Commit Graph

18725 Commits

Author SHA1 Message Date
claire bontempo
8f69e49592 UI: HDS Adoption upgrade to design-system-components: 3.3.0 and ember-flight-icons: 4.0.4 (#24366)
* upgrade to 3.1.0

* VAULT-22471 upgrade to latest version

* fix other selectors

* fix pki tests

* fix copy dropdown

* rename selectors to be consistent
2023-12-05 13:49:36 -08:00
Chelsea Shaw
588dd73fe0 UI: handle reduced disclosure on replication endpoints (#24379)
* add replicationRedacted attribute to cluster model

* disallow access to replication pages if repl endpoints are redacted

* hide replicatio nav item

* Hide replication card on dashboard
2023-12-05 14:31:29 -06:00
Steven Clark
a41852379b Document and augment tests that PKI accepts 8192 bit RSA keys (#24364)
- Noticed that our documentation was out of date, we allow 8192
   bit RSA keys to be used as an argument to the various PKI
   issuer/key creation APIs.
 - Augument some unit tests to verify this continues to work
2023-12-05 15:26:03 -05:00
Chelsea Shaw
807aa51d7d UI: fix ent tests (#24375) 2023-12-05 18:04:33 +00:00
Peter Wilson
fcbdd5bd22 Adjust TestSudoPaths to remove audit (#24357) 2023-12-05 11:28:11 +00:00
Ben Ash
9e063f31d7 Update VSO docs for v0.4.1 (#24356) 2023-12-04 20:29:31 -05:00
divyaac
6e020e38e0 Add_Chroot_Namespace_In_Response (#24355) 2023-12-04 14:51:44 -08:00
Milena Zlaticanin
aa9b02307d Update Azure Secrets docs (#24279) 2023-12-04 15:41:25 -07:00
Hamid Ghaf
aeb817dfba Buffer body read up to MaxRequestSize (#24354) 2023-12-04 13:22:22 -08:00
Chelsea Shaw
cb217388d4 UI: handle reduced disclosure endpoints (#24262)
* Create app-footer component with tests

* glimmerize vault route + controller

* Add dev mode badge to new footer

* Fix version on dashboard

* update app-footer tests

* update version title component

* Handle case for chroot namespace fail on health check

* cleanup

* fix ent tests

* add missing headers

* extra version fetch on login success, clear version on logout and seal

* Add coverage for clearing version on seal

* rename isOSS to isCommunity

* remove is-version helper

* test version in footer on unseal flow

* fix enterprise test

* VAULT-21399 test coverage

* VAULT-21400 test coverage
2023-12-04 14:28:16 -06:00
Scott Miller
e3aa18c7f7 Make it possible to skip the seal re-wrap in progress check (#24351) 2023-12-04 13:31:05 -06:00
Christopher Swenson
6ed8b88f5f Switch from mitchellh/cli to hashicorp/cli (#24239)
@mitchellh suggested we fork `cli` and switch to that.

Since we primarily use the interfaces in `cli`, and the new
fork has not changed those, this is (mostly) a drop-in replacement.

A small fix will be necessary for Vault Enterprise, I believe.
2023-12-04 11:05:02 -08:00
Scott Miller
91ec1a788b Only use the short persistKeyring timeout for encryption count tracking (#24336)
* Only use the short persistKeyring timeout for encryption count tracking

* changelog

* accidental paste
2023-12-04 12:36:55 -06:00
Nick Cabatoff
b8f531142b Use our heartbeat echo RPCs to estimate clock skew, expose it in status APIs (#24343) 2023-12-04 12:04:38 -05:00
hc-github-team-es-release-engineering
02eadb8ecb Update LICENSE (#24264)
* Update LICENSE

* Update LICENSE

---------

Co-authored-by: Meggie <meggie@hashicorp.com>
2023-12-04 16:57:30 +00:00
Chelsea Shaw
af3901e256 UI: Update replication nav (#24283)
* replication gets its own subnav

* glimmerize replication-summary-card

* Simplify replication-summary-card

* update replication subnav + tests

* replication action block uses HDS card

* add/update test selectors

* test coverage

* Add changelog

* Update defaults on replication-summary-card

* test that the view updates between replication types

* typo
2023-12-04 10:40:34 -06:00
Meggie
9082ebc996 Update LICENSE for 1.15.3 (#24346) 2023-12-04 10:55:10 -05:00
Nick Cabatoff
31ccb2667a Ensure that Autopilot sees all nodes in KnownServers at outset (#24246) 2023-12-04 09:31:16 -05:00
Nick Cabatoff
85b3dba310 Rework sys/health tests to use structs and cmp (#24324) 2023-12-04 08:34:25 -05:00
Sarah Thompson
699fc035e0 Remove release-engineering as codeowners (#24237) 2023-12-03 10:38:45 +00:00
Rachel Culpepper
73df860e90 Vault-14651: add function for restarting cluster nodes (#24335)
* add function for restarting cluster nodes

* fix import
2023-12-01 22:07:44 +00:00
Meggie
22cbf23f47 changelog++ (#24329) 2023-12-01 16:21:39 -05:00
Raymond Ho
73f46fca3e optimize NewTestCluster (#24300) 2023-12-01 11:30:58 -08:00
Mike Palmiotto
4a7bee5a02 Always forward entity merge requests from perfStandby (#24325)
Update requests to /sys/identity/entity/merge perform merges on perfStandby nodes in memory and skip the persist call.

This commit changes the behavior for the merge endpoint, forcing it to be forwarded from the standby to the active node. This change is specifically scoped to manual merges, as automatic merges are not isolated to a specific endpoint and require careful consideration for all callers.
2023-12-01 08:47:32 -06:00
Peter Wilson
06b9325bb9 fix -log-file so that it uses the correct name and only adds timestamps on rotation (#24297)
* fix -log-file so that it uses the correct name and only adds timestamps on rotation

* added some tests for naming/rotation

* changelog

* revert to previous way of getting created time

* remove unused stat

* comment shuffle

* Update changelog/24297.txt

Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>

* Update website/content/docs/agent-and-proxy/agent/index.mdx

Update 'agent' docs page

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/docs/agent-and-proxy/proxy/index.mdx

Update 'proxy' docs page

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/docs/commands/server.mdx

Update 'server' docs page

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* fix typos

---------

Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2023-12-01 11:30:34 +00:00
miagilepner
96281c4310 split out reloadSealsEnt (#24320) 2023-12-01 10:41:02 +00:00
claire bontempo
61ee28ba3b UI: HDS adoption update <AlertInline> component to use Hds::Alert (#24299)
* replace paddingTop with clas

* use hds alert for AlertInline component

* remve isSmall arg

* add test selector back

* remove mimicRefresh arg

* update assertion for alert inline component

* update string-list

* use alert inline for string-list

* add changelog

* update block instances of alert inline

* remove p tags from test selectors

* minor cleanup
2023-12-01 00:57:32 +00:00
Hamid Ghaf
db1170576f only update license changes in ui related files in ui precommit hook (#24313) 2023-11-30 22:47:38 +00:00
Rachel Culpepper
638522ebac Vault-18638: add seal reload on SIGHUP (#23571)
* reload seals on SIGHUP

* add lock in SetSeals

* move lock

* use stubmaker and change wrapper finalize call

* change finalize logic so that old seals will be finalized after new seals are configured

* add changelog

* run make fmt

* fix fmt

* fix panic when reloading seals errors out
2023-11-30 15:08:13 -06:00
Angel Garbarino
9ddc33ab98 Fixes redirects to KV engine when secret is a directory (#24281)
* fix

* changelog

* Update 24281.txt

* add test coverage

* dont make assumptions about list
2023-11-30 13:46:39 -07:00
Raymond Ho
f5622a677a bump eventlogger dependency to v0.2.7 (#24305) 2023-11-30 20:05:25 +00:00
Peter Wilson
3ae669df34 Bump the node version (#24304)
* make node happy

* Updated package-lock.json for website
2023-11-30 19:30:31 +00:00
Christopher Swenson
9d39b6f2cb events: Add filters to keep track of local and other subscriptions (#24201)
This adds a very basic implementation of a list of namespace+eventType
combinations that each node is interested in by just running the
glob operations in for-loops. Some parallelization is possible, but
not enabled by default.

It only wires up keeping track of what the local event bus is interested
in for now (but doesn't use it yet to filter messages).

Also updates the cloudevents source URL to indicate the Vault node that generated the event.

Co-authored-by: Tom Proctor <tomhjp@users.noreply.github.com>
2023-11-30 09:49:22 -08:00
Angel Garbarino
56f793d0c8 🧹 HDS button replacement (#24230)
* namespace things

* kmip

* init and mount-info:

* ssh sign

* replication and remove type button

* fix learn more on replication mode summary

* use dropdown.

* clean up

* Update ui/lib/kv/addon/components/kv-version-dropdown.hbs

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>

* pr comments

* Update replication-mode-summary.hbs

* blah

* fix

* Update replication-mode-summary.hbs

* add back mount-info

---------

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>
2023-11-30 09:49:45 -07:00
Angel Garbarino
2e9578bc96 Default to Json editor if KV secret is nested (#24290)
* initial fix

* changelog

* fix

* fix test and add test coverage

* remove useless escape characters

* pr comments add more test coverage
2023-11-30 16:36:26 +00:00
Chelsea Shaw
b0ed4297bf UI: Prevent replication disable action from sending data payload (#24292)
* Prevent replication disable action from sending data payload

* Add changelog
2023-11-29 16:40:40 -06:00
Scott Miller
31f399d147 Re-wrap partial failure improvements, CE side (#24293)
* Re-wrap partial failure improvements, CE side

* Resolve import cycle
2023-11-29 15:42:07 -06:00
Violet Hynes
ef3021f1a4 Fix bug in static secret caching where no token is present in a request to Proxy (#24287) 2023-11-29 09:35:59 -05:00
Peter Wilson
64dfff080a Fix non-JSON log messages when using -log-format JSON (#24252)
* Fix non-JSON log messages when using -log-format JSON

Removed the call to consul-template's logging.Setup inside the created of config for the Runner. Instead we call it when we assign the logger to the Agent command.

* The elusive extra line

* Adjust the approach

* changelog

* Infer levels *with* timestamp prefix

* InferLeveslWithTimestamp required InferLevels

* Test to show -log-format and -log-file working in consul-template generated messages

* classic typo

---------

Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
2023-11-29 12:46:18 +00:00
Violet Hynes
2dd3ab9da0 Correct required policy in static secret caching docs (#24282) 2023-11-28 16:52:21 -05:00
Angel Garbarino
ef14ae87a5 Fix KV "View secret" or "View list" HDS button styling (#24278)
* wip

* remove is-flex and put input on same different row

* remove wide
2023-11-28 21:00:28 +00:00
Scott Miller
78d756acdb Provide a more reasonable error message for disabled Shamir seals (#24275) 2023-11-28 18:03:24 +00:00
Angel Garbarino
e9f7c5bcef Fix failing LDAP test with new attribute (#24273)
* add in new attribute to fix failing api test

* fix replication test failures
2023-11-28 17:56:33 +00:00
Tom Proctor
a823fdb3ef testfix: Skip runsc test earlier (#24274) 2023-11-28 17:35:00 +00:00
Victor Rodriguez
625cb00b61 Run make fmt. (#24272) 2023-11-28 15:37:28 +00:00
Victor Rodriguez
2e54ae0d61 Check that multi-seal wrappers provide unique key IDs (#24266)
* Remove duplicate function NewToggleableTestSeal.

NewToggleableTestSeal is almost the same as NewTestSeal, so remove it and adapt
the callers to use the duplicated function.

* Remove unnecessary function CreateTestSealWrappers.

The only caller of CreateTestSealWrappers can use NewTestSeal instead and
obtain the wrappers from the seal Access object instead.

* Ensure NewTestSeal does not generate "duplicate" wrappers.

NewTestSeal uses TestWrappers to create multi-seal Access objects. However, the
default behaviour for TestWrapper is to reverse the byte slice, which means that
two different wrappers will be identical, which is a problem for testing since
one wrapper will be able do "decrypt" another wrapper's encryption.

To fix this problem, NewTestSeal now creates TestWrappers with a different
secret for each one.

* Make NewTestSeal give unique Key IDs to its test wrappers.

* Fix some typos.

* Detect multi-seal wrappers producing duplicate Key IDs.

The Access object relies on all the encryption wrappers generating distinct key
IDs, so guard against this happening.

If a duplicate key ID is detected, do not use the encrypted value produced by
the wrappers that generated it. Return an error instead.
2023-11-28 09:56:39 -05:00
Kuba Wieczorek
8f064b90ec [VAULT-22270] API: add enterprise field to the response from /sys/health/ endpoint (#24270) 2023-11-28 14:22:33 +00:00
Tom Proctor
51d99fc7cf cli: Improve error handling for plugin commands (#24250)
* Stop supporting vault plugin info and deregister without a type argument
* Make a best-effort attempt to report whether a plugin was actually deregistered and give more descriptive errors
* Fix error message for vault plugin reload
2023-11-28 14:13:26 +00:00
Tom Proctor
030bba4e68 Support rootless plugin containers (#24236)
* Pulls in github.com/go-secure-stdlib/plugincontainer@v0.3.0 which exposes a new `Config.Rootless` option to opt in to extra container configuration options that allow establishing communication with a non-root plugin within a rootless container runtime.
* Adds a new "rootless" option for plugin runtimes, so Vault needs to be explicitly told whether the container runtime on the machine is rootless or not. It defaults to false as rootless installs are not the default.
* Updates `run_config.go` to use the new option when the plugin runtime is rootless.
* Adds new `-rootless` flag to `vault plugin runtime register`, and `rootless` API option to the register API.
* Adds rootless Docker installation to CI to support tests for the new functionality.
* Minor test refactor to minimise the number of test Vault cores that need to be made for the external plugin container tests.
* Documentation for the new rootless configuration and the new (reduced) set of restrictions for plugin containers.
* As well as adding rootless support, we've decided to drop explicit support for podman for now, but there's no barrier other than support burden to adding it back again in future so it will depend on demand.
2023-11-28 14:07:07 +00:00
Robert
3726d8fb1d Add configuration section to sync API docs (#24179)
* Add configuration section

* Add restricted root namespace alert
2023-11-27 16:10:37 -06:00