Commit Graph

299 Commits

Author SHA1 Message Date
hc-github-team-secure-vault-core
c029f6fb10 PKI: Do not set NextUpdate OCSP field when ocsp_expiry is 0 (#24192) (#24194)
* Do not set NextUpdate OCSP field when ocsp_expiry is 0

* Add cl

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2023-11-20 16:03:13 +00:00
hc-github-team-secure-vault-core
648fc5a2aa backport of commit 8c9929bed2 (#23862)
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2023-10-26 17:46:40 +00:00
hc-github-team-secure-vault-core
df4ff49c3f backport of commit 548b7a094b (#23846)
Co-authored-by: Andreas Gruhler <andreas.gruhler@adfinis.com>
2023-10-26 12:30:33 +00:00
hc-github-team-secure-vault-core
869c5bf491 backport of commit 2a46d492a3 (#23146)
Co-authored-by: Nicola Kabar <nicolaka@gmail.com>
2023-09-18 12:44:26 -07:00
Anton Averchenkov
46863a79a3 Backport #21426 (#21922) 2023-07-18 17:08:30 -04:00
Kit Haines
b154bf37aa Add missing documentation on cert metrics (#21073) (#21409)
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-06-22 11:51:35 -04:00
hc-github-team-secure-vault-core
63035d530a backport of commit 3347e5d56b (#21325)
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-06-16 17:40:30 +00:00
hc-github-team-secure-vault-core
5f9638050f Backport of Telemetry Metrics Configuration. into release/1.13.x (#21070)
* backport of commit 2dd4528ed8

* Add missing documentation on cert metrics (#21073)

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

---------

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
Co-authored-by: Kit Haines <khaines@mit.edu>
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-06-13 18:55:45 +00:00
hc-github-team-secure-vault-core
8bde6d7efe backport of commit a3657dc604 (#21183)
Co-authored-by: Theron Voran <tvoran@users.noreply.github.com>
2023-06-13 17:49:36 +00:00
hc-github-team-secure-vault-core
a27c15a19e backport of commit 820f7ee22f (#21174)
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2023-06-13 12:38:33 -04:00
hc-github-team-secure-vault-core
73fcacac02 backport of commit 58f299b63b (#20712)
Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>
2023-05-22 20:18:18 +00:00
hc-github-team-secure-vault-core
fe667b5fa1 backport of commit 26b5b24e23 (#20476)
Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>
2023-05-02 20:26:39 +00:00
hc-github-team-secure-vault-core
6452228e4a backport of commit 9ff6ee572e (#20313)
Co-authored-by: Braulio Gomes Rodrigues <brauliogr@gmail.com>
2023-04-24 14:28:16 +00:00
hc-github-team-secure-vault-core
73f821307e Minor follow-ups to #16865 (#20220) (#20222)
* Minor follow-ups to #16865

Fix PKI issuer upgrade logic when upgrading to 1.12 or later, to
actually turn off the issuer crl-signing usage when it intended to.

Fix minor typo in docs.

* changelog

Co-authored-by: Max Bowsher <maxbowsher@gmail.com>
2023-04-18 13:24:44 +00:00
hc-github-team-secure-vault-core
8a3c372f08 sdk/ldaputil: add connection_timeout configurable (#20144) (#20148)
* sdk/ldaputil: add connection_timeout configurable

* changelog

* Update doc

* Fix test

* Change default to 30s

Co-authored-by: Jason O'Donnell <2160810+jasonodonnell@users.noreply.github.com>
2023-04-17 21:18:38 +00:00
hc-github-team-secure-vault-core
209bbd877d backport of commit 5a4a7639d1 (#20075)
Co-authored-by: John-Michael Faircloth <fairclothjm@users.noreply.github.com>
2023-04-12 15:38:30 -05:00
hc-github-team-secure-vault-core
850872e910 backport of commit fc783b00ab (#20120)
Co-authored-by: Matt Schultz <975680+schultz-is@users.noreply.github.com>
2023-04-12 18:56:43 +00:00
Yoko Hyakuna
4c89e21a9a Update the HTTP verb for consistency (#20056) (#20102) 2023-04-12 17:42:35 +00:00
hc-github-team-secure-vault-core
ed11a499d6 backport of commit ef901b1bc4 (#20008)
Co-authored-by: Chip Stepowski <107566155+chip-stepowski@users.noreply.github.com>
2023-04-06 11:09:37 +00:00
hc-github-team-secure-vault-core
cbe8831c83 backport of commit 123987535f (#19922)
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-03-31 20:36:36 +00:00
hc-github-team-secure-vault-core
4be90be62c backport of commit 34e2b65be6 (#19774)
Co-authored-by: Anton Averchenkov <84287187+averche@users.noreply.github.com>
2023-03-27 17:43:27 +00:00
hc-github-team-secure-vault-core
318ac8bbc0 backport of commit 14eda8a178 (#19740)
Co-authored-by: ram-parameswaran <109940849+ram-parameswaran@users.noreply.github.com>
2023-03-24 03:24:53 +00:00
hc-github-team-secure-vault-core
96a97d675f backport of commit 6d8ed36032 (#19674)
Co-authored-by: ram-parameswaran <109940849+ram-parameswaran@users.noreply.github.com>
2023-03-22 16:30:36 +00:00
hc-github-team-secure-vault-core
101e5359b5 backport of commit 7071eb26f4 (#19478)
Co-authored-by: Max Winslow <43095669+maxiscoding28@users.noreply.github.com>
2023-03-09 01:05:34 +00:00
hc-github-team-secure-vault-core
b317bbf0db backport of commit c5d99edfec (#19453)
Co-authored-by: Max Winslow <43095669+maxiscoding28@users.noreply.github.com>
2023-03-03 11:41:51 -05:00
hc-github-team-secure-vault-core
0a42f2aea5 backport of commit 9bb8321a5b (#19409)
Co-authored-by: Max Winslow <43095669+maxiscoding28@users.noreply.github.com>
2023-02-28 21:07:42 +00:00
hc-github-team-secure-vault-core
20e201bdc3 backport of commit da31528fdc (#19405)
Co-authored-by: Austin Gebauer <34121980+austingebauer@users.noreply.github.com>
2023-02-28 10:55:57 -08:00
hc-github-team-secure-vault-core
5b2f60914e backport of commit 34a93f1a3a (#19309)
Co-authored-by: Scott Miller <smiller@hashicorp.com>
2023-02-23 09:34:48 -06:00
hc-github-team-secure-vault-core
41e384f805 backport of commit 7193916849 (#19298)
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-02-22 14:53:55 -05:00
Alexander Scheel
5710c41944 Document pki cross cluster behavior (#19031)
* Add documentation on cross-cluster CRLs

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add missing revocation queue safety buffer

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

---------

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-02-07 11:11:33 -05:00
Matt Schultz
b8e74851b3 Transit Managed Keys Documentation (#18994)
* Document 'managed_key' key type for transit. Document new 'usages' parameter when creating a managed key in the system backend.

* Document new managed key parameters for transit managed key rotation.
2023-02-03 18:49:02 -06:00
Alexander Scheel
3083f755f3 Document Cross-Cluster CRLs/OCSP for Vault Enterprise (#18970)
* Add documentation on fetching unified CRLs

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add documentation on unified OCSP

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Clarify that OCSP requests need to be URL encoded

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Document new CRL config parameters

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Clarify notes about cross-cluster options

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

---------

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2023-02-03 16:30:23 -05:00
Alexander Scheel
543f524190 Add docs on cross-cluster listing endpoints (#18987)
* Add docs on cross-cluster listing endpoints

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Update website/content/api-docs/secret/pki.mdx

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>

---------

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2023-02-03 20:01:10 +00:00
Alexander Scheel
acef4c2800 Add notes on cross cluster CRLs (#18986)
* Group CRL related sections

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Fix casing

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add notes about cluster size and revocation

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Apply suggestions from code review

Thanks Yoko!

Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>

---------

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
2023-02-03 19:51:30 +00:00
Alexander Scheel
399baabd61 Add docs on cross cluster tidy operations (#18979)
* List tidy parameters in one place

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add new tidy status outputs

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add docs on new tidy parameters

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

---------

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-02-03 14:27:18 -05:00
Austin Gebauer
e22e5ae9ed secrets/azure: changes permission recommendation to be minimally permissive (#18937) 2023-02-01 11:07:57 -08:00
Hamid Ghaf
3f4a7602b9 docs for named login MFA (#18833)
* docs for named login MFA

* feedback
2023-02-01 10:30:14 -05:00
Alexander Scheel
e4766aa974 Allow cleanup ssh dynamic keys host keys (#18939)
* Add ability to clean up host keys for dynamic keys

This adds a new endpoint, tidy/dynamic-keys that removes any stale host
keys still present on the mount. This does not clean up any pending
dynamic key leases and will not remove these keys from systems with
authorized hosts entries created by Vault.

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add documentation

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add changelog entry

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

---------

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-02-01 15:09:16 +00:00
Alexander Scheel
8e7f2076a2 Remove dynamic keys from SSH Secrets Engine (#18874)
* Remove dynamic keys from SSH Secrets Engine

This removes the functionality of Vault creating keys and adding them to
the authorized keys file on hosts.

This functionality has been deprecated since Vault version 0.7.2.

The preferred alternative is to use the SSH CA method, which also allows
key generation but places limits on TTL and doesn't require Vault reach
out to provision each key on the specified host, making it much more
secure.

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Remove dynamic ssh references from documentation

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add changelog entry

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Remove dynamic key secret type entirely

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Clarify changelog language

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add removal notice to the website

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

---------

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-01-31 16:02:22 -05:00
Nathan Button
d63d4ea913 Update docs for Azure Secrets Engine new feature (#16537)
* Update docs for Azure Secrets Enginee new feature

* Fix default vaule and clean up the description

* indent second line
2023-01-30 13:35:51 -08:00
Alexander Scheel
3eac8d5069 Clarify key bits for ssh (#18854)
* Clarify error on due to unsupported EC key bits

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Remove documentation about unsupported EC/224

Resolves: #18843

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-01-26 10:14:05 -05:00
Ashlee M Boyer
06df5b9d95 docs: Migrate link formats (#18696)
* Adding check-legacy-links-format workflow

* Adding test-link-rewrites workflow

* Updating docs-content-check-legacy-links-format hash

* Migrating links to new format

Co-authored-by: Kendall Strautman <kendallstrautman@gmail.com>
2023-01-25 16:12:15 -08:00
Kit Haines
b6b0713c35 Vault 9406 enablement certs need userid handling in role (#18397)
* The fields.

* UserID set, add to certificate

* Changelog.

* Fix test (set default).

* Add UserID constant to certutil, revert extension changes

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add user_ids as field for leaf signing

Presumably, this isn't necessary for CAs, given that CAs probably don't
have a user ID corresponding to them.

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Support setting multiple user_ids in Subject

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Allow any User ID with sign-verbatim

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add tests for User IDs in PKI

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add docs about user_ids, allowed_user_ids

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-01-25 13:13:54 -05:00
Chris Capurso
8f3dc3082c change indentation level of cas field (#18806)
* change indentation leve of cas field

* change formatting for cas_required

Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>

Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
2023-01-24 15:27:15 -05:00
Jason O'Donnell
1c98d91026 secrets/mysql: Add tls_server_name and tls_skip_verify parameters (#18799)
* secret/mysql: add tls_server_name config parameter

* Add skip verify

* Add doc

* changelog

* changelog

* Update plugins/database/mysql/connection_producer.go

Co-authored-by: Christopher Swenson <christopher.swenson@hashicorp.com>

* Update plugins/database/mysql/connection_producer.go

Co-authored-by: Christopher Swenson <christopher.swenson@hashicorp.com>

Co-authored-by: Christopher Swenson <christopher.swenson@hashicorp.com>
2023-01-23 20:06:46 +00:00
Max Coulombe
afac0f7098 * added the new redis parameter documentation (#18752)
* added the new redis parameter documentation
* added changelog
2023-01-18 15:51:15 -05:00
Alexander Scheel
8ea8598b63 Allow tidy to backup legacy CA bundles (#18645)
* Allow tidy to backup legacy CA bundles

With the new tidy_move_legacy_ca_bundle option, we'll use tidy to move
the legacy CA bundle from /config/ca_bundle to /config/ca_bundle.bak.
This does two things:

 1. Removes ca_bundle from the hot-path of initialization after initial
    migration has completed. Because this entry is seal wrapped, this
    may result in performance improvements.
 2. Allows recovery of this value in the event of some other failure
    with migration.

Notably, this cannot occur during migration in the unlikely (and largely
unsupported) case that the operator immediately downgrades to Vault
<1.11.x. Thus, we reuse issuer_safety_buffer; while potentially long,
tidy can always be run manually with a shorter buffer (and only this
flag) to manually move the bundle if necessary.

In the event of needing to recover or undo this operation, it is
sufficient to use sys/raw to read the backed up value and subsequently
write it to its old path (/config/ca_bundle).

The new entry remains seal wrapped, but otherwise isn't used within the
code and so has better performance characteristics.

Performing a fat deletion (DELETE /root) will again remove the backup
like the old legacy bundle, preserving its wipe characteristics.

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add changelog

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add documentation about new tidy parameter

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add tests for migration scenarios

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Clean up time comparisons

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-01-11 12:12:53 -05:00
Alexander Scheel
822fba38d3 Add cluster_aia_path templating variable (#18493)
* Add cluster_aia_path templating variable

Per discussion with maxb, allow using a non-Vault distribution point
which may use an insecure transport for RFC 5280 compliance.

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Address feedback from Max

Co-authored-by: Max Bowsher <maxbowsher@gmail.com>
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
Co-authored-by: Max Bowsher <maxbowsher@gmail.com>
2023-01-10 09:51:37 -05:00
Prasanna Kumar
dc7dce7e85 Correct sample payload at Generate Secret (#18561)
Correct sample payload of Generate Service Account Key secrets section
2023-01-04 16:00:16 -05:00
Steven Clark
76741f914a Resolve unrecognized parameter warnings on batch_input parameter in transit (#18299)
* Resolve unused warnings on batch_input parameter in transit

* Add cl

* Fix text in hmac batch_input parameter description
2023-01-04 09:15:48 -05:00