Commit Graph

5268 Commits

Author SHA1 Message Date
Meggie
2aaeb55a4d Clarify Vault versions, some upgrade guidance (#24396)
* Creating a Vault version explainer

The explainer is a partial that can be used on multiple pages. It gives an overview of our policies and version format and offers some recommendations about staying current.

* Apostrophe typo

Not saying I got all the typos, but got one anyway.

* Add a note about the very rare 4th digit

* Conform to subtitle best practices

Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>

---------

Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
2023-12-06 15:36:48 -05:00
Steven Clark
a41852379b Document and augment tests that PKI accepts 8192 bit RSA keys (#24364)
- Noticed that our documentation was out of date, we allow 8192
   bit RSA keys to be used as an argument to the various PKI
   issuer/key creation APIs.
 - Augument some unit tests to verify this continues to work
2023-12-05 15:26:03 -05:00
Ben Ash
9e063f31d7 Update VSO docs for v0.4.1 (#24356) 2023-12-04 20:29:31 -05:00
Milena Zlaticanin
aa9b02307d Update Azure Secrets docs (#24279) 2023-12-04 15:41:25 -07:00
Peter Wilson
06b9325bb9 fix -log-file so that it uses the correct name and only adds timestamps on rotation (#24297)
* fix -log-file so that it uses the correct name and only adds timestamps on rotation

* added some tests for naming/rotation

* changelog

* revert to previous way of getting created time

* remove unused stat

* comment shuffle

* Update changelog/24297.txt

Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>

* Update website/content/docs/agent-and-proxy/agent/index.mdx

Update 'agent' docs page

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/docs/agent-and-proxy/proxy/index.mdx

Update 'proxy' docs page

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/docs/commands/server.mdx

Update 'server' docs page

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* fix typos

---------

Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2023-12-01 11:30:34 +00:00
Peter Wilson
3ae669df34 Bump the node version (#24304)
* make node happy

* Updated package-lock.json for website
2023-11-30 19:30:31 +00:00
Violet Hynes
2dd3ab9da0 Correct required policy in static secret caching docs (#24282) 2023-11-28 16:52:21 -05:00
Tom Proctor
030bba4e68 Support rootless plugin containers (#24236)
* Pulls in github.com/go-secure-stdlib/plugincontainer@v0.3.0 which exposes a new `Config.Rootless` option to opt in to extra container configuration options that allow establishing communication with a non-root plugin within a rootless container runtime.
* Adds a new "rootless" option for plugin runtimes, so Vault needs to be explicitly told whether the container runtime on the machine is rootless or not. It defaults to false as rootless installs are not the default.
* Updates `run_config.go` to use the new option when the plugin runtime is rootless.
* Adds new `-rootless` flag to `vault plugin runtime register`, and `rootless` API option to the register API.
* Adds rootless Docker installation to CI to support tests for the new functionality.
* Minor test refactor to minimise the number of test Vault cores that need to be made for the external plugin container tests.
* Documentation for the new rootless configuration and the new (reduced) set of restrictions for plugin containers.
* As well as adding rootless support, we've decided to drop explicit support for podman for now, but there's no barrier other than support burden to adding it back again in future so it will depend on demand.
2023-11-28 14:07:07 +00:00
Robert
3726d8fb1d Add configuration section to sync API docs (#24179)
* Add configuration section

* Add restricted root namespace alert
2023-11-27 16:10:37 -06:00
Raymond Ho
e69b0b2bcf add custom permissions for azurekv (#23298) 2023-11-27 17:46:20 +00:00
Steven Clark
b7dff9777d Allow backends to extract credentials from payloads and trigger an authentication workflow (#23924)
* wip

* Work on the tuneable allowance and some bugs

* Call handleCancellableRequest instead, which gets the audit order more correct and includes the preauth response

* Get rid of no longer needed operation

* Phew, this wasn't necessary

* Add auth error handling by the backend, and fix a bug with handleInvalidCredentials

* Cleanup req/resp naming

* Use the new form, and data

* Discovered that tokens werent really being checked because isLoginRequest returns true for the re-request into the backend, when it shouldnt

* Add a few more checks in the delegated request handler for bad inputs

 - Protect the delegated handler from bad inputs from the backend such
   as an empty accessor, a path that isn't registered as a login request
 - Add similar protections for bad auth results as we do in the normal
   login request paths. Technically not 100% needed but if somehow the
   handleCancelableRequest doesn't use the handleLoginRequest code path
   we could get into trouble in the future
 - Add delegated-auth-accessors flag to the secrets tune command and
   api-docs

* Unit tests and some small fixes

* Remove transit preauth test, rely on unit tests

* Cleanup and add a little more commentary in tests

* Fix typos, add another failure use-case which we reference a disabled auth mount

* PR Feedback

 - Use router to lookup mount instead of defining a new lookup method
 - Enforce auth table types and namespace when mount is found
 - Define a type alias for the handleInvalidCreds
 - Fix typos/grammar
 - Clean up globals in test

* Additional PR feedback

 - Add test for delegated auth handler
 - Force batch token usage
 - Add a test to validate failures if a non-batch token is used
 - Check for Data member being nil in test cases

* Update failure error message around requiring batch tokens

* Trap MFA requests

* Reword some error messages

* Add test and fixes for delegated response wrapping

* Move MFA test to dedicated mount

 - If the delegated auth tests were running in parallel, the MFA test
   case might influence the other tests, so move the MFA to a dedicated
   mount

* PR feedback: use textproto.CanonicalMIMEHeaderKey

 - Change the X-Vault-Wrap-Ttl constant to X-Vault-Wrap-TTL
   and use textproto.CanonicalMIMEHeaderKey to format it
   within the delete call.
 - This protects the code around changes of the constant typing

* PR feedback

 - Append Error to RequestDelegatedAuth
 - Force error interface impl through explicit nil var assignment on
   RequestDelegatedAuthError
 - Clean up test factory and leverage NewTestSoloCluster
 - Leverage newer maps.Clone as this is 1.16 only

---------

Co-authored-by: Scott G. Miller <smiller@hashicorp.com>
2023-11-21 14:36:49 -05:00
Scott Miller
66b3e439d8 wordsmithing (#24205) 2023-11-21 09:53:41 -06:00
Steven Clark
53040690a2 PKI: Do not set NextUpdate OCSP field when ocsp_expiry is 0 (#24192)
* Do not set NextUpdate OCSP field when ocsp_expiry is 0

* Add cl
2023-11-20 10:32:05 -05:00
Theron Voran
5415d3c8a1 docs/vault-secrets-operator: GKE workload identity auth (#23684)
Adding overview docs for using GKE workload identity with Vault
Secrets Operator under Secret Sources/Vault/Auth Methods/. Updates the
Vault Auth method section in the Vault/Auth Methods overview page with
links to the VSO API sections for the other supported auth methods
(until they have their own pages).
---------
Co-authored-by: Tom Proctor <tomhjp@users.noreply.github.com>
2023-11-17 11:06:10 -08:00
Theron Voran
f951fe5429 docs/vault-helm: updates for v0.27.0 release (#24178) 2023-11-17 10:13:48 -08:00
Ben Ash
fb29c1437a Update VSO docs for v0.4.0 (#24171) 2023-11-16 17:00:22 -05:00
Max Coulombe
af46b954f6 Document secrets sync LIST request modifications (#23975)
* * document list request adjustments

---------

Co-authored-by: Robert <17119716+robmonte@users.noreply.github.com>
2023-11-10 09:04:26 -05:00
davidadeleon
880f4a35d7 Remove duplicate partial reference from release-notes (#24081)
* remove partial references from release-notes that link to upgrade guides, and change link in partial to anchor

* Clarify leak is memory consumption

There is no leak of information.

* update references in table

* update table to include range for affected versions

---------

Co-authored-by: Meggie Ladlow <meggie@hashicorp.com>
2023-11-09 13:48:27 -05:00
davidadeleon
05eba71561 uupdate latest known issues to reflect fixes arriving in latest release (#24077) 2023-11-09 08:33:11 -08:00
davidadeleon
d3bed43f40 Docs: Add expiration metrics fatal error known issue (#24050)
* add expiration metrics fatal error known issue

* adjust expected fix releases

* provide more clarity around issue
2023-11-08 23:40:50 +00:00
Robert
54bf0807c1 secrets/aws: add support for STS Session Tokens with TOTP (#23690)
* Add test coverage

* Add session_token field, deprecate security_token

* Undo auth docs

* Update api docs

* Add MFA code support

---------

Co-authored-by: Graham Christensen <graham@grahamc.com>
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
Co-authored-by: Austin Gebauer <34121980+austingebauer@users.noreply.github.com>
2023-11-08 17:06:28 -06:00
davidadeleon
6646eebbc8 Docs: Update ephemeral logger leak known issue (#24041)
* update known issue

* update known issue partial

* fix links

* Update website/content/partials/known-issues/ephemeral-loggers-memory-leak.mdx

Co-authored-by: Mike Palmiotto <mike.palmiotto@hashicorp.com>

* standardize on sub-loggers

* update known issue

* update versions

* update messaging to include reference to previous known issue

---------

Co-authored-by: Mike Palmiotto <mike.palmiotto@hashicorp.com>
2023-11-08 14:01:29 -05:00
Mike Palmiotto
35545f5104 docks: Fix confusing version references in Known Issue (#24051) 2023-11-07 15:18:39 -05:00
Mike Palmiotto
d5e84cf4a3 docs: Known issue for unchanged sublogger levels on reload (#24048) 2023-11-07 14:57:26 -05:00
Max Coulombe
c7f4ee6867 + add GHA snippet to obfuscate synced secrets (#23972) 2023-11-05 20:35:37 -05:00
Ellie
5476a5cbf4 docs: add workaround to known issue loading missing policies from other namespaces (#23909)
* add workaround to known issue with loading missing policies from other namespaces

* remove backtick

* Update website/content/partials/known-issues/internal-error-namespace-missing-policy.mdx

Co-authored-by: davidadeleon <56207066+davidadeleon@users.noreply.github.com>

* fix formatting

* Update website/content/partials/known-issues/internal-error-namespace-missing-policy.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/partials/known-issues/internal-error-namespace-missing-policy.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/partials/known-issues/internal-error-namespace-missing-policy.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/partials/known-issues/internal-error-namespace-missing-policy.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/partials/known-issues/internal-error-namespace-missing-policy.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/partials/known-issues/internal-error-namespace-missing-policy.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/partials/known-issues/internal-error-namespace-missing-policy.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/partials/known-issues/internal-error-namespace-missing-policy.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* update count

* Update website/content/partials/known-issues/internal-error-namespace-missing-policy.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/partials/known-issues/internal-error-namespace-missing-policy.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* add link to table

* change naming

* fix reference

* remove backtick

---------

Co-authored-by: davidadeleon <56207066+davidadeleon@users.noreply.github.com>
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2023-11-03 18:52:08 -05:00
davidadeleon
44edd24093 Docs: Update known issues table logger leak (#24012)
* add logger memory leak to known issues table

* fix version number for 1.15
2023-11-03 17:56:01 -04:00
davidadeleon
f0f5d4f906 Add known issue for sublogger memory leak (#23977)
* add known issue for sublogger memory leak

* update known issue

* Update website/content/partials/known-issues/ephemeral-loggers-memory-leak.mdx

Co-authored-by: Hamid Ghaf <83242695+hghaf099@users.noreply.github.com>

* Update website/content/partials/known-issues/ephemeral-loggers-memory-leak.mdx

Co-authored-by: Jason O'Donnell <2160810+jasonodonnell@users.noreply.github.com>

* Update website/content/partials/known-issues/ephemeral-loggers-memory-leak.mdx

Co-authored-by: Brian Kassouf <briankassouf@users.noreply.github.com>

---------

Co-authored-by: Hamid Ghaf <83242695+hghaf099@users.noreply.github.com>
Co-authored-by: Jason O'Donnell <2160810+jasonodonnell@users.noreply.github.com>
Co-authored-by: Brian Kassouf <briankassouf@users.noreply.github.com>
2023-11-03 19:52:28 +00:00
Yoko Hyakuna
9538c6e59b Update 'vault-secrets' to 'Vault' for clarify (#23993) 2023-11-03 14:00:27 -04:00
Yoko Hyakuna
d93a13a7e3 [On-Hold] Update the GH Action URL (#23290)
* Update the GH Action URL

* Update github-actions.mdx
2023-11-03 17:22:40 +00:00
Violet Hynes
1c9090b117 VAULT-19278 Static secret caching docs (#23621)
* VAULT-19278 First draft of static secret caching docs

* VAULT-19278 Add warning to Agent docs, fix capitalization

* VAULT-19278 typos/formatting

* VAULT-19278 changelog

* VAULT-19278 update based on PR feedback

* VAULT-19278 review feedback

* VAULT-19278 Update based on review

* VAULT-19278 update based on PR feedback

* VAULT-19278 incorporate a lot of PR feedback

* VAULT-19278 Rest of the suggestions

* VAULT-19278 I missed a suggestion

* VAULT-19278 More updates

* VAULT-19278 add docs for disable dynamic secret caching

* VAULT-19278 update changelog

* VAULT-19278 update based on comments
2023-11-02 16:01:49 -04:00
Steven Clark
750ab337ea Add missing allowed_managed_key param to mount creation doc (#23948)
- We had updated the mount tune api, but missed it within the
   creation api docs
2023-11-02 08:26:00 -04:00
kpcraig
dd15e5296f Add documentation for new ldap param (#23817) 2023-11-01 11:33:53 -04:00
Sarah Chavis
95535193a4 link to compliance page for vault instead of a pdf (#23931) 2023-10-31 16:59:54 -07:00
Raymond Ho
2c8dea8733 remove subscription id in docs (#23923) 2023-10-31 15:17:57 -07:00
Kyle Schochenmaier
ec610f273f [docs] update docs for latest 0.26.0 release (#23890)
* update docs for latest release
* update to 0.26.1
2023-10-31 11:19:57 -07:00
Jason O'Donnell
66494c8129 core: fix bug where deadlock detection was always on for expiration and quotas (#23902)
* server: fix bug where deadlock detection was on for expiration and quotas

* trim spaces

* Add tests

* Use trimspace and lower

* Update test

* changelog

* fix config parsing
2023-10-30 12:49:46 -04:00
Ellie
b0e8471b87 docs/update docs with known issue (#23866)
* update docs with known issue

* Update website/content/partials/internal-error-namespace-missing-policy.mdx

Co-authored-by: davidadeleon <56207066+davidadeleon@users.noreply.github.com>

* Update website/content/partials/internal-error-namespace-missing-policy.mdx

Co-authored-by: davidadeleon <56207066+davidadeleon@users.noreply.github.com>

* add upgrade and release notes and change file location

* add 1.13 and 1.14 release and upgrade docs

---------

Co-authored-by: davidadeleon <56207066+davidadeleon@users.noreply.github.com>
2023-10-27 16:21:23 -05:00
Steven Clark
8c9929bed2 Update specifics around managed keys support in Transit (#23795) 2023-10-26 13:45:15 -04:00
Marc Boudreau
550c99ae3b VAULT-20669: Add New Authenticated Endpoint for Version (#23740)
* add sys/internal/ui/version path

* add read capability for sys/internal/ui/version in default policy

* add changelog file

* doc: add api-docs page for sys/internal/ui/version

* add godoc for pathInternalUIVersion function

* add tests for functions in version package

* remove unreachable code

* use closure to restore version at end of test function

* use an example version in sample response

* Update website/content/api-docs/system/internal-ui-version.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Apply suggestions from code review

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/api-docs/system/internal-ui-version.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* add copyright header to version_test.go

---------

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2023-10-26 12:52:52 -04:00
Theron Voran
41cc3b31bf docs/vault-helm: updates for the last release (v0.25.0) (#23844) 2023-10-26 08:37:54 -07:00
Scott Miller
cd761dfa0a Document the seal HA metrics and use labels for seal names (#23837)
* Document the seal HA metrics and use labels for seal names

* changelog
2023-10-26 10:07:34 -05:00
Scott Miller
307d27ef77 Add a couple more places with entropy augmentation (#23854) 2023-10-26 10:07:14 -05:00
Andreas Gruhler
548b7a094b Fix backticks for cluster_aia_path (#23845) 2023-10-26 08:28:16 -04:00
Jonathan Frappier
c0ad3f6ce2 Update link for MongoDB Atlas database secrets engine (#23831)
* Update link for MongoDB Atlas database secrets engine

* Fix callout spacing
2023-10-25 15:17:43 -04:00
Theron Voran
8d7c81019b docs/vault-k8s: v1.3.1 release updates (#23826) 2023-10-25 11:56:08 -07:00
Yoko Hyakuna
adb025542c Fix reported link issue (#23813) 2023-10-25 08:38:45 -07:00
claire bontempo
db4819427a docs/add line separators to curl requests secrets sync (#23681)
* add line separators to curl requests

* revert unsync change
2023-10-23 08:29:26 -07:00
John-Michael Faircloth
b2870dd23f docs: add example plugin logging (#23779) 2023-10-20 14:43:17 -07:00
Theron Voran
fe55cbbf05 docs/vault-secrets-operator v0.3.4 release update (#23775) 2023-10-20 11:21:57 -07:00