Commit Graph

20782 Commits

Author SHA1 Message Date
davidadeleon
751ee0da39 add 1.19.x (#29565)
Co-authored-by: davidadeleon <ddeleon@hashicorp.com>
2025-02-12 00:28:22 +00:00
davidadeleon
e27a7d785b bump version (#29564)
Co-authored-by: davidadeleon <ddeleon@hashicorp.com>
2025-02-11 14:52:28 -08:00
hc-github-team-secure-vault-core
9ba523a0d0 Update vault-plugin-database-elasticsearch to v0.17.0 (#29542)
* Update vault-plugin-database-elasticsearch to v0.17.0

* Add changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
Co-authored-by: Michael Blaum <96261585+hashiblaum@users.noreply.github.com>
2025-02-11 20:10:50 +00:00
vinay-gopalan
9e38a88883 Add automated root rotation support to DB Secrets (#29557) 2025-02-11 12:09:26 -08:00
hc-github-team-secure-vault-core
b9ee65e302 Update vault-plugin-secrets-terraform to v0.11.0 (#29541)
* Update vault-plugin-secrets-terraform to v0.11.0

* Add changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
Co-authored-by: Michael Blaum <96261585+hashiblaum@users.noreply.github.com>
2025-02-11 14:25:21 -05:00
hc-github-team-secure-vault-core
429d890efb Update vault-plugin-database-couchbase to v0.13.0 (#29543)
* Update vault-plugin-database-couchbase to v0.13.0

* Add changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
Co-authored-by: Michael Blaum <96261585+hashiblaum@users.noreply.github.com>
2025-02-11 14:23:21 -05:00
hc-github-team-secure-vault-core
6556857229 Update vault-plugin-database-snowflake to v0.13.0 (#29554)
* Update vault-plugin-database-snowflake to v0.13.0

* Add changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
2025-02-11 18:41:57 +00:00
hc-github-team-secure-vault-core
41a9865a31 Update vault-plugin-auth-jwt to v0.23.0 (#29553)
* Update vault-plugin-auth-jwt to v0.23.0

* Add changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
2025-02-11 18:07:50 +00:00
hc-github-team-secure-vault-core
5c9dedda48 Update vault-plugin-secrets-openldap to v0.14.5 (#29551)
* Update vault-plugin-secrets-openldap to v0.14.5

* Add changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
2025-02-11 10:30:55 -06:00
davidadeleon
afd7b1a590 use new sdk and api versions (#29550)
Co-authored-by: davidadeleon <ddeleon@hashicorp.com>
2025-02-11 08:10:18 -08:00
davidadeleon
6741773b0f update vault auth submodules to api/v1.16.0 (#29548)
* update vault auth submodules to api/v1.16.0

* update go.mod

* make proto

---------

Co-authored-by: davidadeleon <ddeleon@hashicorp.com>
2025-02-11 07:28:45 -08:00
vinay-gopalan
9b70487623 Automated rotate root support for AWS Auth and Secrets (#29497) 2025-02-10 18:36:44 -05:00
John-Michael Faircloth
8d0443fd48 db: honor static role TTL across restarts when skip import rotation i… (#29537)
* db: honor static role TTL across restarts when skip import rotation is enabled

* changelog
2025-02-10 15:28:19 -06:00
Kit Haines
49ecdad1ad Sign empty to cert on manual-chain update. (#29473)
* Sign empty to cert on manual-chain update.

* Add role defaults.

* Add changelog.

* More useful error message.

* Suggestions from PR Review.

* Fixes to update as well as write; test that still fails; revert code.

* Unit Test fix.

* Add go doc to TestManualChainValidation
2025-02-10 15:24:52 -05:00
Dan Rivera
7fb0db7452 UI: Fix updating static roles via role edit page on UI (#29498)
* added check for updating static roles, appending full payload data

* pulling specific properties into payload obj to fix popups

* adding changelog

* add else to keep previous imp for dynamic roles

* removing separate request, utilizing snapshot

* renamed serialized data var, added comment for required username line

* adding test for editing static role

* updated test for edit payload

* Update changelog/29498.txt

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>

---------

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>
2025-02-10 14:15:50 -05:00
claire bontempo
9e6b5cebd1 UI: Use timestamp.now() in custom messages (#29525)
* use timestamp.now() in custom messages

* dynamically assert timezone

* dynamically assert timezone

* final cleanup, add comments

* remove assertion count
2025-02-07 15:47:24 -08:00
lane-wetmore
4051cb4d4c UI: Remove custom tag class and replace with Hds::Badge (#29475)
* replace custom tag class with Hds::Badge

* another wave of custom class replacements

* remove tag class styles and cleanup

* add changelog entry

* fix changelog name

* remove changelog entry and old styles and clean up

* remove extra classes and clean up

* one more clean up section

* update tests

* fix value check

* updated test

* update tests

* switch to code elements with specific styling and cleanup
2025-02-07 15:29:12 -06:00
hc-github-team-secure-vault-core
784216310f Update vault-plugin-secrets-alicloud to v0.19.0 (#29512)
* Update vault-plugin-secrets-alicloud to v0.19.0

* Add changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
Co-authored-by: Michael Blaum <96261585+hashiblaum@users.noreply.github.com>
2025-02-07 15:09:47 -05:00
hc-github-team-secure-vault-core
b3baef9a81 Update vault-plugin-auth-cf to v0.20.0 (#29528)
* Update vault-plugin-auth-cf to v0.20.0

* Add changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
2025-02-07 10:50:30 -08:00
Steven Clark
17fc0227ad Add missing parameter signature_bits to the generate root PKI API docs (#29522) 2025-02-07 09:27:51 -05:00
Thy Ton
5dc9dea8ed add EntStaticSystemView to StaticSystemView and its ce stubs (#29516) 2025-02-06 08:32:14 -08:00
Thy Ton
496314638f add stubs oss for entSetExternalPluginConfig() (#29494) 2025-02-05 22:12:06 -08:00
claire bontempo
e7d3b60a73 fix jsdoc typo (#29513) 2025-02-06 01:04:55 +00:00
Scott Miller
0a2049ca6a Undo additions to the barrier encryption count if persisting those encryptions fails (#29506)
* Undo additions to the barrier encryption count if persisting those encryptions fails

* changelog
2025-02-05 13:22:53 -06:00
Brian Shumate
0c76cb83e1 Docs: API: update raft snapshot config (#29508)
- Ensure parameters are present for Ent backport
- Update heading
2025-02-05 13:17:32 -05:00
Paul Banks
6dc69291bf identity (CE): Persist conflict resolution after rename (#29471)
This PR introduces a test which exercises Vault's renameResolver and
asserts deterministic state after invalidation. To ensure that automatic
de-duplication is consistent across all nodes, we detect the node's
cluster status and persist renames IFF the node is active.

The PR includes some modifications to deterministic reload testing,
since they now have the side-effect of persistence on active nodes, as
well as tests for consistency in the face of storagePacker bucket
invalidation.

This commit introduces a random seed variable to be used with UUID
generation in Identity Store determinism tests. The seed is
automatically generated or passed during Environment Variable and
displayed during test failure. This allows for easy reproduction
of any test failures for later debugging.
2025-02-05 10:29:52 -05:00
Nick Cabatoff
38c3e15e1e Add support for reloading raft config (#29485) 2025-02-05 15:08:46 +00:00
Scott Miller
0c3449dacd Missed updating go-secure-stdlib in sdk :( (#29502) 2025-02-04 19:54:40 +00:00
Sai Aung Hlyan Htet
16438470f7 CLI: add an option for renew command fail on non-fullfillable request to allow command chaining (#29060)
Signed-off-by: saiaunghlyanhtet <saiaunghlyanhtet2003@gmail.com>
2025-02-04 16:04:26 -03:00
Scott Miller
7b40df7b64 Update go-secure-stdlib (#29501) 2025-02-04 12:58:31 -06:00
Scott Miller
5752e64d09 Update azure key vault wrapper (#29499)
* Update azure key vault wrapper

* changelog
2025-02-04 17:58:40 +00:00
Angel Garbarino
c0ece88d1b Clean up on Azure configuration (#29482)
* put in more options and make generic root password ttl

* small changes
2025-02-04 09:16:46 -07:00
Bianca
2928492d4a Fix group creation forwarding (#29483) 2025-02-04 10:49:42 +01:00
Thy Ton
6f8b5daa7d ignore database_ent.proto from buf linter (#29492) 2025-02-03 16:42:26 -08:00
John-Michael Faircloth
0df92739ca docs: fix include syntax in upgrade guides (#29487) 2025-02-03 14:34:22 -05:00
claire bontempo
5d91f7d9bc UI: Fix token renewal breaking policy checks (#29416)
* set namespace_path in renewal method

* add tests

* add changelog
2025-02-03 10:56:39 -08:00
Scott Miller
73a98ddd48 Update go-kms-wrapping wrapper dependencies, adding ParsePaths support for sensitive values. (#29402)
* Update go-kms-wrapping wrapper dependencies, adding ParsePaths support for sensitive values

* changelog

* document indirect value references, e.g ParsePath
2025-02-03 18:23:52 +00:00
Thy Ton
193796bfc9 refactor database plugin SDK (#29479)
* prepare for enterprise database plugin SDK development
2025-02-03 09:50:33 -07:00
Ryan Cragun
cda9ad3491 VAULT-33074: add github sub-command to pipeline (#29403)
* VAULT-33074: add `github` sub-command to `pipeline`

Investigating test workflow failures is common task that engineers on the
sustaining rotation perform. This task often requires quite a bit of
manual labor by manually inspecting all failed/cancelled workflows in
the Github UI on per repo/branch/workflow basis and performing root cause
analysis.

As we work to improve our pipeline discoverability this PR adds a new `github`
sub-command to the `pipeline` utility that allows querying for such workflows
and returning either machine readable or human readable summaries in a single
place. Eventually we plan to automate sending a summary of this data to
an OTEL collector automatically but for now sustaining engineers can
utilize it to query for workflows with lots of various criteria.

A common pattern for investigating build/enos test failure workflows would be:
```shell
export GITHUB_TOKEN="YOUR_TOKEN"
go run -race ./tools/pipeline/... github list-workflow-runs -o hashicorp -r vault -d '2025-01-13..2025-01-23' --branch main --status failure build
```

This will list `build` workflow runs in `hashicorp/vault` repo for the
`main` branch with the `status` or `conclusion` of `failure` within the date
range of `2025-01-13..2025-01-23`.

A sustaining engineer will likely do this for both `vault` and
`vault-enterprise` repositories along with `enos-release-testing-oss` and
`enos-release-testing-ent` workflows in addition to `build` in order to
get a full picture of the last weeks failures.

You can also use this utility to summarize workflows based on other
statuses, branches, HEAD SHA's, event triggers, github actors, etc. For
a full list of filter arguments you can pass `-h` to the sub-command.

> [!CAUTION]
> Be careful not to run this without setting strict filter arguments.
> Failing to do so could result in trying to summarize way too many
> workflows resulting in your API token being disabled for an hour.

Signed-off-by: Ryan Cragun <me@ryan.ec>
2025-01-31 13:48:38 -07:00
Theron Voran
6a87419ab0 CE changes for VAULT-33018 (#29470) 2025-01-31 11:11:44 -08:00
Leland Ursu
20795f32a6 added the 1.18.4, 1.17.11, and 1.16.15 changelog entries (#29464)
* added the 1.18.4, 1.17.11, and 1.16.15 changelog entries

* added manual changelog entry

* Update CHANGELOG.md

Co-authored-by: Meggie <meggie@hashicorp.com>

* Update CHANGELOG.md

Co-authored-by: Meggie <meggie@hashicorp.com>

* moved the CL entry about a feature to improvement since we don't ship features in minor releases

* added more context to the dep change record

* updated an improvement to be inline with others

---------

Co-authored-by: lursu <leland.ursu@hashicorp.com>
Co-authored-by: Meggie <meggie@hashicorp.com>
2025-01-31 17:54:43 +00:00
claire bontempo
9d0a01036e UI: Adds serial_number_source to pki role form (#29469)
* add serial_number_source to pki role form

* update test
2025-01-31 09:16:54 -08:00
Sarah Chavis
1b5260d696 Suggested edits for identity doc updates (#29339)
* Identity dupe resolution guide first draft

* initial edits

* save progress

* save changes

* add script to find template policies

* save progress

* save work

* push latest updates

* missed one

* Update website/content/docs/upgrading/deduplication/entity-group.mdx

Co-authored-by: Paul Banks <pbanks@hashicorp.com>

* apply additional feedback

* apply feedback

---------

Co-authored-by: Paul Banks <pbanks@hashicorp.com>
2025-01-31 08:53:06 -08:00
Bruno Oliveira de Souza
d127c4de93 VAULT-21474 Run oidcPeriodicFunc for each namespace id store (#29312)
* run oidcPeriodicFunc for each namespace id store

* remove unused noNamespace var

* properly check for errors getting namespace

not sure why I decided to ignore the NoNamespace error before
or not log the unexpected error, that doesn't make sense.

* add changelog

* improve changelog

* remove too many namespace warning for OIDC rotations

this was already in the ENT PR, I had already checked that the file didn't exist on CE before but somehow I missed it.
2025-01-31 13:04:04 -03:00
Mike Palmiotto
6d5759ecb3 identity: Introduce ActivationFunc for managing feature state (#29467)
* identity: Ensure state is changed on activation

This PR introduces some changes to the way activation flags are
processed in Vault.

Rather than reaching into subsystems and modifying
state from the activationflags package, each plugin can now register its
own ActivationFunc. Updates to activation flags now trigger the the
feature's ActivationFunc, which can encapsulate the associated
subsystem state.

We include a few bugfixes and minor cosmetic changes, like updates to
log lines and godocs.

* Check for nil system backend

* Move deduplication activation to common file

* Add identity dedup activation log lines

* Make interface methods clearer

* Clean up some comments

* More cleanups

* fixup! More cleanups

* fixup! More cleanups
2025-01-31 12:25:07 -03:00
Angel Garbarino
14082d08f1 Add GCP secret engine configuration Create/Edit views (#29423)
* gcp initial changes

* acceptance test coverage for gcp

* update config-wif component test so tests are passing

* specific gcp test coverage

* changelog

* comment clean up

* one more test

* comment things

* address pr comments
2025-01-30 13:37:20 -07:00
Nick Cabatoff
9c0f2fbfe5 Add docs for new iteration of ent operator import feature (#29406) 2025-01-30 15:31:43 -05:00
akshya96
39e7fae801 adding extra test (#29457) 2025-01-30 09:50:38 -08:00
John-Michael Faircloth
5e173b0355 docs: db and ldap secrets engine known issues (#29449) 2025-01-30 11:19:49 -06:00
Dan Rivera
3c5ec5d3b4 UI: Fix text overflow for long Secret and Auth names (#29430)
* adding overflow class to link text

* adding separate class to fix overflow text on list & card views

* adding class to search list items to handle overflow

* adding ellipsis instead of just hidden for visual indicator

* added changelog

* updating styling to use helper classes, added child class to global style, updated changelog

* added test checks for oveflow classes
2025-01-30 11:21:49 -05:00