Scott Miller
6fe1b88401
Remove the BETA badge from EST in documentation ( #28265 )
...
* Remove the BETA badge from EST
* Add ent badge
2024-09-10 17:35:13 +00:00
Victor Rodriguez
7c0fb830b2
Update Go to 1.22.7. ( #28335 )
2024-09-10 16:59:08 +00:00
hc-github-team-secure-vault-core
45acb819e4
Update vault-plugin-secrets-kv to v0.20.0 ( #28334 )
...
* Update vault-plugin-secrets-kv to v0.20.0
* Add changelog
---------
Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com >
2024-09-10 09:32:28 -07:00
divyaac
582035e162
Added storage limits ( #28270 )
2024-09-10 08:46:15 -07:00
Ryan Cragun
392412829b
[VAULT-30189] enos: verify identity and OIDC tokens ( #28274 )
...
* [VAULT-30189] enos: verify identity and OIDC tokens
Expand our baseline API and data verification by including the identity
and identity OIDC tokens secrets engines. We now create a test entity,
entity-alias, identity group, various policies, and associate them with
the entity. For the OIDC side, we now configure the OIDC issuer, create
and rotate named keys, create and associate roles with the named key,
and issue and introspect tokens.
During a second phase we also verify that the those some entities,
groups, keys, roles, config, etc all exist with the expected values.
This is useful to test durability after upgrades, migrations, etc.
This change also includes new updates our prior `auth/userpass` and `kv`
verification. We had two modules that were loosely coupled and
interdependent. This restructures those both into a singular module with
child modules and fixes the assumed values by requiring the read module
to verify against the created state.
Going forward we can continue to extend this secrets engine verification
module with additional create and read checks for new secrets engines.
Signed-off-by: Ryan Cragun <me@ryan.ec >
2024-09-09 14:29:11 -06:00
hc-github-team-secure-vault-core
149c78f705
Update vault-plugin-database-couchbase to v0.12.0 ( #28327 )
...
* Update vault-plugin-database-couchbase to v0.12.0
* Add changelog
---------
Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com >
2024-09-09 19:56:01 +00:00
Ryan Cragun
0764d7d177
enos: poweroff and terminate instances when shutting them down ( #28316 )
...
Previously our `shutdown_nodes` modules would halt the machine. While
this is useful for simulating a failure it makes cleaning up the halted
machines very slow in AWS.
Instead, we now poweroff the machines and utilize EC2's instance
poweroff handling to immediately terminate the instances.
I've test both scenarios locally utilizing the change and both still
work as expected. I also timed before and after and this change saves 5
MINUTES in total runtime (~40%) for the PR replication scenario. I assume
it yields similar results for autopilot.
Signed-off-by: Ryan Cragun <me@ryan.ec >
2024-09-09 13:22:41 -06:00
hc-github-team-secure-vault-core
899c18be81
Update vault-plugin-secrets-openldap to v0.14.0 ( #28325 )
...
* Update vault-plugin-secrets-openldap to v0.14.0
* Add changelog
---------
Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com >
2024-09-09 12:17:28 -07:00
hc-github-team-secure-vault-core
d61510329e
Update vault-plugin-secrets-gcp to v0.20.0 ( #28324 )
...
Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com >
2024-09-09 17:47:55 +00:00
John-Michael Faircloth
f7701e1d8c
docs: add postgres TLS docs ( #28302 )
...
* docs: add postgres TLS docs
* fix link formatting
2024-09-09 12:34:16 -05:00
Brian Howe
59342940fd
lock public JWKS generation and re-check cache ( #27929 )
...
---------
Co-authored-by: kpcraig <3031348+kpcraig@users.noreply.github.com >
2024-09-09 09:36:38 -07:00
Jonathan Herlin
cbbe573916
Fix repeating word ( #28304 )
2024-09-09 09:20:37 -04:00
Ryan Cragun
c9340dc7d5
VAULT-30640: support running test-go in parallel on multiple branches ( #28296 )
...
In order for our enterprise nightlies to run the same test-go job but
across a matrix of different base references we need to consider the
checkout ref in our failure and summary uploads in order to prevent
an upload race.
We also configure Git with our token before setting up Go so that
enterprise CI workflows can execute without downloading a module cache.
Signed-off-by: Ryan Cragun <me@ryan.ec >
2024-09-06 15:14:55 -06:00
Chelsea Shaw
963a12211a
UI: only render date range reset button in enterprise ( #28315 )
2024-09-06 15:06:12 -05:00
Chelsea Shaw
f434693aa1
UI: show monthly new chart based on any data not average ( #28313 )
2024-09-06 19:05:08 +00:00
Chelsea Shaw
dcdbacd281
UI: Fix no data read within namespaces ( #28311 )
...
* Add test for capabilities within namespace
* update capabilities fetchMultiplePaths so that the resulting records have the non-prefixed path as ID
2024-09-06 13:44:09 -05:00
hc-github-team-secure-vault-core
da4152eee9
Update vault-plugin-secrets-terraform to v0.10.0 ( #28312 )
...
* Update vault-plugin-secrets-terraform to v0.10.0
* Add changelog
---------
Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com >
2024-09-06 11:27:58 -07:00
Chelsea Shaw
6c270af47b
UI Remove obscured json ( #28261 )
2024-09-06 18:13:59 +00:00
hc-github-team-secure-vault-core
a3b354a180
Update vault-plugin-auth-oci to v0.17.0 ( #28307 )
...
* Update vault-plugin-auth-oci to v0.17.0
* Add changelog
---------
Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com >
2024-09-06 15:08:54 +00:00
Steven Clark
829d4f1ce3
Fix some broken links on the PKI EST docs page ( #28303 )
2024-09-06 08:58:39 -04:00
JMGoldsmith
eb1a4c2387
updating the release notes with the known issue for hmac audit values ( #28285 )
2024-09-06 14:29:40 +02:00
claire bontempo
73fbdb4565
UI: Hide patch for deleted or destroyed secrets ( #28301 )
...
* hide patch action for deleted or destroyed versions
* update jsdoc
* add conditional chaining for CE versions that dont have subkeys
* stub version for CE tests
* add comments
* Update ui/lib/kv/addon/routes/secret.js
2024-09-05 15:52:38 -07:00
Luis (LT) Carbonell
cdf3da4066
Add DR failover scenario to Enos ( #28256 )
...
* Add DR failover scenario to Enos
* Update enos/enos-scenario-dr-replication.hcl
Co-authored-by: Ryan Cragun <me@ryan.ec >
* Update enos/enos-qualities.hcl
Co-authored-by: Ryan Cragun <me@ryan.ec >
* Update enos/enos-scenario-dr-replication.hcl
Co-authored-by: Ryan Cragun <me@ryan.ec >
* Update enos/enos-scenario-dr-replication.hcl
Co-authored-by: Ryan Cragun <me@ryan.ec >
* Update enos/enos-qualities.hcl
Co-authored-by: Ryan Cragun <me@ryan.ec >
* Update enos/enos-scenario-dr-replication.hcl
Co-authored-by: Ryan Cragun <me@ryan.ec >
* Update enos/enos-scenario-dr-replication.hcl
Co-authored-by: Ryan Cragun <me@ryan.ec >
* Update enos/enos-scenario-dr-replication.hcl
Co-authored-by: Ryan Cragun <me@ryan.ec >
* Update enos/enos-scenario-pr-replication.hcl
Co-authored-by: Ryan Cragun <me@ryan.ec >
* remove superuser
* Update enos/enos-scenario-dr-replication.hcl
Co-authored-by: Ryan Cragun <me@ryan.ec >
* Update enos/enos-scenario-dr-replication.hcl
Co-authored-by: Ryan Cragun <me@ryan.ec >
* Update enos/enos-scenario-dr-replication.hcl
Co-authored-by: Ryan Cragun <me@ryan.ec >
* Update enos/enos-scenario-dr-replication.hcl
Co-authored-by: Ryan Cragun <me@ryan.ec >
* Update enos/enos-scenario-dr-replication.hcl
Co-authored-by: Ryan Cragun <me@ryan.ec >
---------
Co-authored-by: Ryan Cragun <me@ryan.ec >
2024-09-05 21:33:53 +00:00
Robert
3bda80649f
Add docs for github sync environment secrets ( #28175 )
...
---------
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com >
2024-09-05 16:11:01 -05:00
John-Michael Faircloth
b682a79551
actions: support ent plugins in plugin update workflow ( #28295 )
2024-09-05 15:53:08 -05:00
claire bontempo
620430d236
cleanup sass deprecations ( #28279 )
2024-09-05 13:33:11 -07:00
hc-github-team-secure-vault-core
cbf08fdc15
Update vault-plugin-secrets-gcpkms to v0.18.0 ( #28300 )
...
* Update vault-plugin-secrets-gcpkms to v0.18.0
* Add changelog
---------
Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com >
2024-09-05 12:48:29 -07:00
claire bontempo
c4962925de
UI: address flaky auth-jwt and control group tests ( #28297 )
...
* address flaky auth-jwt test
* refactor control group success test
2024-09-05 12:37:13 -07:00
Scott Miller
cbec86fba5
Update dependencies used by the crypto team ( #28298 )
2024-09-05 13:56:07 -05:00
Brian Shumate
9e64619c88
Update redirect ( #28299 )
2024-09-05 14:53:37 -04:00
hc-github-team-secure-vault-core
9c5d3ffc85
Update vault-plugin-auth-azure to v0.19.0 ( #28294 )
...
* Update vault-plugin-auth-azure to v0.19.0
* Add changelog
---------
Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com >
Co-authored-by: Milena Zlaticanin <60530402+Zlaticanin@users.noreply.github.com >
2024-09-05 09:54:12 -07:00
hc-github-team-secure-vault-core
65bc18b2e9
Update vault-plugin-database-redis-elasticache to v0.5.0 ( #28293 )
...
* Update vault-plugin-database-redis-elasticache to v0.5.0
* Add changelog
---------
Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com >
Co-authored-by: Milena Zlaticanin <60530402+Zlaticanin@users.noreply.github.com >
2024-09-05 09:30:32 -07:00
Angel Garbarino
92d585510c
replace placeholder ( #28291 )
2024-09-05 10:09:09 -06:00
Theron Voran
ffb88e93ce
sdk: update to docker v26.1.5 ( #28269 )
...
Updates to plugincontainer@v0.4.0 in sdk/, and
vault-testing-stepwise@v0.3.1 in root, which updates vault/sdk and
vault itself to docker v26.1.5.
2024-09-05 15:51:25 +00:00
Peter Wilson
322cb27395
Audit: always use derived context for audit logging, increase timeout to 10s ( #28286 )
...
* always use derived context for audit logging, increase timeout to 10secs max
* improve go doc
* changelog
2024-09-05 16:34:18 +01:00
Mike Palmiotto
6069e665c0
sdk: go mod tidy ( #28290 )
2024-09-05 15:24:02 +00:00
hc-github-team-secure-vault-core
b9c66c0809
Update vault-plugin-secrets-kubernetes to v0.9.0 ( #28287 )
...
* Update vault-plugin-secrets-kubernetes to v0.9.0
* Add changelog
---------
Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com >
2024-09-05 10:08:28 -04:00
Peter Wilson
3be1719c71
add auth and secret block to response test for hmac ( #28283 )
2024-09-05 12:26:53 +01:00
Scott Miller
047ec756c0
Document CMPv2 ( #27915 )
...
* CMPv2 Documentation, and restructuring of Issuance Protocols into its own section for PKI.
* title
* CMPv2 API
* Add default path policy
* Update website/content/docs/secrets/pki/cmpv2.mdx
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com >
* Update website/content/docs/secrets/pki/cmpv2.mdx
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com >
* Update website/content/docs/secrets/pki/cmpv2.mdx
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com >
* Update website/content/docs/secrets/pki/cmpv2.mdx
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com >
* respond to some PR feedback
* pr feedback
* Fix nav and add key_usage
* Update website/content/docs/secrets/pki/cmpv2.mdx
Co-authored-by: Steven Clark <steven.clark@hashicorp.com >
* Update website/content/docs/secrets/pki/cmpv2.mdx
Co-authored-by: Steven Clark <steven.clark@hashicorp.com >
* Update website/content/api-docs/secret/pki/issuance.mdx
Co-authored-by: Steven Clark <steven.clark@hashicorp.com >
* Docs fixes
---------
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com >
Co-authored-by: Steven Clark <steven.clark@hashicorp.com >
2024-09-04 17:24:50 -05:00
hc-github-team-secure-vault-core
f6701b3672
Update vault-plugin-database-elasticsearch to v0.16.0 ( #28277 )
...
* Update vault-plugin-database-elasticsearch to v0.16.0
* Add changelog
---------
Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com >
Co-authored-by: Milena Zlaticanin <60530402+Zlaticanin@users.noreply.github.com >
2024-09-04 14:45:16 -07:00
claire bontempo
1238a187df
UI: address test flakiness, especially kmip role edit form ( #28262 )
...
* absolute hail mary
* what about this?
* that was not right
* nope
* refactor problematic test
* remove all of the runloop stuff, just chasing flaky tests
* chasing authPage
* move away from page objects for runCmd
* replace existing runCmd function
* add line
* test if removing chrome version helps this time?
* rerun tests
* rerun tests
* Revert "test if removing chrome version helps this time?"
This reverts commit 0b189c4f6978d6c55c283e3fe9fddd03d28c4377.
* remove await
* add trace log
* change test:oss command
* remove log tracing
2024-09-04 14:16:09 -07:00
hc-github-team-secure-vault-core
690520ad1b
Update vault-plugin-database-snowflake to v0.12.0 ( #28275 )
...
* Update vault-plugin-database-snowflake to v0.12.0
* Add changelog
---------
Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com >
2024-09-04 19:40:48 +00:00
hc-github-team-secure-vault-core
68238ad424
Update vault-plugin-secrets-alicloud to v0.18.0 ( #28271 )
...
* Update vault-plugin-secrets-alicloud to v0.18.0
* Add changelog
---------
Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com >
2024-09-04 14:13:33 -05:00
hc-github-team-secure-vault-core
3ecc513d34
Update vault-plugin-database-mongodbatlas to v0.13.0 ( #28268 )
...
* Update vault-plugin-database-mongodbatlas to v0.13.0
* Add changelog
---------
Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com >
Co-authored-by: Milena Zlaticanin <60530402+Zlaticanin@users.noreply.github.com >
2024-09-04 09:55:05 -07:00
hc-github-team-secure-vault-core
61463f591e
Update vault-plugin-secrets-azure to v0.20.0 ( #28267 )
...
* Update vault-plugin-secrets-azure to v0.20.0
* Add changelog
---------
Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com >
2024-09-04 09:31:47 -07:00
hc-github-team-secure-vault-core
42164dfc51
Update vault-plugin-auth-cf to v0.19.0 ( #28266 )
...
* Update vault-plugin-auth-cf to v0.19.0
* Add changelog
---------
Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com >
2024-09-04 16:28:16 +00:00
hc-github-team-secure-vault-core
07dfe7716a
Update vault-plugin-auth-kerberos to v0.13.0 ( #28264 )
...
* Update vault-plugin-auth-kerberos to v0.13.0
* Add changelog
---------
Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com >
2024-09-04 15:18:20 +00:00
crystalstall
8dee06f977
chore: fix some function names ( #28251 )
...
Signed-off-by: crystalstall <crystalruby@qq.com >
2024-09-04 09:38:52 -04:00
Steven Clark
789f9b7821
Add missing revocation storage lock on RevokeCert refactoring ( #28259 )
...
* Add missing revocation storage lock on RevokeCert refactoring
* Refactor internal PKI revocation API
- Process the odd logical.Response/error returns internally to make
the returns better consumable from other users.
- Leverage the GetConfigWithUpdate to fetch the current CRL config, otherwise we can use older or nil configs.
2024-09-03 17:18:30 -04:00
hc-github-team-secure-vault-core
6bda443807
Update vault-plugin-auth-alicloud to v0.19.0 ( #28263 )
...
* Update vault-plugin-auth-alicloud to v0.19.0
* Add changelog
---------
Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com >
2024-09-03 20:49:44 +00:00