Commit Graph

20070 Commits

Author SHA1 Message Date
VBouiller
a00a869eb7 Fix: typo in Vault CLI Env variables (#24093)
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2024-08-07 23:12:27 +00:00
muhtasim-maleque
16aadca617 [DOCS] Correct telemetry metric name (#27027)
Update telemetry metric name from vault.kv.secret.count to vault.secret.kv.count
2024-08-07 16:08:18 -07:00
Meggie
fd1e53d256 Edit alias_name_source explanation (#27382)
* Edit alias_name_source explanation

We wanted to clarify the difference between the two options and the implications.

* Add missing backticks

* Add comma

* Update website/content/api-docs/auth/kubernetes.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

---------

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2024-08-07 16:07:36 -07:00
Owen Zhang
998339f2d9 Update 1_16-default-policy-needs-to-be-updated.mdx (#27157)
Made a few grammar changes plus updating term from Vault IU to Vault UI
2024-08-07 14:28:29 -07:00
Paul Banks
fe69694954 Update 1_15-auto-upgrade.mdx (#27675)
* Update 1_15-auto-upgrade.mdx

* Update known issue version numbers for AP issue

---------

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2024-08-07 21:27:18 +00:00
Ikko Eltociear Ashimine
b29f52d56e Fix typo in variables.tf (#27693)
intialize -> initialize

Co-authored-by: akshya96 <87045294+akshya96@users.noreply.github.com>
2024-08-07 14:13:00 -07:00
VAL
e0414d6d7f Changelog for 1.17.3, 1.16.7 enterprise, 1.15.13 enterprise (#28018)
* changelog for 1.17.3, 1.16.7 enterprise, 1.15.13 enterprise

* Add spacing to match older changelogs
2024-08-07 13:50:53 -07:00
Chelsea Shaw
da7fad68b8 UI: Replace getNewModel with hydrateModel when model exists (#27978)
* Replace getNewModel with hydrateModel when model exists

* Update getNewModel to only handle nonexistant model types

* Update test

* clarify test

* Fix auth-config models which need hydration not generation

* rename file to match service name

* cleanup + tests

* Add comment about helpUrl method
2024-08-07 16:07:25 +00:00
Adrian Todorov
cac0af4dbb Update programmatic-management.mdx to clarify Terraform prereqs (#27548) 2024-08-06 16:39:27 -07:00
Roman O'Brien
3dad93eb38 update(kubernetes.mdx): k8s-tokenreview URL (#27993)
Co-authored-by: akshya96 <87045294+akshya96@users.noreply.github.com>
2024-08-06 16:30:10 -07:00
divyaac
8a5ae2bf37 Client Count Docs Updates/Cleanup (#27862)
* Docs changes

* More condensation of docs

* Added some clarity on date ranges

* Edited wording'

* Added estimation client count info

* Update website/content/api-docs/system/internal-counters.mdx

Co-authored-by: miagilepner <mia.epner@hashicorp.com>

---------

Co-authored-by: miagilepner <mia.epner@hashicorp.com>
2024-08-06 15:59:37 -07:00
Chelsea Shaw
f46bd66487 UI: Add unsupportedCriticalCertExtensions to jwt config expected payload (#27996) 2024-08-06 12:54:41 -05:00
Ryan Cragun
39c9d0b62d docs: fix upgrade 1.16.x (#27999)
Signed-off-by: Ryan Cragun <me@ryan.ec>
2024-08-06 11:08:36 -06:00
Scott Miller
fa86fbafce Update vault-plugin-auth-jwt to v0.21.1 (#27992) 2024-08-06 13:01:58 -04:00
Ryan Cragun
5a69be44a2 docker: add upgrade notes for curl removal (#27995)
Signed-off-by: Ryan Cragun <me@ryan.ec>
2024-08-06 10:56:30 -06:00
akshya96
e1d3c322e7 Auto-rolling billing start docs PR (#27926)
* auto-roll docs changes

* addressing comments

* address comments

* Update website/content/api-docs/system/internal-counters.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* addressing some changes

* update docs

* update docs with common explanation file

* updated note info

* fix 1.18 upgrade doc

* fix content-check error

* Update website/content/partials/auto-roll-billing-start-example.mdx

Co-authored-by: miagilepner <mia.epner@hashicorp.com>

---------

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
Co-authored-by: miagilepner <mia.epner@hashicorp.com>
2024-08-06 16:09:00 +00:00
Paul Banks
b276c122c0 Clarify audit log failure telemetry docs. (#27969)
* Clarify audit log failure telemetry docs.

* Add the note about the misleading counts
2024-08-06 14:51:23 +01:00
Theron Voran
a17121c138 Update hana db pkg (#27950)
* database/hana: use go-hdb v1.10.1

* docs/hana: quotes around password so dashes don't break it
2024-08-05 16:26:24 -07:00
Adam Rowan
8b8069a30c Update interoperability-matrix.mdx (#27977)
Updating the existing Vault/YubiHSM integration with a newer version of Vault as well as now supporting Managed Keys.
2024-08-05 18:31:30 -04:00
Ryan Cragun
6366455922 enos: don't expect curl available in docker image (#27984)
Signed-off-by: Ryan Cragun <me@ryan.ec>
2024-08-05 15:25:39 -06:00
Jonathan Frappier
1fb20dbc3d Add regular (e.g. not API) doc for cross namespace (#27975)
* Add regular (e.g. not API) doc for cross namespace

* Update website/content/docs/enterprise/namespaces/configure-cross-namespace-access.mdx

Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>

* Update website/content/docs/enterprise/namespaces/configure-cross-namespace-access.mdx

Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>

* Update website/content/docs/enterprise/namespaces/configure-cross-namespace-access.mdx

Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>

---------

Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
2024-08-05 16:31:56 -04:00
Angel Garbarino
a81b482158 Prep for configuration.edit refactor (#27948)
* move files around

* move fetches to config to the configuration.index route

* working... for aws, lots of clean up left

* move error handling to parent route

* standarize configModel param

* add test coverage

* welp a miss for non configurable engines

* pr comments

* remove mirage interrupts and test actual api

* update configuration details test to test for template only things

* api error coverage
2024-08-05 13:39:10 -06:00
Ryan Cragun
40698e962b docker: use alpine 3 and UBI 8 tags instead of minor version pins (#27971)
Signed-off-by: Ryan Cragun <me@ryan.ec>
2024-08-05 12:09:19 -06:00
VBouiller
9b3a73daba Update userpass CLI doc for custom path flag (#27968)
It's not clear from the get go how to use the userpass auth method with a custom path.

Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
2024-08-05 17:42:23 +00:00
Meggie
1f7e589850 Add link from api-docs to namespace docs (#27502)
I wanted to make the list of API endpoints with restricted namespace access easier to find.

I considered adding the partial directly here, but thought the explanation in the link would have been helpful.
2024-08-05 12:44:26 -04:00
Peter Wilson
d824e572be merge two consecutive if checks, update comments (#27963) 2024-08-05 13:54:37 +00:00
Steven Clark
1d476381c2 Add new GetSignerFromKeyEntry method for ent usage (#27961) 2024-08-05 09:18:27 -04:00
Steven Clark
37513e0bd0 Pin PKI test suite to zlint v3.6.2 (#27964)
- Avoid this error for now

zlint_test.go:149: got unexpected error from test e_subj_orgunit_in_ca_cert: map[details:The OU attribute in the Subject is prohibited in Root and TLS CA certificates result:error]
2024-08-05 13:10:50 +00:00
Ryan Cragun
e246b2652c enos: support ancient systemd in vault_upgrade (#27960)
Amazon Linux 2 uses an ancient version of Systemd/systemctl so instead
of using -P when determining the unit file we use the less convenient
-p.

Signed-off-by: Ryan Cragun <me@ryan.ec>
2024-08-02 20:36:46 +00:00
Ryan Cragun
720e942662 [VAULT-2937] Verify the /sys/version-history in enos scenarios (#27947)
When verifying the Vault version, in addition to verifying the CLI
version we also check that the `/sys/version-history` contains the
expected version.

As part of this we also fix a bug where when doing an in-place upgrade
with a Debian or Redhat package we also remove the self-managed
`vault.service` systemd unit to ensure that correctly start up using the
new version of Vault.

Signed-off-by: Ryan Cragun <me@ryan.ec>
2024-08-02 13:26:39 -06:00
aphorise
37dbe7bf38 Docs: Approle removed incorrect token_num_uses that's incomplete with batch (#27909)
Corrected Docs at: [vault/docs/auth/approle **Via the CLI**](https://developer.hashicorp.com/vault/docs/auth/approle#via-the-cli-1) which results in the error message below on versions near to Vault 1.17.x.

```
Error writing data to auth/approle/role/my-role: Error making API request.

URL: PUT https://.../v1/auth/approle/role/my-role
Code: 400. Errors:

* 'token_type' cannot be 'batch' or 'default_batch' when set to generate tokens with limited use count
```

Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
2024-08-02 19:23:33 +00:00
Peter Wilson
6b9261e1db Attempt to improve explanation of the current metric so Operators don't think things are failing when they aren't (#27955) 2024-08-02 20:21:03 +01:00
Peter Wilson
2dbb3d4dcb Audit: rewrite audit entry formatting to improve performance (#27952)
* rewrite audit entry formatting to improve performance
2024-08-02 19:04:39 +01:00
Chelsea Shaw
ec5dfceaa2 update imports of getOwner to be from @ember/owner (#27953) 2024-08-02 10:58:15 -05:00
Violet Hynes
f786af16a9 Add docs note about Windows paths (#27946) 2024-08-02 09:49:54 -04:00
miagilepner
2d1c3db46b VAULT-25883: Fix namespace errors with path filters on sys/internal/ui/mounts (#27939)
* include namespace in prefix fopr sys/internal/ui/mounts

* changelog
2024-08-02 10:28:34 +02:00
Angel Garbarino
01709e992a Swap route settings.configure-secret-backend for nested edit and index route under secret.configuration (#27918)
* router changes and appropriate file shuffling

* changelog

* fix test routes

* handle redirect... is this okay?

* test redirect coverage

* move configure-secret-backend test and cleanup

* coverage for non configurable secret engine:

* clean up

* remove redirect
2024-08-01 16:06:04 -06:00
Chelsea Shaw
68a5741c49 UI: fix export button tests (#27945) 2024-08-01 13:55:54 -05:00
Scott Miller
2d1f692d1e Increase cert auth role cache max size (#27942) 2024-08-01 13:08:44 -05:00
John-Michael Faircloth
899ebd4aff db/postgres: add feature flag protected sslinline configuration (#27871)
* adds sslinline option to postgres conn string
* for database secrets type postgres, inspects the connection string for sslinline and generates a tlsconfig from the connection string.

* support fallback hosts

* remove broken multihost test

* bootstrap container with cert material

* overwrite pg config and set key file perms

* add feature flag check

* add tests

* add license and comments

* test all ssl modes

* add test cases for dsn (key/value) connection strings

* add fallback test cases

* fix error formatting

* add test for multi-host when using pgx native conn url parsing

---------

Co-authored-by: Branden Horiuchi <Branden.Horiuchi@blackline.com>
2024-08-01 11:43:54 -05:00
Chelsea Shaw
10068ffb0a UI: Use Client Count export API (#27455) 2024-08-01 11:03:31 -05:00
John-Michael Faircloth
c23ebb173f docs: add note on microsoft's saml auth bound attributes syntax (#27938) 2024-08-01 11:16:00 -04:00
Peter Wilson
c555503f39 Audit: Test fixes and improvements (#27934)
* update tests/fix tests
2024-08-01 13:57:04 +00:00
Ellie
e938ff350f [docs] Document known issue with duplicate identity groups (#27904)
* init

* fix versions

* remove whitespace

* update version

* fix file name

* fix link

* fix links (included one from other known issue too

* Fix spacing
2024-08-01 08:09:19 -05:00
aphorise
79c559cc65 README.md - build instructions refined (#27540)
Added notes for fix when encountering the error below as part of either `make bootstrap` or `made dev`
2024-07-31 16:48:48 -06:00
Chelsea Shaw
266ea693cc UI: remove initial date from client counts (#27816) 2024-07-31 17:35:11 +00:00
Ellie
4ccf568480 add namespace ID to loading groups debug message on unseal (#27922) 2024-07-31 12:29:44 -05:00
Peter Wilson
aeae52fc4f Audit: Use existing cloned object for hashing (don't re-clone) (#27913)
* unexport hashstructure funcs

* don't re-copy/clone LogInput fields when this object belongs to the pipeline
2024-07-31 10:47:10 +01:00
Chelsea Shaw
111647f851 UI: Remove deprecated Client Count keys (#27916)
* remove destructureClientCounts

* Update type and mirage generator

* remove deprecated keys from hardcoded response samples

* Add back destructureClientCounts with updated description
2024-07-30 13:04:20 -05:00
Ryan Cragun
174da88b9d VAULT-28146: Add IPV6 support to enos scenarios (#27884)
* VAULT-28146: Add IPV6 support to enos scenarios

Add support for testing all raft storage scenarios and variants when
running Vault with IPV6 networking. We retain our previous support for
IPV4 and create a new variant `ip_version` which can be used to
configure the IP version that we wish to test with.

It's important to note that the VPC in IPV6 mode is technically mixed
and that target machines still associate public IPV6 addresses. That
allows us to execute our resources against them from IPV4 networks like
developer machines and CI runners. Despite that, we've taken care to
ensure that only IPV6 addresses are used in IPV6 mode.

Because we previously had assumed the IP Version, Vault address, and
listener ports in so many places, this PR is essentially a rewrite and
removal of those assumptions. There are also a few places where
improvements to scenarios have been included as I encountered them while
working on the IPV6 changes.

Signed-off-by: Ryan Cragun <me@ryan.ec>
2024-07-30 11:00:27 -06:00