Commit Graph

561 Commits

Author SHA1 Message Date
hc-github-team-secure-vault-core
a50e555f25 backport of commit cf43d3eeed (#22788)
Co-authored-by: Bianca Moreira <48203644+biazmoreira@users.noreply.github.com>
2023-09-06 16:07:09 +02:00
hc-github-team-secure-vault-core
877f01aa09 backport of commit dbf094940f (#22743)
Co-authored-by: Josh Black <raskchanky@gmail.com>
2023-09-01 12:54:00 -07:00
hc-github-team-secure-vault-core
978ee87b0f backport of commit 2b626eae18 (#22658)
Co-authored-by: Sean Ellefson <sellefson@hashicorp.com>
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2023-08-30 18:05:47 +00:00
hc-github-team-secure-vault-core
619bf676ce backport of commit 04fc15471b (#22557)
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2023-08-24 22:31:30 +00:00
hc-github-team-secure-vault-core
e06e301ea0 backport of commit d50bd4eb05 (#22486)
Co-authored-by: Josh Black <raskchanky@gmail.com>
2023-08-21 22:24:30 +00:00
hc-github-team-secure-vault-core
52acc5e161 backport of commit 614f50de66 (#22435)
Co-authored-by: Brian Shumate <brianshumate@users.noreply.github.com>
2023-08-17 16:41:27 -07:00
Sarah Chavis
c062f56698 convert OSS language to "community" (#22343) (#22347) 2023-08-15 11:44:45 -07:00
hc-github-team-secure-vault-core
2c19a1bfd1 backport of commit a1a5be97e2 (#22240)
Co-authored-by: John-Michael Faircloth <fairclothjm@users.noreply.github.com>
2023-08-08 11:48:20 -05:00
Yoko Hyakuna
a826a2a3fc add 472 return code (#22105) (#22124)
* add 472 return code

* Updated the wording for consistency

---------

Co-authored-by: Adrian Ding <ding.adrian@gmail.com>
2023-07-28 14:29:15 -04:00
hc-github-team-secure-vault-core
3855c98095 backport of commit b6d973a133 (#22094) 2023-07-27 17:42:39 +00:00
hc-github-team-secure-vault-core
147eeeb981 backport of commit 24a7d966d5 (#22087)
Co-authored-by: Florin Cătălin Țiucra-Popa <106736683+FlorinTP@users.noreply.github.com>
2023-07-27 11:11:43 -04:00
hc-github-team-secure-vault-core
0343d04afc backport of commit d407078766 (#22058)
Co-authored-by: Josh Black <raskchanky@gmail.com>
2023-07-26 00:27:13 +00:00
hc-github-team-secure-vault-core
f47a185818 backport of commit e969e4ae43 (#21966)
Co-authored-by: Conor McCullough <103977699+conor-mccullough@users.noreply.github.com>
2023-07-20 05:42:11 +00:00
Anton Averchenkov
a13cf98661 Backport of [docs] Convert titles to sentense case into 1.14.x (#21921) 2023-07-18 17:07:55 -04:00
hc-github-team-secure-vault-core
da9dc19533 backport of commit 366693c78d (#21887)
Co-authored-by: Laurent <hello@viper61.fr>
2023-07-17 13:50:04 +00:00
hc-github-team-secure-vault-core
13fa907e9a backport of commit 237b9f7140 (#21660)
Co-authored-by: Jason O'Donnell <2160810+jasonodonnell@users.noreply.github.com>
2023-07-11 16:00:03 -04:00
hc-github-team-secure-vault-core
69905e59d3 backport of commit e3dad5b6da (#21425)
Co-authored-by: Shubham P <shubham.prajapat@sourcefuse.com>
2023-06-22 20:40:19 +00:00
hc-github-team-secure-vault-core
4e6ba13481 backport of commit e31ead37ba (#21353)
Co-authored-by: Anton Averchenkov <84287187+averche@users.noreply.github.com>
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2023-06-22 18:30:17 +00:00
hc-github-team-secure-vault-core
b693f0f247 backport of commit 8e40823fe1 (#21416)
Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
2023-06-22 17:56:53 +00:00
hc-github-team-secure-vault-core
4f4b34ff39 backport of commit eb634e9326 (#21394)
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2023-06-21 19:39:16 +00:00
hc-github-team-secure-vault-core
0fc55a2f02 backport of commit d76424cb53 (#21328)
Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
2023-06-16 19:41:06 +00:00
hc-github-team-secure-vault-core
7733b6a03b backport of commit 3347e5d56b (#21326)
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-06-16 17:37:55 +00:00
hc-github-team-secure-vault-core
3cc7e7ca81 backport of commit a3657dc604 (#21184)
Co-authored-by: Theron Voran <tvoran@users.noreply.github.com>
2023-06-13 17:53:08 +00:00
hc-github-team-secure-vault-core
bc28f4e688 backport of commit 820f7ee22f (#21175)
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-06-13 16:17:39 +00:00
hc-github-team-secure-vault-core
fd38c0b621 backport of commit 0ff9059967 (#21124)
Co-authored-by: Josh Black <raskchanky@gmail.com>
2023-06-09 22:04:11 +00:00
hc-github-team-secure-vault-core
c1d41b54f5 backport of commit 508017d073 (#21075)
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2023-06-08 18:27:15 +00:00
hc-github-team-secure-vault-core
5bc543bd92 backport of commit 0bd356f6cd (#21065)
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2023-06-08 01:35:28 +00:00
hc-github-team-secure-vault-core
8104dfe5bb backport of commit f079b7b0a4 (#21060)
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-06-07 21:32:58 +00:00
hc-github-team-secure-vault-core
6a03024d42 backport of commit 45b9dffea1 (#21026)
Co-authored-by: kpcraig <3031348+kpcraig@users.noreply.github.com>
2023-06-06 20:00:24 +00:00
hc-github-team-secure-vault-core
2d077fc6f9 backport of commit 34a722195e (#20951)
Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>
2023-06-02 03:29:48 +00:00
hc-github-team-secure-vault-core
c15d55fc73 backport of commit e63dc30507 (#20946)
Co-authored-by: Kit Haines <khaines@mit.edu>
2023-06-01 18:42:16 -04:00
hc-github-team-secure-vault-core
6943ca5bc1 backport of commit 63ccb60b9a (#20877)
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-05-30 23:49:24 +00:00
hc-github-team-secure-vault-core
b87912b25b backport of commit be2464fbea (#20861)
Co-authored-by: Milena Zlaticanin <60530402+Zlaticanin@users.noreply.github.com>
2023-05-30 21:54:09 +00:00
hc-github-team-secure-vault-core
0095fc4e78 backport of commit 54685189eb (#20851)
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-05-30 20:12:47 +00:00
Thy Ton
0c7a3c0300 update API docs for kubernetes secrets engine (#20726)
Co-authored-by: Tom Proctor <tomhjp@users.noreply.github.com>
2023-05-26 07:38:22 -07:00
kpcraig
cc8b856471 VAULT-12226: Add Static Roles to the AWS plugin (#20536)
Add static roles to the aws secrets engine

---------

Co-authored-by: maxcoulombe <max.coulombe@hashicorp.com>
Co-authored-by: vinay-gopalan <86625824+vinay-gopalan@users.noreply.github.com>
Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
2023-05-24 14:55:13 -04:00
Alexander Scheel
e82cc49071 Update transit public keys for Ed25519 support (#20727)
* Refine documentation for public_key

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Support additional key types in importing version

This originally left off the custom support for Ed25519 and RSA-PSS
formatted keys that we've added manually.

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add support for Ed25519 keys

Here, we prevent importing public-key only keys with derived Ed25519
keys. Notably, we still allow import of derived Ed25519 keys via private
key method, though this is a touch weird: this private key must have
been packaged in an Ed25519 format (and parseable through Go as such),
even though it is (strictly) an HKDF key and isn't ever used for Ed25519.

Outside of this, importing non-derived Ed25519 keys works as expected.

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add public-key only export method to Transit

This allows the existing endpoints to retain private-key only, including
empty strings for versions which lack private keys. On the public-key
endpoint, all versions will have key material returned.

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Update tests for exporting via public-key interface

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add public-key export option to docs

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

---------

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-05-24 11:26:35 -04:00
Peter Wilson
676d1c69fe Docs: audit - add warning when disabling device regarding HMAC (#20715)
* added note to warn of potential issues in disabling audit when using HMAC

* added to command docs pages too
2023-05-23 14:55:55 +01:00
claire bontempo
58f299b63b remove paragraph (#20709) 2023-05-22 16:14:17 -04:00
Mike Palmiotto
810d504e4f Add current_billing_period activity endpoint param (#20694)
* Add current_billing_period activity endpoint param

This commit introduces a new parameter: `current_billing_period`, which
can be used in lieu of `start_time` and `end_time` options.

GET ... /sys/internal/counters/activity?current_billing_period=true now
results in a response which contains the full billing period
information.

* changelog

* Update internal counters docs
2023-05-22 09:22:45 -04:00
Violet Hynes
f48c70a449 VAULT-15546 First pass at Vault Proxy docs (#20578)
* VAULT-15546 First pass at Vault Proxy docs

* VAULT-15546 correct errors

* VAULT-15546 fully qualify paths

* VAULT-15546 remove index

* VAULT-15546 Some typos and clean up

* VAULT-15546 fix link

* VAULT-15546 Add redirects so old links stay working

* VAULT-15546 more explicit redirects

* VAULT-15546 typo fixes

* Suggestions for Vault Agent & Vault Proxy docs (#20612)

* Rename 'agentandproxy' to 'agent-and-proxy' for better URL

* Update the index pages for each section

* VAULT-15546 fix link typo

---------

Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
2023-05-19 13:11:39 -04:00
l-with
167def69d9 Add possibility to decode generated encoded root token to api (#20595) 2023-05-18 15:18:19 -04:00
Luis (LT) Carbonell
21b3262e9f Correct Default for MaximumPageSize (#20453)
* default max page size for config

* Add changelog

* update test int to *int

* add testing defaults

* update default to -1, i.e. dont paginate

* update test

* Add error message for invalid search

* Make 0 the default

* cleanup

* Add to known issues doc

* Update website/content/docs/upgrading/upgrade-to-1.13.x.mdx

* Update website/content/docs/upgrading/upgrade-to-1.11.x.mdx

Co-authored-by: Jason O'Donnell <2160810+jasonodonnell@users.noreply.github.com>

* Update website/content/docs/upgrading/upgrade-to-1.13.x.mdx

Co-authored-by: Jason O'Donnell <2160810+jasonodonnell@users.noreply.github.com>

* Update website/content/docs/upgrading/upgrade-to-1.12.x.mdx

Co-authored-by: Jason O'Donnell <2160810+jasonodonnell@users.noreply.github.com>

* Add workaround to docs

* Update changelog/20453.txt

Co-authored-by: Austin Gebauer <34121980+austingebauer@users.noreply.github.com>

---------

Co-authored-by: Jason O'Donnell <2160810+jasonodonnell@users.noreply.github.com>
Co-authored-by: Austin Gebauer <34121980+austingebauer@users.noreply.github.com>
2023-05-17 20:56:53 +00:00
Gabriel Santos
dae5cf13c4 Provide public key encryption via transit engine (#17934)
* import rsa and ecdsa public keys

* allow import_version to update public keys - wip

* allow import_version to update public keys

* move check key fields into func

* put private/public keys in same switch cases

* fix method in UpdateKeyVersion

* move asymmetrics keys switch to its own method - WIP

* test import public and update it with private counterpart

* test import public keys

* use public_key to encrypt if RSAKey is not present and failed to decrypt
if key version does not have a private key

* move key to KeyEntry parsing from Policy to KeyEntry method

* move extracting of key from input fields into helper function

* change back policy Import signature to keep backwards compatibility and
add new method to import private or public keys

* test import with imported public rsa and ecdsa keys

* descriptions and error messages

* error messages, remove comments and unused code

* changelog

* documentation - wip

* suggested changes - error messages/typos and unwrap public key passed

* fix unwrap key error

* fail if both key fields have been set

* fix in extractKeyFromFields, passing a PolicyRequest wouldn't not work

* checks for read, sign and verify endpoints so they don't return errors when a private key was not imported and tests

* handle panic on "export key" endpoint if imported key is public

* fmt

* remove 'isPrivateKey' argument from 'UpdateKeyVersion' and
'parseFromKey' methods

also: rename 'UpdateKeyVersion' method to 'ImportPrivateKeyForVersion' and 'IsPublicKeyImported' to 'IsPrivateKeyMissing'

* delete 'RSAPublicKey' when private key is imported

* path_export: return public_key for ecdsa and rsa when there's no private key imported

* allow signed data validation with pss algorithm

* remove NOTE comment

* fix typo in EC public key export where empty derBytes was being used

* export rsa public key in pkcs8 format instead of pkcs1 and improve test

* change logic on how check for is private key missing is calculated

---------

Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-05-11 11:56:46 +00:00
claire bontempo
26b5b24e23 fix typo (#20473) 2023-05-02 19:29:14 +00:00
Josh Black
cf2f527c85 Clarify origin of ID parameter for path filter creation (#20415)
* Clarify origin of ID parameter for path filter creation

* add additional note

* add additional info
2023-05-01 08:34:03 -07:00
Alexander Scheel
89e5808711 Update to tidy status and docs (#20442)
* Add missing tidy-status state values

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add docs on auto-tidy reading

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add missing tidy status field revocation_queue_safety_buffer

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Include pause_duration in tidy-status docs

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add date of last auto-tidy operation to status

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add changelog entry

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

---------

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-05-01 14:26:29 +00:00
Alexander Scheel
853a5febcb Show existing keys, issuers on PKI import (#20441)
* Add additional existing keys response field

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Update tests for validating existing keys

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Update docs for import to include new fields

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add changelog entry

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Update website/content/api-docs/secret/pki.mdx

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>

---------

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2023-05-01 14:07:31 +00:00
Ben Ash
910559b03c api-docs/pki: common_name is no longer required. (#20403) 2023-04-27 16:11:49 -04:00
Josh Black
299fe6996c Correct an oversight re: skip_flush in the docs (#20383) 2023-04-26 17:30:09 -07:00