Commit Graph

554 Commits

Author SHA1 Message Date
hc-github-team-secure-vault-core
2c19a1bfd1 backport of commit a1a5be97e2 (#22240)
Co-authored-by: John-Michael Faircloth <fairclothjm@users.noreply.github.com>
2023-08-08 11:48:20 -05:00
Yoko Hyakuna
a826a2a3fc add 472 return code (#22105) (#22124)
* add 472 return code

* Updated the wording for consistency

---------

Co-authored-by: Adrian Ding <ding.adrian@gmail.com>
2023-07-28 14:29:15 -04:00
hc-github-team-secure-vault-core
3855c98095 backport of commit b6d973a133 (#22094) 2023-07-27 17:42:39 +00:00
hc-github-team-secure-vault-core
147eeeb981 backport of commit 24a7d966d5 (#22087)
Co-authored-by: Florin Cătălin Țiucra-Popa <106736683+FlorinTP@users.noreply.github.com>
2023-07-27 11:11:43 -04:00
hc-github-team-secure-vault-core
0343d04afc backport of commit d407078766 (#22058)
Co-authored-by: Josh Black <raskchanky@gmail.com>
2023-07-26 00:27:13 +00:00
hc-github-team-secure-vault-core
f47a185818 backport of commit e969e4ae43 (#21966)
Co-authored-by: Conor McCullough <103977699+conor-mccullough@users.noreply.github.com>
2023-07-20 05:42:11 +00:00
Anton Averchenkov
a13cf98661 Backport of [docs] Convert titles to sentense case into 1.14.x (#21921) 2023-07-18 17:07:55 -04:00
hc-github-team-secure-vault-core
da9dc19533 backport of commit 366693c78d (#21887)
Co-authored-by: Laurent <hello@viper61.fr>
2023-07-17 13:50:04 +00:00
hc-github-team-secure-vault-core
13fa907e9a backport of commit 237b9f7140 (#21660)
Co-authored-by: Jason O'Donnell <2160810+jasonodonnell@users.noreply.github.com>
2023-07-11 16:00:03 -04:00
hc-github-team-secure-vault-core
69905e59d3 backport of commit e3dad5b6da (#21425)
Co-authored-by: Shubham P <shubham.prajapat@sourcefuse.com>
2023-06-22 20:40:19 +00:00
hc-github-team-secure-vault-core
4e6ba13481 backport of commit e31ead37ba (#21353)
Co-authored-by: Anton Averchenkov <84287187+averche@users.noreply.github.com>
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2023-06-22 18:30:17 +00:00
hc-github-team-secure-vault-core
b693f0f247 backport of commit 8e40823fe1 (#21416)
Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
2023-06-22 17:56:53 +00:00
hc-github-team-secure-vault-core
4f4b34ff39 backport of commit eb634e9326 (#21394)
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2023-06-21 19:39:16 +00:00
hc-github-team-secure-vault-core
0fc55a2f02 backport of commit d76424cb53 (#21328)
Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
2023-06-16 19:41:06 +00:00
hc-github-team-secure-vault-core
7733b6a03b backport of commit 3347e5d56b (#21326)
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-06-16 17:37:55 +00:00
hc-github-team-secure-vault-core
3cc7e7ca81 backport of commit a3657dc604 (#21184)
Co-authored-by: Theron Voran <tvoran@users.noreply.github.com>
2023-06-13 17:53:08 +00:00
hc-github-team-secure-vault-core
bc28f4e688 backport of commit 820f7ee22f (#21175)
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-06-13 16:17:39 +00:00
hc-github-team-secure-vault-core
fd38c0b621 backport of commit 0ff9059967 (#21124)
Co-authored-by: Josh Black <raskchanky@gmail.com>
2023-06-09 22:04:11 +00:00
hc-github-team-secure-vault-core
c1d41b54f5 backport of commit 508017d073 (#21075)
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2023-06-08 18:27:15 +00:00
hc-github-team-secure-vault-core
5bc543bd92 backport of commit 0bd356f6cd (#21065)
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2023-06-08 01:35:28 +00:00
hc-github-team-secure-vault-core
8104dfe5bb backport of commit f079b7b0a4 (#21060)
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-06-07 21:32:58 +00:00
hc-github-team-secure-vault-core
6a03024d42 backport of commit 45b9dffea1 (#21026)
Co-authored-by: kpcraig <3031348+kpcraig@users.noreply.github.com>
2023-06-06 20:00:24 +00:00
hc-github-team-secure-vault-core
2d077fc6f9 backport of commit 34a722195e (#20951)
Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>
2023-06-02 03:29:48 +00:00
hc-github-team-secure-vault-core
c15d55fc73 backport of commit e63dc30507 (#20946)
Co-authored-by: Kit Haines <khaines@mit.edu>
2023-06-01 18:42:16 -04:00
hc-github-team-secure-vault-core
6943ca5bc1 backport of commit 63ccb60b9a (#20877)
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-05-30 23:49:24 +00:00
hc-github-team-secure-vault-core
b87912b25b backport of commit be2464fbea (#20861)
Co-authored-by: Milena Zlaticanin <60530402+Zlaticanin@users.noreply.github.com>
2023-05-30 21:54:09 +00:00
hc-github-team-secure-vault-core
0095fc4e78 backport of commit 54685189eb (#20851)
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-05-30 20:12:47 +00:00
Thy Ton
0c7a3c0300 update API docs for kubernetes secrets engine (#20726)
Co-authored-by: Tom Proctor <tomhjp@users.noreply.github.com>
2023-05-26 07:38:22 -07:00
kpcraig
cc8b856471 VAULT-12226: Add Static Roles to the AWS plugin (#20536)
Add static roles to the aws secrets engine

---------

Co-authored-by: maxcoulombe <max.coulombe@hashicorp.com>
Co-authored-by: vinay-gopalan <86625824+vinay-gopalan@users.noreply.github.com>
Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
2023-05-24 14:55:13 -04:00
Alexander Scheel
e82cc49071 Update transit public keys for Ed25519 support (#20727)
* Refine documentation for public_key

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Support additional key types in importing version

This originally left off the custom support for Ed25519 and RSA-PSS
formatted keys that we've added manually.

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add support for Ed25519 keys

Here, we prevent importing public-key only keys with derived Ed25519
keys. Notably, we still allow import of derived Ed25519 keys via private
key method, though this is a touch weird: this private key must have
been packaged in an Ed25519 format (and parseable through Go as such),
even though it is (strictly) an HKDF key and isn't ever used for Ed25519.

Outside of this, importing non-derived Ed25519 keys works as expected.

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add public-key only export method to Transit

This allows the existing endpoints to retain private-key only, including
empty strings for versions which lack private keys. On the public-key
endpoint, all versions will have key material returned.

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Update tests for exporting via public-key interface

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add public-key export option to docs

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

---------

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-05-24 11:26:35 -04:00
Peter Wilson
676d1c69fe Docs: audit - add warning when disabling device regarding HMAC (#20715)
* added note to warn of potential issues in disabling audit when using HMAC

* added to command docs pages too
2023-05-23 14:55:55 +01:00
claire bontempo
58f299b63b remove paragraph (#20709) 2023-05-22 16:14:17 -04:00
Mike Palmiotto
810d504e4f Add current_billing_period activity endpoint param (#20694)
* Add current_billing_period activity endpoint param

This commit introduces a new parameter: `current_billing_period`, which
can be used in lieu of `start_time` and `end_time` options.

GET ... /sys/internal/counters/activity?current_billing_period=true now
results in a response which contains the full billing period
information.

* changelog

* Update internal counters docs
2023-05-22 09:22:45 -04:00
Violet Hynes
f48c70a449 VAULT-15546 First pass at Vault Proxy docs (#20578)
* VAULT-15546 First pass at Vault Proxy docs

* VAULT-15546 correct errors

* VAULT-15546 fully qualify paths

* VAULT-15546 remove index

* VAULT-15546 Some typos and clean up

* VAULT-15546 fix link

* VAULT-15546 Add redirects so old links stay working

* VAULT-15546 more explicit redirects

* VAULT-15546 typo fixes

* Suggestions for Vault Agent & Vault Proxy docs (#20612)

* Rename 'agentandproxy' to 'agent-and-proxy' for better URL

* Update the index pages for each section

* VAULT-15546 fix link typo

---------

Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
2023-05-19 13:11:39 -04:00
l-with
167def69d9 Add possibility to decode generated encoded root token to api (#20595) 2023-05-18 15:18:19 -04:00
Luis (LT) Carbonell
21b3262e9f Correct Default for MaximumPageSize (#20453)
* default max page size for config

* Add changelog

* update test int to *int

* add testing defaults

* update default to -1, i.e. dont paginate

* update test

* Add error message for invalid search

* Make 0 the default

* cleanup

* Add to known issues doc

* Update website/content/docs/upgrading/upgrade-to-1.13.x.mdx

* Update website/content/docs/upgrading/upgrade-to-1.11.x.mdx

Co-authored-by: Jason O'Donnell <2160810+jasonodonnell@users.noreply.github.com>

* Update website/content/docs/upgrading/upgrade-to-1.13.x.mdx

Co-authored-by: Jason O'Donnell <2160810+jasonodonnell@users.noreply.github.com>

* Update website/content/docs/upgrading/upgrade-to-1.12.x.mdx

Co-authored-by: Jason O'Donnell <2160810+jasonodonnell@users.noreply.github.com>

* Add workaround to docs

* Update changelog/20453.txt

Co-authored-by: Austin Gebauer <34121980+austingebauer@users.noreply.github.com>

---------

Co-authored-by: Jason O'Donnell <2160810+jasonodonnell@users.noreply.github.com>
Co-authored-by: Austin Gebauer <34121980+austingebauer@users.noreply.github.com>
2023-05-17 20:56:53 +00:00
Gabriel Santos
dae5cf13c4 Provide public key encryption via transit engine (#17934)
* import rsa and ecdsa public keys

* allow import_version to update public keys - wip

* allow import_version to update public keys

* move check key fields into func

* put private/public keys in same switch cases

* fix method in UpdateKeyVersion

* move asymmetrics keys switch to its own method - WIP

* test import public and update it with private counterpart

* test import public keys

* use public_key to encrypt if RSAKey is not present and failed to decrypt
if key version does not have a private key

* move key to KeyEntry parsing from Policy to KeyEntry method

* move extracting of key from input fields into helper function

* change back policy Import signature to keep backwards compatibility and
add new method to import private or public keys

* test import with imported public rsa and ecdsa keys

* descriptions and error messages

* error messages, remove comments and unused code

* changelog

* documentation - wip

* suggested changes - error messages/typos and unwrap public key passed

* fix unwrap key error

* fail if both key fields have been set

* fix in extractKeyFromFields, passing a PolicyRequest wouldn't not work

* checks for read, sign and verify endpoints so they don't return errors when a private key was not imported and tests

* handle panic on "export key" endpoint if imported key is public

* fmt

* remove 'isPrivateKey' argument from 'UpdateKeyVersion' and
'parseFromKey' methods

also: rename 'UpdateKeyVersion' method to 'ImportPrivateKeyForVersion' and 'IsPublicKeyImported' to 'IsPrivateKeyMissing'

* delete 'RSAPublicKey' when private key is imported

* path_export: return public_key for ecdsa and rsa when there's no private key imported

* allow signed data validation with pss algorithm

* remove NOTE comment

* fix typo in EC public key export where empty derBytes was being used

* export rsa public key in pkcs8 format instead of pkcs1 and improve test

* change logic on how check for is private key missing is calculated

---------

Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-05-11 11:56:46 +00:00
claire bontempo
26b5b24e23 fix typo (#20473) 2023-05-02 19:29:14 +00:00
Josh Black
cf2f527c85 Clarify origin of ID parameter for path filter creation (#20415)
* Clarify origin of ID parameter for path filter creation

* add additional note

* add additional info
2023-05-01 08:34:03 -07:00
Alexander Scheel
89e5808711 Update to tidy status and docs (#20442)
* Add missing tidy-status state values

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add docs on auto-tidy reading

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add missing tidy status field revocation_queue_safety_buffer

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Include pause_duration in tidy-status docs

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add date of last auto-tidy operation to status

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add changelog entry

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

---------

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-05-01 14:26:29 +00:00
Alexander Scheel
853a5febcb Show existing keys, issuers on PKI import (#20441)
* Add additional existing keys response field

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Update tests for validating existing keys

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Update docs for import to include new fields

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add changelog entry

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Update website/content/api-docs/secret/pki.mdx

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>

---------

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2023-05-01 14:07:31 +00:00
Ben Ash
910559b03c api-docs/pki: common_name is no longer required. (#20403) 2023-04-27 16:11:49 -04:00
Josh Black
299fe6996c Correct an oversight re: skip_flush in the docs (#20383) 2023-04-26 17:30:09 -07:00
Brian Shumate
2532fd55fa Docs: DR replication API updates (#20373)
* Docs: DR replication API updates

- Add clarification for secondary_public_key parameter
- Update section header

* During activation
2023-04-26 16:15:46 -07:00
miagilepner
1c9b5d4333 VAULT-15791: Update docs to use vault-java-driver fork (#20316) 2023-04-25 11:08:05 +02:00
Braulio Gomes Rodrigues
9ff6ee572e changing chouchbase host variable (#19812)
* changing chouchbase host variable

* Alterando linha 82 couchbase
2023-04-24 13:56:56 +00:00
Josh Black
5ada399581 update website docs for new update-primary mode (#20302) 2023-04-21 15:21:28 -07:00
Luis (LT) Carbonell
7f2deb1420 Add Configurable LDAP Max Page Size (#19032)
* Add config flag for LDAP max page size

* Add changelog

* move changelog to correct file

* cleanup

* Default to non-paged searching for with -1

* Update website/content/api-docs/auth/ldap.mdx

Co-authored-by: Austin Gebauer <34121980+austingebauer@users.noreply.github.com>

* Update website/content/docs/auth/ldap.mdx

Co-authored-by: Austin Gebauer <34121980+austingebauer@users.noreply.github.com>

* Update tests

---------

Co-authored-by: Austin Gebauer <34121980+austingebauer@users.noreply.github.com>
2023-04-20 20:39:27 +00:00
Austin Gebauer
c94e213ac6 Add OIDC provider docs for IBM ISAM (#19247)
* Add OIDC provider docs for IBM ISAM

* Add changelog, api docs and docs-nav-data

---------

Co-authored-by: Benjamin Voigt <benjamin.voigt@god.dev>
2023-04-20 11:30:59 -07:00
Sohil Kaushal
c286174e76 docs(postgresql): Update Postgresql SE API doco (#19931)
* docs(postgresql): Update Postgresql SE API doco

Update the postgresql secret engine API docs to include some "caveats"
of the pgx library. In particular, this enhances the docs to inform the
user that if any sslcreds are supplied as a part of the Database
connection string, the user/vault admin will need to ensure that the
certificates are present at those paths.

* Chore: fixup minor error with db docs

* Keep the language simple

---------

Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
2023-04-19 00:17:44 +00:00