Commit Graph

18722 Commits

Author SHA1 Message Date
Mike Palmiotto
30e9a17619 agent: Fix missing file suffix in config test (#17245) 2022-09-21 11:30:04 -04:00
Kit Haines
410ecba6af Fix non-atomic read of atomic value fix (#17255)
* Always load to access certCount

* Test-reads of the atomic value.
2022-09-21 11:24:34 -04:00
Angel Garbarino
613498cbc9 PKI Keys List View (#17239)
* setup

* cleanup

* cleanup
2022-09-21 08:41:44 -06:00
Bernd Straehle
cb5e7e16f1 vault-plugin-secrets-apigee (#17249) 2022-09-21 09:08:25 -04:00
Angel Garbarino
8c70057d75 PKI Certificates List View (#17236)
* setup

* cleanup

* cleanup

* cleanup

* remove filtering for now:
2022-09-20 17:22:37 -06:00
Mark Collao
933e65267c Merge branch 'main' of github.com:hashicorp/vault 2022-09-20 16:33:25 -05:00
Mark Collao
d6e7770617 update changelog 2022-09-20 16:32:37 -05:00
Alexander Scheel
b2d6fc0a92 Prevent PSS with Go-incompatible CAs, CSRs, Private Keys (#17223)
* Fix interoperability concerns with PSS

When Go parses a certificate with rsaPSS OID, it will accept this
certificate but not parse the SubjectPublicKeyInfo, leaving the
PublicKeyAlgorithm and PublicKey fields blank, but otherwise not erring.
The same behavior occurs with rsaPSS OID CSRs.

On the other hand, when Go parses rsaPSS OID PKCS8 private keys, these
keys will fail to parse completely.

Thus, detect and fail on any empty PublicKey certs and CSRs, warning the
user that we cannot parse these correctly and thus refuse to operate.

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Run more PKI tests in parallel

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add notes about PSS shortcomings to considerations

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2022-09-20 17:30:58 -04:00
Steven Clark
60e65ae710 Fix fmt error (#17241) 2022-09-20 13:33:01 -07:00
Steven Clark
e70e993a32 Update Vault on main to pull in SDK 1.13 version bump (#17240) 2022-09-20 16:08:06 -04:00
Steven Clark
b5b65fe1dd Bump version in SDK to 1.13 for next major release (#17233) 2022-09-20 15:40:06 -04:00
Jordan Reimer
7475334253 adds enhanced checks for hcp link status timestamp and error message and uses HCP abbreviation in messaging (#17235) 2022-09-20 12:57:32 -06:00
Kit Haines
06097d8c83 Basics of Cert-Count Non-Locking Telemetry (#16676)
Basics of Cert-Count Telemetry, changelog,  "best attempt" slice to capture (and test for) duplicates, Move sorting of possibleDoubleCountedRevokedSerials to after compare of entries. Add values to counter when still initializing.
Set lists to nil after use, Fix atomic2 import, Delay reporting metrics until after deduplication has completed, 
The test works now, Move string slice to helper function; Add backendUUID to gauge name.
2022-09-20 10:32:20 -07:00
Angel Garbarino
88a69457e1 PKI Issuer List view (#17210)
* initial setup for issuers toolbar and some slight changes to roles model after discussion with design.

* wip

* wip ... :/

* finalizes serializer and linkedblock iteration of is_default

* clean up

* fix

* forgot this bit

* pr comments amendments:

* small PR comment changes
2022-09-20 09:25:57 -06:00
Nick Cabatoff
cbbf1a5593 Break grabLockOrStop into two pieces to facilitate investigating deadlocks (#17187)
Break grabLockOrStop into two pieces to facilitate investigating deadlocks.  Without this change, the "grab" goroutine looks the same regardless of who was calling grabLockOrStop, so there's no way to identify one of the deadlock parties.
2022-09-20 11:03:16 -04:00
Steven Clark
a156f4e4a6 update vault auth submodules to api/v1.8.0 (#17228) api/auth/approle/v0.3.0 api/auth/ldap/v0.3.0 api/auth/kubernetes/v0.3.0 api/auth/gcp/v0.3.0 api/auth/azure/v0.3.0 api/auth/userpass/v0.3.0 api/auth/aws/v0.3.0 2022-09-20 10:51:51 -04:00
Steven Clark
f49421e6e8 update vault to api/v1.8.0 (#17227) 2022-09-20 10:31:08 -04:00
Steven Clark
d849e51d76 update api to use sdk/v0.6.0 (#17224) api/v1.8.0 2022-09-20 10:11:29 -04:00
Nick Cabatoff
57ac8f3236 Handle when pluginCatalog.Get returns (nil,nil) during cred backend creation (#17204) sdk/v0.6.0 2022-09-20 08:57:08 -04:00
Nick Cabatoff
d8765f2499 We don't need to test LifetimeWatcher's behaviour with database leases specifically. (#17208) 2022-09-20 08:23:51 -04:00
Tom Proctor
d6d03ac373 Plugins: Consistently use plugin_version (#17171)
* Delete Sha field, rename RunningSha -> RunningSha256
* Rename version -> plugin_version
2022-09-20 12:35:50 +01:00
Tom Proctor
158a55d789 Upgrade vault-plugin-auth-centrify to v0.13.0 (#17195) 2022-09-20 06:05:50 -04:00
vinay-gopalan
011b3d1136 Re-initialize v5 backend after a plugin crash (#17140) 2022-09-19 16:48:45 -07:00
Christopher Swenson
3ba31eb665 fix: upgrade vault-plugin-database-elasticsearch to v0.12.0 (#17203) 2022-09-19 14:46:23 -07:00
Christopher Swenson
973186b4f3 fix: upgrade vault-plugin-database-couchbase to v0.8.0 (#17205) 2022-09-19 14:12:33 -07:00
claire bontempo
140f956069 UI: Add 'disable' to CRL config (#17153)
* add disable to crl attrs

* add changelog

* change styling per design

* update tests and fix default setting of buildCrl

* cleanup + refactor
2022-09-19 14:03:50 -07:00
Robert
498310dde3 secrets/ad: update plugin to v0.14.0 (#17214) 2022-09-19 16:03:17 -05:00
Steven Clark
72799f7bdf Update protos to match update of protobuf go library (#17215) 2022-09-19 16:45:44 -04:00
Jordan Reimer
a2d818bf0a HCP Link Status Updates (#17213)
* updates hcp link status message parsing and adds handling for connection errors

* adds handling for missing status to link-status component
2022-09-19 14:37:40 -06:00
Ben Ash
ade0b417a4 fix: upgrade vault-plugin-auth-oci to v0.12.0 (#17212) 2022-09-19 13:34:44 -07:00
Milena Zlaticanin
2df790ae0d secrets/mongodbatlas: upgrade plugin to v0.8.0 (#17211) 2022-09-19 15:13:36 -05:00
Tom Proctor
71681ea493 Upgrade vault-plugin-auth-cf to v0.13.0 (#17196) 2022-09-19 19:24:24 +01:00
Tom Proctor
16189ca379 Upgrade vault-plugin-auth-azure to v0.12.0 (#17194) 2022-09-19 19:22:09 +01:00
Hamid Ghaf
3eafec8f45 adding missing telemetry entry for cached auth response (#17197) 2022-09-19 14:08:39 -04:00
Ben Ash
5f868e6a4b Update changelog for gcpkms dep updates. (#17202) 2022-09-19 11:00:37 -07:00
Ben Ash
204ca3fff9 fix: upgrade vault-plugin-secrets-alicloud to v0.13.0 (#17201) 2022-09-19 10:39:36 -07:00
Christopher Swenson
6ed23ee7a2 fix: upgrade vault-plugin-database-mongodbatlas to v0.8.0 (#17200) 2022-09-19 10:16:20 -07:00
vinay-gopalan
c6e024206c bump secrets/azure to v0.14.0 (#17180) 2022-09-19 10:02:57 -07:00
Ben Ash
bc1e2e61e3 fix: upgrade vault-plugin-secrets-gcpkms to v0.13.0 (#17199) 2022-09-19 12:56:56 -04:00
vinay-gopalan
99e54aa4fd bump secrets/kv to v0.13.0 (#17175) 2022-09-19 09:40:52 -07:00
Yoko Hyakuna
0ff853d8d3 Fix a broken URL (#17192) 2022-09-19 08:57:07 -07:00
Steven Clark
523e916013 Bring back managed key documentation update from ENT to OSS (#17190) 2022-09-19 11:46:30 -04:00
Alexander Scheel
9f3955bdbd Don't race for CRL rebuilding capability check (#17185)
* Don't race for CRL rebuilding capability check

Core has recently seen some data races during SystemView/replication
updates between them and the PKI subsystem. This is because this
SystemView access occurs outside of a request (during invalidation
handling) and thus the proper lock isn't held.

Because replication status cannot change within the lifetime of a plugin
(and instead, if a node switches replication status, the entire plugin
instance will be torn down and recreated), it is safe to cache this
once, at plugin startup, and use it throughout its lifetime.

Thus, we replace this SystemView access with a stored boolean variable
computed ahead of time.

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Update builtin/logical/pki/backend.go

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2022-09-19 11:41:32 -04:00
Steven Clark
82f7b7d334 Update OSS dependencies to match newer versions that ENT is using (#17188) 2022-09-19 10:33:36 -04:00
Max Coulombe
5abe1f8e36 + added Redis ElastiCache documentation (#17133)
* added Redis ElastiCache documentation
2022-09-19 10:26:49 -04:00
Steven Clark
d7f4bc3e08 Update missing go-kms-wrapping v2 dep and address some ENT->OSS drift (#17178)
* Update missing go-kms-wrapping v2 dep and address some ENT->OSS drift

* Bump go-kms-wrapping/wrappers/gcpckms/v2 to v2.0.1
2022-09-19 10:23:40 -04:00
Alexander Scheel
9a80004dce Fix race in cert auth tests (#17181)
There were two races here:

 1. Tests racing against periodic func on updating the backend.
 2. Tests racing internally to itself, to access the http-served
    CRL data.

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2022-09-19 09:09:03 -04:00
Mike Palmiotto
585abb2cac semgrep: Add replication-has-state and fix findings (#17179) 2022-09-19 08:15:27 -04:00
vinay-gopalan
5ac5eb6f9d update changelog with google dep updates (#17176) 2022-09-16 15:46:46 -07:00
Robert
af3b73c3a6 auth/kerberos: update plugin to v0.8.0 (#17173)
* Update plugin version to v0.8.0
2022-09-16 16:50:12 -05:00