Commit Graph

18491 Commits

Author SHA1 Message Date
Austin Gebauer
4016779255 defaults for token key and TTL parsing reworked, fix parse bug 2024-01-03 18:39:58 -08:00
Austin Gebauer
d1c6b63a47 defaults for token key and TTL parsing 2024-01-03 17:55:27 -08:00
Austin Gebauer
c6072c47ea adds read and write parsing helpers 2024-01-03 17:09:03 -08:00
Austin Gebauer
80b52313fe add plugin identity token params 2024-01-03 16:35:44 -08:00
Austin Gebauer
de8c8d86f8 adds field helper for plugins, subject change, token redaction stringer 2024-01-03 14:52:59 -08:00
Austin Gebauer
9df6b21727 rename role ARN field 2023-11-10 11:24:22 -08:00
Austin Gebauer
04442571e3 adds plugin identity exchange for AWS secrets engine 2023-11-07 22:03:44 -08:00
Tom Proctor
39938b841e WIP: GenerateIdentityToken method for plugin interface 2023-11-06 17:09:28 +00:00
Tom Proctor
96e551abd1 Add GenerateIdentityToken rpc to backend.proto's SystemView 2023-11-03 15:22:45 +00:00
Violet Hynes
fd2c737c51 Fix lifetime watcher user agent reporting Vault Agent for Vault Proxy requests (#23944) 2023-11-03 10:24:43 -04:00
Violet Hynes
1c9090b117 VAULT-19278 Static secret caching docs (#23621)
* VAULT-19278 First draft of static secret caching docs

* VAULT-19278 Add warning to Agent docs, fix capitalization

* VAULT-19278 typos/formatting

* VAULT-19278 changelog

* VAULT-19278 update based on PR feedback

* VAULT-19278 review feedback

* VAULT-19278 Update based on review

* VAULT-19278 update based on PR feedback

* VAULT-19278 incorporate a lot of PR feedback

* VAULT-19278 Rest of the suggestions

* VAULT-19278 I missed a suggestion

* VAULT-19278 More updates

* VAULT-19278 add docs for disable dynamic secret caching

* VAULT-19278 update changelog

* VAULT-19278 update based on comments
2023-11-02 16:01:49 -04:00
Kianna
eb9272d266 UI: Update secrets engines sidenav to title-casing (#23964) 2023-11-02 19:10:37 +00:00
Chelsea Shaw
3eb205a87d UI: chroot namespace listener (#23942) 2023-11-02 12:55:09 -05:00
Steven Clark
750ab337ea Add missing allowed_managed_key param to mount creation doc (#23948)
- We had updated the mount tune api, but missed it within the
   creation api docs
2023-11-02 08:26:00 -04:00
divyaac
3e94f2fcb5 Added OSS changes (#23951) 2023-11-01 23:12:51 +00:00
l-with
934efb9177 add LimitCORE=0 to vault.service (#23272)
* add LimitCORE=0

* add changelog
2023-11-01 15:57:52 -04:00
kpcraig
dd15e5296f Add documentation for new ldap param (#23817) 2023-11-01 11:33:53 -04:00
Sarah Chavis
95535193a4 link to compliance page for vault instead of a pdf (#23931) 2023-10-31 16:59:54 -07:00
Raymond Ho
2c8dea8733 remove subscription id in docs (#23923) 2023-10-31 15:17:57 -07:00
Ellie
63ab253cb4 Add command to inspect vault snapshots (#23457)
* add vault operator inspect command

* tidy

* add tests

* add changelog

* Update command/operator_raft_snapshot_inspect.go

Co-authored-by: Jason O'Donnell <2160810+jasonodonnell@users.noreply.github.com>

* Update command/operator_raft_snapshot_inspect.go

Co-authored-by: Jason O'Donnell <2160810+jasonodonnell@users.noreply.github.com>

* Update command/operator_raft_snapshot_inspect.go

Co-authored-by: Jason O'Donnell <2160810+jasonodonnell@users.noreply.github.com>

* Update command/operator_raft_snapshot_inspect.go

Co-authored-by: Jason O'Donnell <2160810+jasonodonnell@users.noreply.github.com>

* Update command/operator_raft_snapshot_inspect.go

Co-authored-by: Jason O'Donnell <2160810+jasonodonnell@users.noreply.github.com>

* remove test.snapshot file and create snapshot during test

* fix help text and add custom format flag

* Update changelog/23457.txt

Co-authored-by: Jason O'Donnell <2160810+jasonodonnell@users.noreply.github.com>

* add check that kvdepth is not less than zero

* remove kvprefix from flag names

* set details flag to default to true

* remove total size, we don't use it

* fix test that referenced old flag names

* add size calculations

* return all keys if depth set to 0

* Update command/operator_raft_snapshot_inspect.go

Co-authored-by: Jason O'Donnell <2160810+jasonodonnell@users.noreply.github.com>

* Update command/operator_raft_snapshot_inspect.go

Co-authored-by: Jason O'Donnell <2160810+jasonodonnell@users.noreply.github.com>

* Update command/operator_raft_snapshot_inspect.go

* revert go.mod

* update comment on temp file

* update comment on closing writer

* remove temporary file, and process state.bin in memory

* return metadata like info

* remove unnused function

* remove ReadSnapshot func, and unnecessary goroutine

* remove handler, and zero values

* move defer, and return error instead of logging

* add subcommand doc

* remove -format flag

* remove comments

* change copy to copyN

* remove formatters

* remove formatters

* remove duplicate check

* fix error checks

* remove unused consts

---------

Co-authored-by: Jason O'Donnell <2160810+jasonodonnell@users.noreply.github.com>
2023-10-31 14:48:37 -05:00
Ryan Cragun
30a8435499 [QT-617] Add seal migration to seal_ha scenario (#23919)
Test HA seal migration in the `seal_ha` by removing the primary seal,
ensuring seal rewrap has completed, and verifying that data written
through the primary seal is available in the new primary seal.
We also add a verification for the seal type at various stages of the scenario.

* Allow configuring the seal alias and priority in the `start_vault`
  module.
* Add seal migration to `seal_ha` scenario.
* Verify the data written through the original primary seal after the
  seal migration.
* [QT-629] Verify the seal type at various stages in `seal_ha`.

Signed-off-by: Ryan Cragun <me@ryan.ec>
2023-10-31 19:42:26 +00:00
Kyle Schochenmaier
ec610f273f [docs] update docs for latest 0.26.0 release (#23890)
* update docs for latest release
* update to 0.26.1
2023-10-31 11:19:57 -07:00
Marc Boudreau
6af8bc7ce0 replace nytimes/gziphandler with klauspost/compress/gzhttp (#23898) 2023-10-31 12:38:07 -04:00
davidadeleon
9b1120b083 Skip unnecessary deriving of policies from entity on Login MFA check (#23894)
* skip unnecessary deriving of policies from entity on Login MFA check

* add changelog
2023-10-31 10:15:44 -04:00
Nick Downs
b9b72ec321 Fix undelete for mount paths that are deeper than one level (#19811)
* Fix for undelete for mount paths

* Pulled in a fix from kv_delete.go that adds partialPath to
  the mountPath to support paths that are multiple levels deep.
* Added undelete tests to validate that KV secrets can be successfully
  undeleted when mounted at a multi-level mount path.
* Added changelog txt file

* Update changelog to specify KV impact

---------

Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
2023-10-31 09:08:12 -04:00
Jordan Reimer
21a07110e1 fixes flaky enterprise control group test (#23911) 2023-10-30 16:39:12 -06:00
Paul Banks
063456495a Fix race that can lead to panic during seal (#23906)
* Fix race that can lead to panic during seal

* Add changelog
2023-10-30 18:26:33 +00:00
Jason O'Donnell
66494c8129 core: fix bug where deadlock detection was always on for expiration and quotas (#23902)
* server: fix bug where deadlock detection was on for expiration and quotas

* trim spaces

* Add tests

* Use trimspace and lower

* Update test

* changelog

* fix config parsing
2023-10-30 12:49:46 -04:00
Hamid Ghaf
26bae55997 fix a bug reading auth mount using sys/internal/ui/mount endpoint when filter paths are enforced (#23802)
* fix a bug reading auth mount using sys/internal/ui/mount endpoint

* CL

* fix CL
2023-10-30 08:15:15 -07:00
aphorise
40e00d812f Core: interactive CLI improvement VAULT_ADDR warning message (#17076) 2023-10-30 11:08:55 -04:00
Ellie
b0e8471b87 docs/update docs with known issue (#23866)
* update docs with known issue

* Update website/content/partials/internal-error-namespace-missing-policy.mdx

Co-authored-by: davidadeleon <56207066+davidadeleon@users.noreply.github.com>

* Update website/content/partials/internal-error-namespace-missing-policy.mdx

Co-authored-by: davidadeleon <56207066+davidadeleon@users.noreply.github.com>

* add upgrade and release notes and change file location

* add 1.13 and 1.14 release and upgrade docs

---------

Co-authored-by: davidadeleon <56207066+davidadeleon@users.noreply.github.com>
2023-10-27 16:21:23 -05:00
Jordan Reimer
fdfbc25c87 Revert Namespace Test Fix Attempt (#23888)
* Revert "attempts to fix flaky namespace test (#23867)"

This reverts commit 0e36973825.

* skips flaky namespace test

* fixes typo in comment

* adds comment as to why test is being skipped
2023-10-27 20:16:26 +00:00
Kianna
04676c0eb5 UI: [VAULT-17700] Part 3 HDS button (#23830) 2023-10-27 10:13:44 -07:00
Kianna
2b51e09bda UI: Add copyright header to swagger-ui-test (#23843)
Co-authored-by: Angel Garbarino <Monkeychip@users.noreply.github.com>
2023-10-27 09:37:15 -07:00
Marc Boudreau
987294660b fix test that breaks when VersionMetadata is set by compiler (#23883) 2023-10-27 12:21:21 -04:00
Josh Black
425b1e333d etcd backend listing should only require keys (#23872)
* listing should only require keys

* correct misspelling

* add changelog
2023-10-27 09:17:50 -07:00
Jason O'Donnell
29d8929824 api/seal-status: fix deadlock when namespace is set on seal-status calls (#23861)
* api/seal-status: fix deadlock when namespace is set on seal-status calls

* changelog
2023-10-27 09:59:50 -04:00
miagilepner
fb97a459ec VAULT-3825: Wildcard ACL policies without a trailing slash should match LIST operations (#23874)
* allow lists to match without trailing slash

* changelog
2023-10-27 15:59:41 +02:00
Victor Rodriguez
40e9fcde49 Remove the Seal HA beta feature flag (#23820) 2023-10-27 09:13:06 -04:00
mickael-hc
a76f71cc60 fix security-scanner: temporarily pin semgrep to 1.45.0 (#23855) 2023-10-27 07:30:04 -04:00
Jordan Reimer
0e36973825 attempts to fix flaky namespace test (#23867) 2023-10-26 15:41:11 -06:00
Ryan Cragun
a46def288f [QT-616] Add seal_ha enos scenario (#23812)
Add support for testing Vault Enterprise with HA seal support by adding
a new `seal_ha` scenario that configures more than one seal type for a
Vault cluster. We also extend existing scenarios to support testing
with or without the Seal HA code path enabled.

* Extract starting vault into a separate enos module to allow for better
  handling of complex clusters that need to be started more than once.
* Extract seal key creation into a separate module and provide it to
  target modules. This allows us to create more than one seal key and
  associate it with instances. This also allows us to forego creating
  keys when using shamir seals.
* [QT-615] Add support for configuring more that one seal type to
  `vault_cluster` module.
* [QT-616] Add `seal_ha` scenario
* [QT-625] Add `seal_ha_beta` variant to existing scenarios to test with
  both code paths.
* Unpin action-setup-terraform
* Add `kms:TagResource` to service user IAM profile

Signed-off-by: Ryan Cragun <me@ryan.ec>
2023-10-26 15:13:30 -06:00
Steven Clark
8c9929bed2 Update specifics around managed keys support in Transit (#23795) 2023-10-26 13:45:15 -04:00
Marc Boudreau
550c99ae3b VAULT-20669: Add New Authenticated Endpoint for Version (#23740)
* add sys/internal/ui/version path

* add read capability for sys/internal/ui/version in default policy

* add changelog file

* doc: add api-docs page for sys/internal/ui/version

* add godoc for pathInternalUIVersion function

* add tests for functions in version package

* remove unreachable code

* use closure to restore version at end of test function

* use an example version in sample response

* Update website/content/api-docs/system/internal-ui-version.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Apply suggestions from code review

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/api-docs/system/internal-ui-version.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* add copyright header to version_test.go

---------

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2023-10-26 12:52:52 -04:00
Theron Voran
41cc3b31bf docs/vault-helm: updates for the last release (v0.25.0) (#23844) 2023-10-26 08:37:54 -07:00
Scott Miller
cd761dfa0a Document the seal HA metrics and use labels for seal names (#23837)
* Document the seal HA metrics and use labels for seal names

* changelog
2023-10-26 10:07:34 -05:00
Scott Miller
307d27ef77 Add a couple more places with entropy augmentation (#23854) 2023-10-26 10:07:14 -05:00
hc-github-team-secure-vault-core
b7a97cba92 Update hashicorp/vault-plugin-secrets-mongodbatlas to v0.10.2 (#23849)
* Automated dependency upgrades

* Add changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
2023-10-26 09:23:42 -04:00
Andreas Gruhler
548b7a094b Fix backticks for cluster_aia_path (#23845) 2023-10-26 08:28:16 -04:00
akshya96
8c95d904f7 Fix segments fragments loss (#23781)
* add ent changes

* add changelog

* make fmt
2023-10-25 21:02:58 +00:00