Commit Graph

531 Commits

Author SHA1 Message Date
Josh Black
58492f90e4 update go-jose dep (#24234) 2023-11-21 23:51:12 +00:00
hc-github-team-secure-vault-core
fa61a0be08 replace nytimes/gziphandler with klauspost/compress/gzhttp (#23898) (#23961)
no-op commit due to failed cherry-picking

Co-authored-by: Marc Boudreau <marc.boudreau@hashicorp.com>
2023-11-02 16:53:17 -04:00
hc-github-team-secure-vault-core
92e48f0093 Update hashicorp/vault-plugin-secrets-mongodbatlas to v0.10.2 (#23849) (#23850)
* Automated dependency upgrades

* Add changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
2023-10-26 10:05:53 -04:00
Christopher Swenson
697ff5494b Update go to version 1.20.10 (#23714)
And update:
* `google.golang.org/grpc` v1.53.0 => v1.58.3
* `golang.org/x/net` v0.10.0 => v0.17.0

and run `go mod tidy`
2023-10-17 15:31:13 -07:00
hc-github-team-secure-vault-core
141014d552 backport of commit 4e3b91d91f (#22567) (#23692)
* backport of commit 4e3b91d91f (#22567)

* workerpool implementation

* rollback tests

* website documentation

* add changelog

* fix failing test

* backport of commit de043d6736 (#22754)

* fix flaky rollback test

* better fix

* switch to defer

* add comment

---------

Co-authored-by: miagilepner <mia.epner@hashicorp.com>
2023-10-17 14:34:38 +02:00
Scott Miller
3bbcbd4853 Update go-kms-wrapping to get Azure HTTP/2 workaround (1.13.x) (#22769)
* Update go-kms-wrapping to get Azure HTTP/2 workaround (1.13.x)

* changelog

* Revert "Update go-kms-wrapping to get Azure HTTP/2 workaround (1.13.x)"

This reverts commit 17fbce3a79039dbbebab802d35839182b2342642.

* Re-attempt th update of the azure wrapper
2023-09-05 14:52:19 -05:00
John-Michael Faircloth
f5d64f375b release/1.13.x: update vault-plugin-database-snowflake to v0.7.1 (#22591)
* release/1.13.x: update vault-plugin-database-snowflake to v0.7.1

* add changelog

* use v0.7.2 tag

* update changelog

* use v0.7.3 tag
2023-08-28 16:17:19 -05:00
Alexander Scheel
1c06cfbbc0 Bump go version to 1.20.7 on Vault 1.13.x (#22499)
* Bump go version to 1.20.7 on Vault 1.13.x

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Update to Docker v24.0.5 to fix host header issue

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Fix Docker arguments incompatibility

See also: b6e0077a7f

Co-authored-by: vinay-gopalan <86625824+vinay-gopalan@users.noreply.github.com>
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

---------

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
Co-authored-by: vinay-gopalan <86625824+vinay-gopalan@users.noreply.github.com>
2023-08-23 11:24:31 -04:00
Ellie
5500161d79 secrets/ldap: upgrade to v0.10.2 for bug fix (#22331)
* secrets/ldap: upgrade to v0.10.2 for bug fix

* add changelog
2023-08-15 08:08:59 -05:00
Nick Cabatoff
279668473f Bump go mod versions to match those in ent (#22169) 2023-08-02 15:06:57 -04:00
Austin Gebauer
b622eaf295 auth/azure: upgrade to v0.13.1 for bug fix (#21799)
* auth/azure: upgrade to v0.13.1 for bug fix

* adds changelog
2023-07-13 10:06:25 -07:00
hc-github-team-secure-vault-core
73c9a5be39 Backport of update github.com/protonmail/go-crypto into release/1.13.x (#21575)
* update github.com/protonmail/go-crypto

Updates the transitive dependency github.com/cloudflare/circl which will help address scanning noise related to CVE-2023-1732.

Vault is not affected by this issue as it does not use the vulnerable functionality.

* go mod tidy

---------

Co-authored-by: mickael e <mickael@hashicorp.com>
2023-07-11 19:18:33 +00:00
hc-github-team-secure-vault-core
d9489b8daf VAULT-17592 Extract failed Go test results across runners (#21625) (#21671)
Co-authored-by: Kuba Wieczorek <kuba.wieczorek@hashicorp.com>
2023-07-07 19:30:51 +00:00
Austin Gebauer
8a9e9bf92c secrets/azure: upgrade to v0.15.1 for bug fix (#21632)
* secrets/azure: upgrade to v0.15.1 for bug fix

* adds changelog
2023-07-06 12:57:24 -07:00
Josh Black
3f90a66049 bump lib/pq to 1.10.9 (#20594) (#21372)
* bump lib/pq to 1.10.9

* bump jackc/pgx/v4 also
2023-06-21 21:49:41 +00:00
hc-github-team-secure-vault-core
1ed28d9589 backport of commit 2054ffcbfa (#20436)
Co-authored-by: Peter Wilson <peter.wilson@hashicorp.com>
2023-04-29 13:50:20 +00:00
John-Michael Faircloth
7dcb2ba989 auth/jwt: update plugin version (#20280) 2023-04-20 20:22:40 +00:00
Marc Boudreau
b500045c29 Backport all GHA Migration Changes to release/1.13.x Branch (#19767)
* backport all gha migration changes to release/1.13.x

* remove the .circleci directory

* remove references to circleci configuration from pre-commit hook

* remove reference to .circleci in Makefile

* port change to how gofumpt is executed in Makefile

* add gotestsum to tools/tools.go

* remove postgresql/scram package from generate-test-package-lists.sh since it didn't exist in release 1.13 or earlier

* blank out environment variables to allow test to properly function

* use go:embed to load files into test

---------

Co-authored-by: Kuba Wieczorek <kuba.wieczorek@hashicorp.com>
2023-03-30 11:00:02 -04:00
hc-github-team-secure-vault-core
9f78d2acd1 backport of commit c5bc1764c8 (#19643)
Co-authored-by: Austin Gebauer <34121980+austingebauer@users.noreply.github.com>
2023-03-20 14:56:25 -04:00
hc-github-team-secure-vault-core
beb8a65a7a backport of commit 1fb765d61a (#19559)
* database/elasticsearch: upgrades plugin to v0.13.1

* adds changelog

Co-authored-by: Austin Gebauer <34121980+austingebauer@users.noreply.github.com>
2023-03-15 10:50:12 -07:00
Nick Cabatoff
c6c35dcde6 Revert "updated raft-autopilot to v0.2.0 (#17848)" (#19362)
This reverts commit 21cab77be8.
2023-02-24 20:57:59 +00:00
hc-github-team-secure-vault-core
5176a3c287 Backport of Update x/net and x/crypto/ssh into release/1.13.x (#19285)
* Update x/net and x/crypto/ssh

* go mod tidy

---------

Co-authored-by: Tom Proctor <tomhjp@users.noreply.github.com>
2023-02-22 17:16:04 +00:00
hc-github-team-secure-vault-core
6ae50fee93 backport of commit add3659f39 (#19242)
Co-authored-by: Scott Miller <smiller@hashicorp.com>
2023-02-17 14:44:12 -06:00
hc-github-team-secure-vault-core
c9eb3c7251 events: WS protobuf messages should be binary (#19232) (#19256)
The [WebSockets spec](https://www.rfc-editor.org/rfc/rfc6455) states
that text messages must be valid UTF-8 encoded strings, which protobuf
messages virtually never are. This now correctly sends the protobuf events
as binary messages.

We change the format to correspond to CloudEvents, as originally intended,
and remove a redundant timestamp and newline.

We also bump the eventlogger to fix a race condition that this code triggers.

Co-authored-by: Christopher Swenson <christopher.swenson@hashicorp.com>
2023-02-17 20:14:48 +00:00
hc-github-team-secure-vault-core
32be0a9625 backport of commit 68f219c07e (#19161)
Co-authored-by: mickael-hc <86245626+mickael-hc@users.noreply.github.com>
2023-02-13 12:11:37 -05:00
hc-github-team-secure-vault-core
4d1ef8d582 backport of commit 9acd846e72 (#19154)
Co-authored-by: Austin Gebauer <34121980+austingebauer@users.noreply.github.com>
2023-02-10 20:24:08 -05:00
hc-github-team-secure-vault-core
980754455f backport of commit c90a024adf (#19152)
Co-authored-by: Tom Proctor <tomhjp@users.noreply.github.com>
2023-02-10 22:17:04 +00:00
Austin Gebauer
b0218cee8e upgrade vault-plugin-secrets-alicloud to v0.14.1 (#19128) 2023-02-10 09:32:46 -08:00
Austin Gebauer
eb968a56fb upgrade vault-plugin-secrets-alicloud to v0.14.0 (#19118) 2023-02-10 09:13:04 -08:00
Hamid Ghaf
0e52dbff6d replace existing zookeeper import with an actively maintained one (#19086)
* replace existing zookeeper import with an actively maintained one

* remove empty lines
2023-02-10 11:56:27 -05:00
kpcraig
7b86411c97 fix: upgrade vault-plugin-secrets-kubernetes to v0.3.0 (#19084)
* fix: upgrade vault-plugin-secrets-kubernetes to v0.3.0

* add changelog
2023-02-10 10:23:31 -05:00
kpcraig
154dbb8cbc fix: upgrade vault-plugin-auth-kubernetes to v0.15.0 (#19094)
* fix: upgrade vault-plugin-auth-kubernetes to v0.15.0

* add changelog
2023-02-10 10:23:11 -05:00
Austin Gebauer
23598121e6 upgrade vault-plugin-database-redis to v0.2.0 (#19112) 2023-02-09 14:39:15 -08:00
John-Michael Faircloth
0d67507fac fix: upgrade vault-plugin-secrets-mongodbatlas to v0.9.1 (#19111)
* fix: upgrade vault-plugin-secrets-mongodbatlas to v0.9.1

* add changelog

* Update changelog/19111.txt

Co-authored-by: Max Coulombe <109547106+maxcoulombe@users.noreply.github.com>

* use correct plugin type in changelog

---------

Co-authored-by: Max Coulombe <109547106+maxcoulombe@users.noreply.github.com>
2023-02-09 15:55:42 -06:00
Christopher Swenson
6e233e567b events: Add websockets and command (#19057)
Also updates the event receieved to include a timestamp.
Websockets support both JSON and protobuf binary formats.

This can be used by either `wscat` or the new
`vault events subscribe`:

e.g.,
```sh
$ wscat -H "X-Vault-Token: $(vault print token)" --connect ws://127.0.0.1:8200/v1/sys/events/subscribe/abc?json=true
{"event":{"id":"5c5c8c83-bf43-7da5-fe88-fc3cac814b2e", "note":"testing"}, "eventType":"abc", "timestamp":"2023-02-07T18:40:50.598408Z"}
...
```

and

```sh
$ vault events subscribe abc
{"event":{"id":"5c5c8c83-bf43-7da5-fe88-fc3cac814b2e", "note":"testing"}, "eventType":"abc", "timestamp":"2023-02-07T18:40:50.598408Z"}
...
```

Co-authored-by: Tom Proctor <tomhjp@users.noreply.github.com>
2023-02-09 13:18:58 -08:00
Christopher Swenson
230286b880 fix: upgrade vault-plugin-auth-centrify to v0.14.0 (#19107) 2023-02-09 11:15:00 -08:00
Austin Gebauer
69dbef27bb upgrade vault-plugin-secrets-openldap to v0.10.0 (#19108) 2023-02-09 10:37:58 -08:00
Scott Miller
91b458d8a6 Update specific wrappers to v2.0.7 (#19101)
* Update go-kms-wrapping to v2.0.7

* Update specific wrappers to v2.0.7

* Attempt to fix aead
2023-02-09 12:19:50 -06:00
Tom Proctor
c10722c55b Bump go-plugin version 1.4.5->1.4.8 (#19100) 2023-02-09 17:24:55 +00:00
Theron Voran
0a7df39a6f auth/cf: update plugin to v0.14.0 (#19098) 2023-02-09 08:40:51 -08:00
Austin Gebauer
0445667b60 upgrade vault-plugin-secrets-azure to v0.15.0 (#19096)
* upgrade vault-plugin-secrets-azure to v0.15.0

* adds changelog
2023-02-08 23:54:02 +00:00
Christopher Swenson
2319c7c659 fix: upgrade vault-plugin-auth-oci to v0.13.1 (#19088) 2023-02-08 15:36:42 -08:00
vinay-gopalan
cd54005753 upgrade vault-plugin-auth-azure to v0.13.0 (#19077) 2023-02-08 14:15:48 -08:00
Austin Gebauer
12b1a7167b upgrade vault-plugin-auth-jwt to v0.15.0 (#19076)
* upgrade vault-plugin-auth-jwt to v0.15.0

* adds changelog
2023-02-08 12:29:48 -08:00
Max Coulombe
4b5dfed883 update vault-plugin-secrets-kv to v0.14.0 (#19056)
* update vault-plugin-secrets-kv to v0.14.0

* + added changelog
2023-02-08 09:48:46 -05:00
Theron Voran
fc2fecc6e1 secrets/gcpkms: upgrade to v0.14.0 (#19063) 2023-02-07 18:30:53 -08:00
Robert
a67fd26280 secrets/ad: update plugin version (#19061)
* Update ad secrets plugin version
2023-02-07 20:06:53 -06:00
Robert
ead859ce48 secrets/terraform: update plugin version (#19059) 2023-02-07 20:04:03 -06:00
John-Michael Faircloth
bb14cd9f86 fix: upgrade vault-plugin-auth-kerberos to v0.9.0 (#19060) 2023-02-07 17:07:09 -06:00
Max Coulombe
b4dd8ae465 fix: upgrade vault-plugin-database-elasticsearch to v0.13.0 (#19050) 2023-02-07 17:11:44 -05:00