20858 Commits

Author SHA1 Message Date
Jordan Reimer
a66bd4ec20 [UI] Display Camelized Operation ID in API Explorer (#29785)
* updates swagger-ui to display camelized operation ids in development

* attempt to fix test timing issue

* fixes issue stubbing environment in swagger-ui test

* adds test for operation ids in production for swagger-ui component
2025-02-28 22:57:43 +00:00
Angel Garbarino
8cf97568c0 rebuild yarnlock and rebuild after modiifying dependency (#29784) 2025-02-28 15:43:48 -07:00
Theron Voran
6bf505c1a3 docs/events: update note about client redirect for 1.19 (#29705)
* docs/events: update note about client redirect for 1.19

* Update website/content/docs/concepts/events.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

---------

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2025-02-28 13:15:25 -08:00
Kit Haines
17c0ee93cb Enables a warning if validations (ent-feature) set issuer configuration so that it isn't usable. (#29781) 2025-02-28 14:44:52 -05:00
Scott Miller
39df7fa973 Revert azure key wrapper to undo auth regression (#29775) 2025-02-28 16:21:15 +00:00
Steven Clark
152e5b53e1 Update go-jose to v3.0.4/v4.0.5 (#29771)
* Update go-jose to v3.0.4

 - Updating to address CVE-2025-27144

* Update v4 references in sdk and api

* Update go-jose across all api auth projects to v4.0.5
2025-02-28 11:15:59 -05:00
Mike Palmiotto
1b50c64099 identity: Perform runtime cleanup in goroutine (#29759)
Previously identity cleanup was running with the context of the activation request, which would time out for large workloads, resulting in bad failure states. This PR moves the ActivationFunc call to its own goroutine/background Context, so it can proceed uninterrupted.
2025-02-28 14:02:38 +00:00
Thy Ton
6d9543158d add docs for external Enterprise plugins (#29738)
---------

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2025-02-27 16:00:23 -08:00
vinay-gopalan
1091474e4d Add docs for scheduled root rotation feature for the AWS and DB engines (#29755) 2025-02-27 15:48:47 -08:00
Ryan Cragun
58a49e6ce0 VAULT-33758: IPv6 address conformance for proxy and agent (#29517)
This is a follow-up to our initial work[0] to address RFC-5952 §4 conformance for IPv6 addresses in Vault. The initial pass focused on the vault server configuration and start-up routines. This follow-up focuses on Agent and Proxy, with a few minor improvements for server.

The approach generally mirrors the server implementation but also adds support for normalization with CLI configuration overrides.

One aspect we do not normalize currently is Agent/Proxy client creation to the Vault server with credentials taken from environment variables, as it would require larger changes to the `api` module. In practice this ought to be fine for the majority of cases.

[0]: https://github.com/hashicorp/vault/pull/29228
2025-02-27 15:57:46 -07:00
Ryan Cragun
69646127df fmt: check gosimports during pre-commit hooks (#29520)
`gosimports` is the preferred style for module imports and it is
enforced via CI. I've found that things often manage to drift so I've
taken the liberty to update our pre-commit hook to verify our imports
formatting before a change is committed.

Along with updating the formatting helper I've also run `make fmt` to
resolve any formatting drift that managed to make it into the codebase.

Signed-off-by: Ryan Cragun <me@ryan.ec>
2025-02-27 15:56:34 -07:00
Angel Garbarino
d52340e10d update failing test (#29758) 2025-02-27 20:56:34 +00:00
Theron Voran
4f1d7e1f37 docs/vault-k8s: update for v1.6.2 release (#29739) 2025-02-27 11:35:41 -08:00
kpcraig
8497dc66d0 Add docs for plugins with enterprise scheduled root rotation feature (#29608) 2025-02-27 10:44:36 -08:00
Shannon Roberts (Beagin)
018674a798 [VAULT-33969] UI: replace readonly JsonEditor with Hds::CodeBlock (#29720)
* http://localhost:4200/ui/vault/secrets/kubernetes/kubernetes/roles/test/details readOnly JsonEditor to Hds::CodeBlock

* http://localhost:4200/ui/vault/policies/acl/create readonly JsonEditor to Hds::CodeBlock

* http://localhost:4200/ui/vault/policy/acl/default readonly JsonEditor to Hds::CodeBlock

* http://localhost:4200/ui/vault/access/oidc/scopes/test/details readonly JsonEditor to Hds::CodeBlock

* http://localhost:4200/ui/vault/access/oidc/scopes/create readonly JsonEditor to Hds::CodeBlock

* fix (some) tests

* fix remaining tests

* add changelog
2025-02-27 18:42:07 +00:00
hc-github-team-secure-vault-core
5828be040a Update vault-plugin-secrets-gcp to v0.21.1 (#29747)
* Update vault-plugin-secrets-gcp to v0.21.1

* Add changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
2025-02-27 12:29:55 -06:00
Angel Garbarino
513e9804ee [DOCS] Add GUI for Azure/AWS/GCP Secret Engines configuration (#29647)
* wip

* finish azure docs

* some fixes

* get role heading to where it was

* Apply suggestions from code review

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/docs/secrets/azure.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* pr comments

* add aws

* gcp configuration

* fix formatting

* remove indents for parser

* formatting fixed?

* Update website/content/docs/secrets/gcp.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Apply suggestions from code review

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* try again

* might be the end of me

* tried running npm run format and got some promising results

* missed

* this should work

* numbering fixes

* Apply suggestions from code review

add group="gui"

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update azure.mdx

change heading to match

---------

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2025-02-27 10:49:58 -07:00
hc-github-team-secure-vault-core
3bd1ae5007 Update vault-plugin-auth-gcp to v0.20.1 (#29736)
* Update vault-plugin-auth-gcp to v0.20.1

* Add changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
2025-02-27 11:44:40 -06:00
vinay-gopalan
f06f2f8188 add missing create operation for aws secrets (#29737) 2025-02-27 09:20:12 -08:00
Victor Rodriguez
b28ba3046f Document new PKI CMPv2 configuration field disabled_validations (#29707)
* Document new PKI CMPv2 configuration field disabled_validations.
2025-02-27 09:13:30 -08:00
Angel Garbarino
a2d7e29870 update package and update lock (#29724) 2025-02-26 16:39:07 -07:00
Shannon Roberts (Beagin)
7dce4071d8 [VAULT-33968] UI: Update HDS (#29719)
* [VAULT-33619] HDS Code Block: Update from HDS 4.13.0 to 4.14.0

* [VAULT-33619] Update from HDS 4.14.0 to 4.15.0

* [VAULT-33619] Update from HDS 4.15.0 to 4.16.0

* fix tests
2025-02-26 15:23:03 -08:00
hc-github-team-secure-vault-core
4be8c4a96d Update vault-plugin-secrets-azure to v0.21.1 (#29729) 2025-02-26 22:49:40 +00:00
hc-github-team-secure-vault-core
b78dfa5ff6 Update vault-plugin-auth-azure to v0.20.1 (#29728) 2025-02-26 22:45:43 +00:00
hc-github-team-secure-vault-core
9b8d8fb4ff Update vault-plugin-secrets-openldap to v0.15.1 (#29727)
---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
2025-02-26 22:44:16 +00:00
Angel Garbarino
496bc67d31 update attrs (#29722) 2025-02-26 16:04:52 -06:00
kpcraig
b078978b00 Update GRPC functions to send rotation window and period as seconds explicitly (#29721) 2025-02-26 16:13:46 -05:00
Ryan Cragun
b8e8620882 VAULT-33693 actions: fix push event PR labels (#29476)
* VAULT-33693: actions: fix push event PR labels

Fix pull request label metadata when triggered `push` event types.
We now use Github's `associatedPullRequests()` connection on the
`Commit` associated with the SHA to resolve the labels.

Signed-off-by: Ryan Cragun <me@ryan.ec>
2025-02-25 16:30:27 -07:00
Jordan Reimer
c1754f5f97 [UI] Types Linting (#29702)
* adds linting for types to scripts and lint staged

* fixes issue with AdapterError type

* moves lint-staged setup out of package.json and into config file

* fixes ember data store service type

* fixes route params types

* fixes model types

* fixes general type errors

* fixes ts declaration errors in js files

* adds missing copyright headers

* fixes issue accessing capabilities model properties

* ignores AdapterError import type error

* more updates to AdapterError type

* adds comment to lint-staged config

* moves ember data store type to @ember-data namespace

* updates store import

* moves AdapterError type to @ember-data namespace

* turns ember-data import eslint rule back on
2025-02-25 16:08:51 -07:00
Steven Clark
74d02c8a43 Fix some formatting issues for Go changelogs (#29710) 2025-02-25 14:43:59 -05:00
Luciano Di Lalla
d77a5a3841 Update CHANGELOG.md for 1.18.5, 1.17.12, 1.16.16 (#29708)
* Update CHANGELOG.md

* Update CHANGELOG.md
2025-02-25 14:36:53 -05:00
Violet Hynes
b5ded80e26 Pin CI tool versions (#29665)
* Pin CI tool versions

* Protoc-gen-go-grpc should be v1.5.1

* enumer

* More GHAs

* string

* misspell

* gopath

* gopath

* revert makefile stuff

* Export path

* path equals?

* Experimentation

* Go mod tidy
2025-02-25 12:56:36 -05:00
vinay-gopalan
e8c07ec68e Small fixes on UX of Automated Root Rotation parameters (#29685) 2025-02-25 09:14:38 -08:00
lane-wetmore
13d302d509 UI: Add KV view for wrap tool (#29677)
* add kv view for wrap tool

* add changelog entry

* update toggle  and tests

* update changelog, style updates, fix linting error bug

* update tests

* update test to include multiline input

* clean up

* test improvements and clean up

* shift away from disabling button on error

* update test for json lint warning

* add check after back

* move assertions to a better test for them
2025-02-24 20:21:21 -06:00
Yoko Hyakuna
5d1a971c44 Add missing '**' to the prereq (#29696) 2025-02-24 11:14:20 -08:00
Jenny Deng
b93e8e817c Fix bug with merging vault agent configs that set template_config (#29680)
* fix bug with merging configs with TemplateConfig and add test

* add changelog
2025-02-24 10:56:03 -08:00
Tom Chwojko-Frank
4783eb9d75 changelog update for 1.19.0-rc1 (#29687)
* changelog update for 1.19.0-rc1

* Moved item to improvements
2025-02-21 14:35:32 -08:00
Mark Collao
8522652c56 VAULT-33401 - update security-scan.hcl (#29230)
* update security-scan.hcl

* Update .release/security-scan.hcl

Co-authored-by: Theron Voran <tvoran@users.noreply.github.com>

---------

Co-authored-by: Theron Voran <tvoran@users.noreply.github.com>
2025-02-21 10:59:24 -08:00
John-Michael Faircloth
e2f09cb2ab database: fix reload to not fail early (#29519)
* database: fix reload to not fail early

* return logical.ErrorRresponse; add tests

* do not return noop warnings; add logs

* changelog

* use name for log; remove event doc
2025-02-20 14:53:58 +00:00
Tin Vo
6960808238 VAULT-33601: fixing enos vault-radar failure (#29463)
* fixing vault-radar failure

* fixing seal_ha vault-radar error

* fixing seal_ha vault-radar error

* fixing seal_ha vault-radar error

* testing seal_ha

* testing seal_ha
2025-02-19 16:08:53 -08:00
Dan Rivera
dd8a0d57a8 UI: adding skip import rotation field when creating static roles (#29633)
* adding skip import rotation field to ui

* changing labels and subtext

* removing readonly, user input on edit would not affect value

* changelog

* fix test

* fix test2
2025-02-19 18:49:46 -05:00
Angel Garbarino
09e7c2e8fa 🧹 on policy upload file view (#29669)
* add margin and conditional

* add test coverage
2025-02-18 16:35:55 -07:00
Angel Garbarino
f73c3feeac remove dashboard survey link: (#29667) 2025-02-18 14:45:19 -07:00
Steven Clark
75c295131a Update Go to 1.23.6 on main (#29660) 2025-02-17 14:29:15 -05:00
Milena Zlaticanin
6e0c771e57 Add support for cross account management of static roles in AWS Secrets (#29645)
* aws-secrets/add-cross-acc-mgmt-static-roles

* refactor

* add function pointer for tests

* delete commented out code

* update

* update comment

* update func name

* add flag

* remove docs
2025-02-14 14:13:00 -07:00
hc-github-team-secure-vault-core
64e92ba9fd Update vault-plugin-secrets-ad to v0.20.1 (#29648)
* Update vault-plugin-secrets-ad to v0.20.1

* Add changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
2025-02-14 20:56:46 +00:00
claire bontempo
e3b41da05b update openapi for auth-config/ldap (#29642) 2025-02-14 00:29:42 +00:00
hc-github-team-secure-vault-core
b756fe6c0e Update vault-plugin-secrets-azure to v0.21.0 (#29639)
---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
2025-02-13 19:01:47 -05:00
hc-github-team-secure-vault-core
513f5a96b1 Backport of update vault-plugin-auth-oci to v0.18.0 into release/1.19.x (#29620)
* Update vault-plugin-auth-kerberos to v0.14.0

* Add changelog

* Update vault-plugin-auth-oci to v0.18.0

* Add changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
Co-authored-by: Jaired Jawed <jaired.jawed@hashicorp.com>
2025-02-13 23:20:01 +00:00
vinay-gopalan
6a9de17ac4 move logs into if block (#29634) 2025-02-13 22:56:22 +00:00