade limitation

* Add note about shamir seals and migration

* fix nav json

* snapshot note

* availability note

* seal-backend-status

* Add a couple more clarifying statements

* header typo

* correct initial upgrade wording

* Update website/content/docs/configuration/seal/seal-ha.mdx

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>

* Update website/content/docs/concepts/seal.mdx

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>

---------

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2023-09-22 13:18:48 -05:00
vinay-gopalan
8924f9592d Remove SA Credentials from DB Connection Details on Read (#23256) 2023-09-22 10:49:46 -07:00
Mark Collao
1434a235b1 add secret scanning exemptions (#23230) 2023-09-22 12:03:10 -05:00
Paul Banks
0fa36a36ae Prevent split-brain active node writes when using Consul (#23013)
* Add test to demonstrate a split-brain active node when using Consul

* Add Consul session check to prevent split-brain updates

* It's not right

Co-authored-by: Josh Black <raskchanky@gmail.com>

---------

Co-authored-by: Josh Black <raskchanky@gmail.com>
2023-09-22 16:16:01 +01:00
Sergey Kutovoy
1d61aeb8ae [DOCS]Fix wrong api path for ldap secrets (#23225)
* [DOCS]Fix wrong api path for ldap secrets

* added changelog
2023-09-22 15:01:14 +00:00
Violet Hynes
54c84decfd VAULT-19233 First part of caching static secrets work (#23054)
* VAULT-19233 First part of caching static secrets work

* VAULT-19233 update godoc

* VAULT-19233 invalidate cache on non-GET

* VAULT-19233 add locking to proxy cache writes

* VAULT-19233 update locking, future-proof

* VAULT-19233 fix mutex

* VAULT-19233 Use ParseSecret
2023-09-22 10:57:38 -04:00
Luis (LT) Carbonell
c93137d9a3 Add Reindex In Progress Metric (#23160)
* Add a telemetry metric to track if a reindex is in progress or not

* changelog

* Add other reindex related metrics

* cleanup types

* Add docs for these metrics

* check for nil values
2023-09-22 10:53:26 -04:00
Rachel Culpepper
68dd82c902 add AbortableScanView function (#23245) 2023-09-22 09:03:53 -05:00
Tom Proctor
a074bf9cbf Support mlock and custom tmpdir for containerized plugins (#23215) 2023-09-22 12:14:02 +01:00
Chelsea Shaw
82378ae232 UI: add pagination to new PKI (#23193) 2023-09-21 23:32:01 +00:00
Sarah Chavis
22696cac13 [DOCS] Fix anchor ID in partial (#23228) 2023-09-21 17:49:22 -04:00
claire bontempo
8b12698780 UI: Adds tidy_revoked_certs and revoked_cert_deleted_count to PKI tidy status page (#23232)
* add missing params

* add changelog
2023-09-21 14:05:32 -07:00
Steven Clark
3958bd0484 Restore seal startup behavior when not in multi-seal mode (#23229)
- Only enable the warning mode for seals being unavailable when
   multiple exist when running within multi-seal mode.
 - This addresses a panic that occurs when a legacy style
   migration is attempted and the non-disabled seal is unavailable.
2023-09-21 16:22:26 -04:00
divyaac
fe7f56b3a9 Added chroot namespace to listener config printing (#23205) 2023-09-21 12:07:51 -07:00
Sarah Chavis
1996c186df [DOCS] Administrative namespace updates (#23208) 2023-09-21 12:07:25 -07:00
Max Coulombe
7688c6eb58 Added documentation for elasticsearch static roles (#23077)
* added documentation for elasticsearch static roles
2023-09-21 14:07:38 -04:00
Max Coulombe
5ba15defe5 Azure secret doc enhancement (#23079)
* * azure secret doc enhancement
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

---------

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2023-09-21 14:05:44 -04:00
claire bontempo
8375149004 ui: Add version diff comparison to KV v2 (#23200)
* add diff route

* add version diff toolbar link

* finish functionality of version diff comparison

* add tests

* update empty state message

* update selectors

* wip tests

* finish test

* add empty state test

* switch dropdowns

* add changelog

* add comment
2023-09-21 16:50:08 +00:00
mickael-hc
758de878d6 Update Docker base image to Alpine 3.18 (#23217)
Alpine 3.15 will be end-of-life on Nov 1 2023
2023-09-21 12:36:58 -04:00
Steven Clark
4389ee438d Provide a better error message around initializing with multiple seals (#23210)
* Provide a better error message around initializing with multiple seals

 - Specifically callout during cluster initialization or initial beta
   seal migration that we can only have a single seal enabled with the
following error message:

   `Initializing a cluster or enabling multi-seal on an existing cluster must occur with a single seal before adding additional seals`

 - Handle the use case that we have multiple seals configured, but
   some are disabled, leaving a single enabled seal. This is the legacy
   seal migratation case that works without the BETA flag set, so should
   work with it set as well.

* Update the expected error messages within seal tests

* Remove support for old style migration configurations in multi-seal
2023-09-21 12:32:44 -04:00
divyaac
6ef2a60314 Added patch (#23206) 2023-09-20 18:25:21 -07:00
Mark Collao
6bbdda762d chore: update security-scan.yml exclusions 2023-09-20 17:06:53 -05:00
Steven Clark
bc42d56c7a Seal-HA: Match multiple seals using name/type only (#23203)
* Match multiple seals using name/type only

 - This fix addresses an issue that changing any seal configuration in an existing seal stanza such as the Vault token would cause negate the seal matching.
 - If this was the only seal that was previously used or slight tweaks happened to all the seals Vault would fail to start with an error of

 "must have at least one seal in common with the old generation."

 - Also add a little more output to the validation error messages about
   the current seal and configured seal information to help in
   diagnosing errors in the future

* Tweak formatting and text on method doc

* Update comment around forcing a seal rewrap
2023-09-20 16:51:52 -04:00
Violet Hynes
f5ec47a2f8 Remove global client assignment in KV tests (#23202) 2023-09-20 20:13:14 +00:00