Commit Graph

18722 Commits

Author SHA1 Message Date
Jonathan Frappier
15a50b8959 Add MSSQL version to EKM install doc (#23055) 2023-09-13 15:45:21 -04:00
Sarah Chavis
930b48882a Fix broken markdown link (#23049) 2023-09-13 12:34:59 -05:00
Violet Hynes
a166cf6786 fix LDAP auto auth changelog (#23027) 2023-09-13 08:48:46 -04:00
Steven Clark
293e8b8ac5 Fix enterprise failure of TestCRLIssuerRemoval (#23038)
This fixes the enterprise failure of the test
 ```
  === FAIL: builtin/logical/pki TestCRLIssuerRemoval (0.00s)
     crl_test.go:1456:
         	Error Trace:	/home/runner/actions-runner/_work/vault-enterprise/vault-enterprise/builtin/logical/pki/crl_test.go:1456
         	Error:      	Received unexpected error:
         	            	Global, cross-cluster revocation queue cannot be enabled when auto rebuilding is disabled as the local cluster may not have the certificate entry!
         	Test:       	TestCRLIssuerRemoval
         	Messages:   	failed enabling unified CRLs on enterprise

 ```
2023-09-13 08:11:52 -04:00
Chelsea Shaw
52f8f0ddba UI: Handle control group error on SSH (#23025)
* Handle control group error on SSH

* Add changelog
2023-09-12 21:01:52 +00:00
Alexander Scheel
e2ff1f1c71 Clean up unused CRL entries when issuer is removed (#23007)
* Clean up unused CRL entries when issuer is removed

When a issuer is removed, the space utilized by its CRL was not freed,
both from the CRL config mapping issuer IDs to CRL IDs and from the
CRL storage entry. We thus implement a two step cleanup, wherein
orphaned CRL IDs are removed from the config and any remaining full
CRL entries are removed from disk.

This relates to a Consul<->Vault interop issue (#22980), wherein Consul
creates a new issuer on every leadership election, causing this config
to grow. Deleting issuers manually does not entirely solve this problem
as the config does not fully reclaim space used in this entry.

Notably, an observation that when deleting issuers, the CRL was rebuilt
on secondary clusters (due to the invalidation not caring about type of
the operation); for consistency and to clean up the unified CRLs, we
also need to run the rebuild on the active primary cluster that deleted
the issuer as well.

This approach does allow cleanup on existing impacted clusters by simply
rebuilding the CRL.

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add test case on CRL removal

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add changelog entry

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

---------

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2023-09-12 20:56:47 +00:00
Andreas Gruhler
c63a84dc9f Feature/document tls servername (#22714)
* Add Raft TLS Helm examples

Co-authored-by: Pascal Reeb <pascal.reeb@adfinis.com>
---------
2023-09-12 13:09:01 -07:00
Chris Capurso
5a83838f1d ensure -log-level is added to core config (#23017) 2023-09-12 16:01:21 -04:00
Daniel Huckins
d1e1abd2c7 VAULT-19681 allow users to specify files for agent child process stdout/stderr (#22812)
* allow users to specify files for child process stdout/stderr

* added changelog

* check if exec config is nil

* fix test

* first attempt at a test

* revise test

* passing test

* added failing test

* Apply suggestions from code review

Co-authored-by: Anton Averchenkov <84287187+averche@users.noreply.github.com>

* code review suggestions

* always close log files

* refactor to use real files

* hopefully fixed tests

* add back bool gates so we don't close global stdout/stderr

* compare to os.Stdout/os.Stderr

* remove unused

---------

Co-authored-by: Anton Averchenkov <84287187+averche@users.noreply.github.com>
2023-09-12 13:54:37 -04:00
Chelsea Shaw
de1382e99b UI: Fix empty item on kv list (#22838) 2023-09-12 17:01:57 +00:00
Jim
771470c28f chore: update azurevaultkey wrapper dependency (#22994)
* chore: update azurevaultkey wrapper dependency

This update brings in PR #155 from go-kms-wrapping which adds support for azure
workload identity authentication

* chore: add changelog entry

* fixup! chore: add changelog entry
2023-09-12 12:31:33 -04:00
Austin Gebauer
a28ac08b8f ui: remove a changelog entry for 1.15 (#22989) 2023-09-12 09:29:51 -07:00
claire bontempo
ab68f42234 encode namespace for API paths (#22962) 2023-09-12 09:03:59 -07:00
claire bontempo
112501a3f6 ui: More transit flakiness (#22969)
* fix group name typos

* add flaky note and cleanup generate function

* rename variable

* remove other test for other key types

* move key types to relevant test
2023-09-12 09:03:31 -07:00
Kianna
249d8d7b52 UI: [VAULT-18040] List all features in license info (#22855) 2023-09-12 08:48:15 -07:00
Jordan Reimer
8f6535cfaf LDAP Roles Pagination (#22985)
* adds pagination to ldap roles list view

* fixes issue with list not refreshing on ldap roles delete
2023-09-12 09:38:26 -06:00
Alexander Scheel
21742020f0 Add API docs on Transit X.509 certificates (#22998)
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-09-12 11:35:37 -04:00
dzm
b583ab9b7e Fix typo in AESGCMBarrier.encrypt (#22991) 2023-09-12 15:10:28 +00:00
Tom Proctor
7d7564b829 Events: Drop log level for events to debug (#22997) 2023-09-12 15:21:41 +01:00
Austin Gebauer
6fa1953ea5 codeowners: adds identity oidc and jwt integrations to ecosystem (#22990) 2023-09-11 17:21:22 -07:00
Angel Garbarino
adaef9deb8 remove test failure which cannot be checked anymore consistently due to removal of logout login. (#22978) 2023-09-11 16:02:56 -06:00
Angel Garbarino
6a7345a100 small fix: (#22976) 2023-09-11 15:43:02 -06:00
Ryan Cragun
9a7de066a9 test: handle the edition in the release testing workflow (#22979)
This adds edition handling to the test-run-enos-scenario-matrix
workflow. Previously we'd pass the version and edition from the caller,
but that isn't an option in the release testing workflow, which only
passes the metadata version without the edition.

Signed-off-by: Ryan Cragun <me@ryan.ec>
2023-09-11 21:04:48 +00:00
xka5h
7fd6d7a081 removed HCP Plus cluster (#22977) 2023-09-11 14:00:22 -07:00
Ryan Cragun
8dd3fa74df release: remove concurrency groups from release testing (#22970)
The CRT orchestrator triggers the release testing workflows for all
release versions using the same main ref. Therefore, if we have
concurrency controls in place we could cancel them if more than one
release branch is executing workflows.

Signed-off-by: Ryan Cragun <me@ryan.ec>
2023-09-11 19:33:49 +00:00
Ryan Cragun
d634700c9e artifactory: handle all package lookups (#22963)
Signed-off-by: Ryan Cragun <me@ryan.ec>
2023-09-11 18:05:58 +00:00
Steven Clark
6fc9905937 Only initialize the KMS config map if env map contains values (#22959)
- This protects against a test in ENT and a use-case in which
   we would force a migration for stored configs that had been
   written with a nil configuration
2023-09-11 11:22:24 -04:00
Amund Tenstad
8b26ac03a5 fix: cli arg doc (#22847)
Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
2023-09-11 13:03:06 +00:00
Max Coulombe
e6ed4835d1 - removed secrets sync experimental flag to prepare the release on Vault ENT (#22816) 2023-09-11 07:40:50 -04:00
Tom Proctor
cfaad7f700 Conditionally install gVisor in CI (#22891) 2023-09-11 10:02:21 +01:00
Peter Wilson
ae774b93d3 VAULT-18160: Audit - options and defaults (#22295)
* options for syslog

* fix bug in default value for HMACAccessor

* backend device cleanup

* socket backend options update

* options: prefix removed check, added default file mode

* fix option setting for elision

* fix test for prefix and whitespace
2023-09-11 08:41:29 +00:00
Bianca Moreira
1d72ac5278 Fix the administrative banner for sys endpoints (#22888) 2023-09-11 09:20:31 +02:00
Ryan Cragun
2e30ad5a93 test: don't use actions-set-product-version in release testing (#22948)
Signed-off-by: Ryan Cragun <me@ryan.ec>
2023-09-08 16:27:20 -06:00
Jordan Reimer
4bcd4db765 adds mount config details to kubernetes configuration view (#22926)
* adds mount config details to kubernetes configuration view

* adds changelog entry
2023-09-08 15:18:54 -06:00
vinay-gopalan
2b74a4826b Add documentation for IAM authentication for DB Secrets Engine (#22836)
Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
2023-09-08 14:03:50 -07:00
Niklas Rosencrantz
c3aa019c9a Update redis.mdx (#22750)
There seems to be a bug, but I'm not sure if it is because this documentation is almost worse than guessing

Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
2023-09-08 13:55:56 -07:00
Ryan Cragun
8edc24c7e1 test: fix release testing from artifactory (#22941)
Signed-off-by: Ryan Cragun <me@ryan.ec>
2023-09-08 20:47:27 +00:00
Kit Haines
1b442a71aa Minor docs update (#22918)
Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
2023-09-08 13:47:06 -07:00
Divya Pola
1c7716059d Initialize seal config map if nil (#22912)
* Initialize seal config map if nil

* Move the function outside if
2023-09-08 15:01:05 -05:00
Christopher Swenson
f8ad2da680 agent: Fail fast if agent doesn't start (#22937)
If the agent fails to start, for example when a port conflict occurs,
we want the test to fail fast, rather than continuing until the test
times out.

If this 5-second timeout occurs waiting for the agent to start up,
then the it does not make logical sense to continue the test. So,
we use `t.Fatalf` to trigger the failure.
2023-09-08 12:50:33 -07:00
Nick Cabatoff
d03c08b466 Don't rerun-fails on 1.15 for now (#22927) 2023-09-08 15:05:58 -04:00
Hamid Ghaf
e478f3f77a bump go version to 1.21.1 (#22928) 2023-09-08 12:04:41 -07:00
Ryan Cragun
5f1d2c56a2 [QT-506] Use enos scenario samples for testing (#22641)
Replace our prior implementation of Enos test groups with the new Enos
sampling feature. With this feature we're able to describe which
scenarios and variant combinations are valid for a given artifact and
allow enos to create a valid sample field (a matrix of all compatible
scenarios) and take an observation (select some to run) for us. This
ensures that every valid scenario and variant combination will
now be a candidate for testing in the pipeline. See QT-504[0] for further
details on the Enos sampling capabilities.

Our prior implementation only tested the amd64 and arm64 zip artifacts,
as well as the Docker container. We now include the following new artifacts
in the test matrix:
* CE Amd64 Debian package
* CE Amd64 RPM package
* CE Arm64 Debian package
* CE Arm64 RPM package

Each artifact includes a sample definition for both pre-merge/post-merge
(build) and release testing.

Changes:
* Remove the hand crafted `enos-run-matrices` ci matrix targets and replace
  them with per-artifact samples.
* Use enos sampling to generate different sample groups on all pull
  requests.
* Update the enos scenario matrices to handle HSM and FIPS packages.
* Simplify enos scenarios by using shared globals instead of
  cargo-culted locals.

Note: This will require coordination with vault-enterprise to ensure a
smooth migration to the new system. Integrating new scenarios or
modifying existing scenarios/variants should be much smoother after this
initial migration.

[0] https://github.com/hashicorp/enos/pull/102

Signed-off-by: Ryan Cragun <me@ryan.ec>
2023-09-08 12:46:32 -06:00
malinac02
e66fcf794e fix styling on masked input when viewing kmip credentials (#22887) 2023-09-08 11:45:53 -07:00
Christopher Swenson
e3d00597c6 Safer check in http/events validateSubscribeAccessLoop (#22913)
We grab the state lock and check that the core is not shutting down.

This panic mostly seems to happen if Vault is shutting down, usually
in a test.

Also, we try clean up the go-bexpr test by sending duplicates, and
deduplicating in the receive loop.
2023-09-08 18:26:01 +00:00
Jordan Reimer
b6cce58e57 Code Snippet Updates (#22917)
* updates code-snippet component styling and adds it to ldap library accounts view

* adds comment back in to code-snippet template
2023-09-08 11:46:31 -06:00
Theron Voran
afd1302cce docs/k8s-auth: non-JWT tokens are now allowed for token_reviewer_jwt (#22857) 2023-09-08 10:40:29 -07:00
Theron Voran
69fda8da76 plugins: adding vault and plugin metadata labels to plugin containers (#22859)
Adds Vault's pid, cluster id, and plugin name, version, and type to
the plugin container labels.
2023-09-08 10:30:55 -07:00
Tom Proctor
f884c3c4cd Avoid Vault hang when no communication established with plugin (#22914)
Also fixes a function where we may call go-plugin's client.Client() without ever calling client.Kill(), which could leak plugin processes
2023-09-08 18:21:02 +01:00
Rachel Culpepper
886ea0e094 Add unit tests for seal backend health check (#22779)
* make Healthy bool consistent and add unit tests

* fix formatting

* fix missing import
2023-09-08 12:19:05 -05:00