Commit Graph

18722 Commits

Author SHA1 Message Date
Christopher Swenson
b6e8cb3a4c events: Avoid data race by checking for root token (#22916)
before starting access loop checker.

We were seeing rare data races because the `core.IsRoot()` check was
being called after the subscriber access loop checker was starter.
The subscriber access loop calls `core.CheckToken()`, which can modify
the values that `IsRoot()` is reading.
2023-09-08 10:15:01 -07:00
Thy Ton
12b9e5dd36 add CLI commands for plugin runtime VAULT-18181 (#22819)
---------

Co-authored-by: Tom Proctor <tomhjp@users.noreply.github.com>
2023-09-08 10:11:48 -07:00
hc-github-team-secure-vault-core
06d0c396b9 Update hashicorp/vault-plugin-secrets-terraform to v0.7.3 (#22907)
* Automated dependency upgrades

* Add changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
2023-09-08 16:31:58 +00:00
Scott Miller
8c4b4650ae Typo in seal config doc for pkcs#11 (#22905)
* Typo in seal config doc for pkcs#11

* Update ENV var list

---------

Co-authored-by: Steve Clark <steven.clark@hashicorp.com>
2023-09-08 10:56:34 -05:00
Austin Gebauer
21bd134ad2 ui: adds a new auth form option (#22640)
* ui: adds a new auth form option

* add warning if nonsecure context, cleanup

* more ember-y

* Only show saml auth method for enterprise, plus tests

* Use error message helper

* Dont include saml on community auth list

* Add allSupportedAuthBackends method

* change token request from GET to PUT to match backend change

* Fetch role on sign in, cancel login after timeout

* saml acceptance test

* Add changelog

* saml test only on enterprise

* set the acs_url according to which cluster the UI is served from

* prepare namespace in addition to path with a helper func

---------

Co-authored-by: Chelsea Shaw <cshaw@hashicorp.com>
2023-09-08 08:53:26 -07:00
Chelsea Shaw
3ae94183bf UI: Namespace validation update (#22820) 2023-09-08 10:02:52 -05:00
Jordan Reimer
8f9bf0c623 fixes ldap overview card layout on smaller viewports (#22882) 2023-09-08 08:40:11 -06:00
Violet Hynes
04c06fe484 Add sys/monitor and sys/audit-hash to root only namespace list (#22896) 2023-09-08 10:00:30 -04:00
Tom Proctor
55a901d423 Add timeout for http events tests (#22892)
Does not address the test flake in TestBexprFilters, but makes it fail fast(er) when it does flake.
2023-09-08 14:16:01 +01:00
Scott Miller
7d4d8cb708 Reject supplied nonces for non-convergent encryption operations (#22852)
* Ignore nonces when encrypting without convergence or with convergence versions > 1

* Honor nonce use warning in non-FIPS modes

* Revert "Honor nonce use warning in non-FIPS modes"

This reverts commit 2aee3dbdc11c4e333ecb20503539c7993b24ee57.

* Add a test func that removes a nonce when not needed

* err out rather than ignore the nonce

* Alter unit test to cover, also cover convergent version 3

* More unit test work

* Fix test 14

* changelog

* tests not already in a nonce present path

* Update unit test to not assume warning when nonce provided incorrectly

* remove unused test field

* Fix auto-squash events experiments

When #22835 was merged, it was auto-squashed, so the `experiments`
import was removed, but the test still referenced it.

This removes the (now unnecessary) experiment from the test.

* Allow nonces for managed keys, because we have no way of knowing if the backing cipher/mode needs one

---------

Co-authored-by: Christopher Swenson <christopher.swenson@hashicorp.com>
2023-09-08 08:07:33 -05:00
Christopher Swenson
f20b6eb710 Disable gVisor in tests (for now) (#22881)
We can't use `sudo` on our self-hosted runners at the moment to do
the install and Docker reload.

So, we'll disable this for now, which should automatically cause
the gVisor-related tests to be skipped.
2023-09-08 01:15:49 +00:00
hc-github-team-secure-vault-core
f43bbc0fae Update hashicorp/vault-plugin-auth-kubernetes to v0.17.1 (#22879)
* Automated dependency upgrades

* Add changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
2023-09-08 00:42:53 +00:00
hc-github-team-secure-vault-core
eb0aa974aa Update hashicorp/vault-plugin-database-couchbase to v0.9.4 (#22871)
---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
Co-authored-by: Thy Ton <maithytonn@gmail.com>
2023-09-07 23:19:24 +00:00
Tom Proctor
d6da79aa5f Make runsc the default plugin container runtime (#22850)
* Also makes plugin directory optional when registering container plugins
* And threads plugin runtime settings through to plugin execution config
* Add runsc to github runner for plugin container tests
2023-09-07 23:01:27 +00:00
John-Michael Faircloth
1870018090 docs: db schedule-based static role rotations (#22863)
* docs: db schedule-based static role rotations

* fix broken link

* add mutual exclusion notice on overview page

* prepend slash to relative link
2023-09-07 16:50:57 -05:00
Christopher Swenson
707fab113e Fix auto-squash events experiments (#22876)
When #22835 was merged, it was auto-squashed, so the `experiments`
import was removed, but the test still referenced it.

This removes the (now unnecessary) experiment from the test.
2023-09-07 21:10:02 +00:00
Angel Garbarino
7556dfd158 Fix KV bug on deletion_time (#22842)
* the fix

* working, but work in progress maybe change to another helper, put draft up?

* some fixes and restructing

* change names

* test assert wrong locally, lets see about gh
2023-09-07 15:09:33 -06:00
Thy Ton
f96ecf3800 add oci_image and runtime to VersionedPlugin (#22866)
---------

Co-authored-by: Tom Proctor <tomhjp@users.noreply.github.com>
2023-09-07 13:42:47 -07:00
Jordan Reimer
cbc567895c moves ldap role credentials error handling within credentials route (#22870) 2023-09-07 20:28:27 +00:00
Christopher Swenson
022469da45 events: WebSocket subscriptions support go-bexpr expressions (#22835)
Subscribing to events through a WebSocket now support boolean
expressions to filter only the events wanted based on the fields

* `event_type`
* `operation`
* `source_plugin_mount`
* `data_path`
* `namespace`

Example expressions:

These can be passed to `vault events subscribe`, e.g.,:
* `event_type == abc`
* `source_plugin_mount == secret/`
* `event_type != def and operation != write`

```sh
vault events subscribe -filter='source_plugin_mount == secret/' 'kv*'
```

The docs for the `vault events subscribe` command and API endpoint
will be coming shortly in a different PR, and will include a better
specification for these expressions, similar to (or linking to)
https://developer.hashicorp.com/boundary/docs/concepts/filtering
2023-09-07 20:11:53 +00:00
Kuba Wieczorek
3130e8ba94 [VAULT-1324] Fix the CLI failing to return wrapping information for KV PUT and PATCH operations when format is set to 'table' (#22818) 2023-09-07 20:43:57 +01:00
hc-github-team-secure-vault-core
db662131e7 Update hashicorp/vault-plugin-secrets-ad to v0.16.1 (#22856)
---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
Co-authored-by: Thy Ton <maithytonn@gmail.com>
2023-09-07 12:03:28 -07:00
Christopher Swenson
7f7907d3a0 events: Enable by default, disable flag (#22815)
The flag `events.alpha1` will no longer do anything, but we keep it
to prevent breaking users who have it in their configurations or
startup flags, or if it is referenced in other code.
2023-09-07 18:27:14 +00:00
hc-github-team-secure-vault-core
9af1c4a183 Update hashicorp/vault-plugin-database-couchbase to v0.9.3 (#22854)
---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
2023-09-07 11:18:05 -07:00
Christopher Swenson
81f30d26e4 events: remove flaky test (#22808)
The more I looked at this test, the more I realized it wasn't testing
anything except that the namespace parameter was being parsed by the
websocket.

So, I moved that parameter parsing check to `TestEventsSubscribe()`,
which is not flaky, and removed the flaky test altogether.

There is a similar set of tests in the enterprise repo that I will
try to simplify and make less flaky, though.
2023-09-07 11:03:41 -07:00
Jordan Reimer
62b1e39acc fixes issue checking in ldap library account from overview (#22853) 2023-09-07 11:57:37 -06:00
Jordan Reimer
17f5aeb0a1 disables ldap library and role name fields when editing (#22849) 2023-09-07 09:51:17 -06:00
Jordan Reimer
18101d3514 fixes issue using removeObject on array proxy when deleting ldap libraries and roles (#22844) 2023-09-07 08:53:19 -06:00
miagilepner
5ab88a076b [VAULT-15398] Activity log data generation fixes (#22752) 2023-09-07 10:53:29 +02:00
Thy Ton
953f6cd818 Vault 18538 reference runtime on plugin register (#22744)
---------

Co-authored-by: Tom Proctor <tomhjp@users.noreply.github.com>
2023-09-06 23:37:10 -07:00
Scott Miller
28bdfe6c14 Update go-kms-wrapping dependencies for community (#22833) 2023-09-06 21:59:00 -04:00
Jordan Reimer
068a57c204 Form Field Tooltip Alignment (#22832)
* fixes alignment issues with form field labels that have tooltips

* adds gap to is-label to preserve tooltip spacing

* adds changelog entry
2023-09-06 22:14:17 +00:00
kpcraig
2172786316 Add support for IAM Auth for Google CloudSQL DBs (#22445) 2023-09-06 14:40:39 -07:00
Chelsea Shaw
2ca784ad11 UI: Show error if tool action is not recognized (#22821) 2023-09-06 15:29:35 -05:00
Ryan Cragun
862b7dbb95 fmt: fix formatting (#22826)
Signed-off-by: Ryan Cragun <me@ryan.ec>
2023-09-06 20:28:17 +00:00
hc-github-team-secure-vault-core
868906d47a Update hashicorp/vault-plugin-secrets-kubernetes to v0.6.0 (#22823)
* Automated dependency upgrades

* Add changelog

* fix typo

* gofumpt fix

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
Co-authored-by: robmonte <17119716+robmonte@users.noreply.github.com>
2023-09-06 20:27:06 +00:00
hc-github-team-secure-vault-core
4436c24b34 Update hashicorp/vault-plugin-secrets-azure to v0.16.3 (#22824)
* Automated dependency upgrades

* Add changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
2023-09-06 20:08:41 +00:00
hc-github-team-secure-vault-core
16654d7242 Update hashicorp/vault-plugin-auth-oci to v0.14.2 (#22805)
* Automated dependency upgrades

* Add changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
2023-09-06 09:53:23 -07:00
hc-github-team-secure-vault-core
35fd8f3496 Update hashicorp/vault-plugin-secrets-azure to v0.16.2 (#22799)
* Automated dependency upgrades

* Add changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
2023-09-06 16:38:46 +00:00
hc-github-team-secure-vault-core
1e414cf6a2 Update hashicorp/vault-plugin-auth-kerberos to v0.10.1 (#22797)
* Automated dependency upgrades

* Add changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
2023-09-06 16:17:21 +00:00
Sarah Thompson
a9a4b0b9ff Onboard Vault to CRT version bump automation (#18311)
* adding new version bump refactoring

* address comments

* remove changes used for testing

* add the version bump event!

* fix local enos scenarios

* remove unnecessary local get_local_metadata steps from scenarios
* add version base, pre, and meta to the get_local_metadata module
* use the get_local_metadata module in the local builder for version
  metadata
* update the version verifier to always require a build date

Signed-off-by: Ryan Cragun <me@ryan.ec>

* Update to embed the base version from the VERSION file directly into version.go.
This ensures that any go tests can use the same (valid) version as CI and so can local builds and local enos runs.
We still want to be able to set a default metadata value in version_base.go as this is not something that we set in the VERSION file - we pass this in as an ldflag in CI (matters more for ENT but we want to keep these files in sync across repos).

* update comment

* fixing bad merge

* removing actions-go-build as it won't work with the latest go caching changes

* fix logic for getting version in enos-lint.yml

* fix version number

* removing unneeded module

---------

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Claire <claire@hashicorp.com>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2023-09-06 17:08:48 +01:00
hc-github-team-secure-vault-core
18a1bece15 Update hashicorp/vault-plugin-auth-azure to v0.16.1 (#22795)
* Automated dependency upgrades

* Add changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
2023-09-06 16:07:41 +00:00
Victor Rodriguez
f97822da31 Skip unhealthy seal wrappers when performing encryption or decryption. (#22791)
Add timeout to Access.Encrypt() to allow for partial success.

Start goroutines for each of the seal wrappers to encrypt values. After a
timeout, return any successful encryption results and errors for those that
failed or did not complete on time.

Return from Access.Decrypt() on first successful result.

Start goroutines for each of the seal wrappers to decrypt values, and return on
the first successful result.

Start the highest priority wrapper immediately, and the rest after a delay to
give it a head start.
2023-09-06 15:49:49 +00:00
Max Coulombe
ac009ab27a * bumped kv plugin (#22790)
+ changelog
2023-09-06 11:07:48 -04:00
Christopher Swenson
f0a23e117f events: Continuously verify policies (#22705)
Previously, when a user initiated a websocket subscription,
the access to the `sys/events/subscribe` endpoint was checked then,
and only once.

Now, perform continuous policy checks:

* We check access to the `sys/events/subscribe` endpoint every five
  minutes. If this check fails, then the websocket is terminated.
* Upon receiving any message, we verify that the `subscribe`
  capability is present for that namespace, data path, and event type.
  If it is not, then the message is not delivered. If the message is
  allowed, we cache that result for five minutes.

Tests for this are in a separate enterprise PR.

Documentation will be updated in another PR.

Co-authored-by: Tom Proctor <tomhjp@users.noreply.github.com>
Co-authored-by: Nick Cabatoff <ncabatoff@hashicorp.com>
2023-09-05 16:28:09 -07:00
Josh Black
545b6e4eae bump version to 1.16 beta1 (#22783) 2023-09-05 22:16:29 +00:00
Kianna
00331b742e UI: [VAULT-19478] Fix info table row value overflow (#22776) 2023-09-05 14:52:14 -07:00
Kianna
2cd8f59845 [VAULT-19341] convert secrets engines, learn more to ts and fix date bug (#22762) 2023-09-05 14:44:20 -07:00
hc-github-team-secure-vault-core
824a8a5901 Update hashicorp/vault-plugin-auth-oci to v0.14.1 (#22774)
* Automated dependency upgrades

* Add changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
2023-09-05 13:30:06 -07:00
Angel Garbarino
83216b54c0 make change and change test (#22773) 2023-09-05 14:06:24 -06:00