Commit Graph

19292 Commits

Author SHA1 Message Date
BiKangNing
f8ad26c89f chore: fix function names (#26087)
Signed-off-by: depthlending <bikangning@outlook.com>
Co-authored-by: Chris Capurso <1036769+ccapurso@users.noreply.github.com>
2024-03-22 12:43:01 -04:00
Rachel Culpepper
f7301bc5fa add check for enable_multiseal with sighup (#26105) 2024-03-22 11:21:32 -05:00
Karuppiah Natarajan
30667916b7 fix link to specifying ttl and audience section of kubernetes oidc provider (#26097) 2024-03-22 12:21:17 -04:00
Victor Rodriguez
b112eb9877 Reload seals if necessary when a node gains leadership. (#26098)
As part of the process of becoming a leader node, check to see if the seal
configuration needs to be reloaded. Reloading may be necessary if the seal
generation information computed during start up is outdated. For example, a new
node that has just joined the cluster will have incorrect seal generation
information in memory, even if it has the correct seal configuration, since it
did not have access to the stored seal generation information.
2024-03-22 15:51:42 +00:00
Scott Miller
c6da02962d Add a configuration flag for enabling multiseal (Seal HA), CE side (#25908)
* Add a configuration flag for enabling multiseal (Seal HA), CE side

* imports

* no quotes

* get rid of dep on ent config

* Abstract enableMultiSeal for a build time switch

* license headers

* wip

* gate physical seal gen fetch by a param

* docs tweak, remove core flag

* updates from the ent pr

* update stub

* update test fixtures for enable_multiseal

* use accessor

* add a test fixture for non-multiseal diagnose

* remove debugging crtuch

* Do handle phys seal gen info even if multiseal is off, in order to facilitate enable/disable safeties

* more enabled flag handling

* Accept seal gen info if we were previously disabled, and persist it

* update unit test

* Validation happens postUnseal, so this test is invalid

* Dont continue setting conf if seal loading fails during SIGHUP

* Update website/content/docs/configuration/seal/seal-ha.mdx

Thanks, that does sound much clearer

Co-authored-by: Jason O'Donnell <2160810+jasonodonnell@users.noreply.github.com>

* use validation if previous gen was enabled

* unit test update

* stub SetMultisealEnabled

* bring over more changes from ent

* this was an unfix

---------

Co-authored-by: Jason O'Donnell <2160810+jasonodonnell@users.noreply.github.com>
2024-03-22 14:23:05 +00:00
Steven Clark
2fe676e75b Validate OCSP response is signed by expected issuer (#26091)
* Validate OCSP response is signed by expected issuer and serial number matches request

 - There was a bug in the OCSP response signature logic, it properly
   verified but kept around the ocspRes object around so we ignored
   the errors found and passed the response object back up the stack.
 - Now extract the verification logic into a dedicated function, if
   it returns an error, blank the ocspRes response as we can't trust it.
 - Address an issue that the OCSP requests from multiple servers were
   clobbering each others responses as the index loop variable was not
   properly captured.
 - Add a missing validation that the response was for the serial number
    we requested

* Add cl
2024-03-22 09:28:02 -04:00
Peter Wilson
5a1d20bd35 Audit: Timestamps on sink entries should match the creation time of the audit event (#26088)
* Sync timestamps in sinks to the creation time of the audit entry (event)

* changelog
2024-03-22 13:26:55 +00:00
Scott Miller
14816dcf86 Be explicit about Shamir seals in Seal HA (#26092) 2024-03-22 09:25:20 -04:00
miagilepner
f2cd7e2c32 VAULT-24581: Generalize activity log tests to run for all client types (#26071)
* generalize tests for all client types

* fix godoc
2024-03-22 10:19:23 +01:00
Robert
c647835af9 Add new ent stub for unauthenticated paths (#26079)
* Add new ent stub for unauthenticated paths
2024-03-21 16:52:37 -05:00
Chelsea Shaw
6091ad4f71 Remove internal version endpoint (#25998)
* VAULT-24469 use sys/seal-status instead of internal version endpoint

* Update tests and mirage handlers

* Revert "VAULT-20669: Add New Authenticated Endpoint for Version  (#23740)"

This reverts commit 550c99ae3b.

* Readded version_test.go

* Reverted any old changes on versionlgo

---------

Co-authored-by: divyaac <divyaac@berkeley.edu>
2024-03-21 09:14:22 -07:00
Violet Hynes
0048a205ce VAULT-20396 CE side changes for identity test-identified issue (#26072)
* VAULT-20396 CE side changes for identity test-identified issue

* Weird git stuff
2024-03-21 11:16:35 -04:00
John-Michael Faircloth
69fd338c78 fix plugin update check pr num fetching (#26066) 2024-03-20 18:57:42 +00:00
Paul Banks
fc0abf2d9f Remove CE-only warning from shared tests (#26052)
* Remove CE-only warning from shared tests

* Add tests for all warnings emitted during raft config parsing

* Unmark warnings as CE only that are universal
2024-03-20 17:08:33 +00:00
Peter Wilson
f706c20084 VAULT-15682: Audit request header invalidation (#26043)
* Update audited headers to provide a mechanism for invalidation
* Extra tests for AuditedHeadersConfig
* Make sure we clear headers on invalidation if we cannot reload
2024-03-20 16:33:03 +00:00
Ciara Clements
89c9f86f22 Update upgrade-to-1.13.x.mdx (#25990)
Changed the wording of "For integrated storage users, Vault needs to be upgraded to 1.13 will enable this feature by default." to be more clear and concise to "For integrated storage users, upgrading Vault to 1.13 will enable this feature by default."
2024-03-20 08:17:00 -07:00
mickael-hc
55b4f1c42f docs: secrets-sync - move destination note (#26044) 2024-03-20 10:54:43 -04:00
Wes Gilleland
3106f26474 Fix small typo in troubleshooting-acme.mdx (#24547)
* Fix small typo in troubleshooting-acme.mdx

* Create changelog/24547.txt

* Delete changelog/24547.txt

---------

Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
2024-03-20 09:16:19 -04:00
miagilepner
3c3c0d48db Add stubs for new raft methods (#26051) 2024-03-20 10:44:39 +01:00
claire bontempo
4e85411dd0 add to resolutions block (#26041) 2024-03-19 17:45:58 -07:00
claire bontempo
3adcf19f18 UI: resolve dependabot socket.io parser vulnerability (actually) (#26042)
* add to resolutions block

* fix typo for resolution pacakge ~face palm~

* Revert "add to resolutions block"

This reverts commit 42acc8b1929cad75f4125ad1ea138396d7027153.
2024-03-19 15:10:51 -07:00
Noelle Daley
76d51dcf61 tests: add more confirm-modal test coverage / remove flaky test (#26040) 2024-03-19 10:55:37 -07:00
Paul Banks
3a2a922b26 Raft config refactor for mount entry size limit (#25992)
* CE parts for mount-namespace entry limit

* Remove redundant code from refactor

* Add doc comment note about ent-only use of interface

* Add CHANGELOG
2024-03-19 17:28:23 +00:00
Josh Black
012c3422f8 Add acme clients internal data structures and adjust tests (#26020)
* add acme clients internal data structures and adjust tests

* fix another acme test

* replace manual list with ActivityClientTypes

* add changelog
2024-03-19 09:24:54 -07:00
miagilepner
b01ba81339 VAULT-23553: Revert "Don't panic on unknown raft ops" (#25991)
* Revert "Don't panic on unknown raft ops (#17732)"

This reverts commit c9b4300897.

* add test for panic

* add back changelog

* add godoc for test

* log -> l

* changelog

* Apply suggestions from code review

Co-authored-by: Josh Black <raskchanky@gmail.com>

---------

Co-authored-by: Josh Black <raskchanky@gmail.com>
2024-03-19 17:21:07 +01:00
radek-sprta
ab59f8fa56 Docs: Mention default_extensions_template in API docs (#26028)
Co-authored-by: Chris Capurso <1036769+ccapurso@users.noreply.github.com>
2024-03-19 11:06:51 -04:00
Steven Clark
6fca34eace Proceed with cert auth login attempts if ocsp_fail_open is true and servers are unreachable (#25982) 2024-03-19 10:39:37 -04:00
Jens Hofmann
846476e857 change shell command for userpass authentication (#24342)
Use vault auth enable instead of vault write, because I think it is more appropriate or the "new way"

Co-authored-by: Marc Boudreau <marc.boudreau@hashicorp.com>
2024-03-19 10:23:00 -04:00
Steven Clark
5785191067 Support OCSP responses without NextUpdate field set (#25912)
* Support OCSP responses without a NextUpdate value set

 - Validate that the ThisUpdate value is
   properly prior to our current time and
   if NextUpdate is set that, ThisUpdate is
   before NextUpdate.
 - If we don't have a value for NextUpdate just compare against ThisUpdate.

* Add ocsp_this_update_max_ttl support to cert auth

 - Allow configuring a maximum TTL of the OCSP response based on the
   ThisUpdate time like OpenSSL does
 - Add test to validate that we don't cache OCSP responses with no NextUpdate

* Add cl

* Add missing ` in docs

* Rename ocsp_this_update_max_ttl to ocsp_this_update_max_age

* Missed a few TTL references

* Fix error message
2024-03-18 18:12:37 -04:00
claire bontempo
48e146cbbd UI: Fix kubernetes auth method role management (#25999)
Co-authored-by: Chelsea Shaw <cshaw@hashicorp.com>
Co-authored-by: Chelsea Shaw <82459713+hashishaw@users.noreply.github.com>
2024-03-18 19:59:35 +00:00
Steven Clark
94d42235cf Address OCSP client caching issue (#25986)
* Address OCSP client caching issue

 - The OCSP cache built into the client that is used by cert-auth
   would cache the responses but when pulling out a cached value the
   response wasn't validating properly and was then thrown away.

 - The issue was around a confusion of the client's internal status
   vs the Go SDK OCSP status integer values.

 - Add a test that validates the cache is now used

* Add cl

* Fix PKI test failing now due to the OCSP cache working

 - Remove the previous lookup before revocation as now the OCSP
   cache works so we don't see the new revocation as we are actually
   leveraging the cache
2024-03-18 19:11:14 +00:00
Ryan Cragun
c7bdac4081 [QT-688] Pin to latest tsccr actions (#26006)
This should resolve various Node JS 16 deprecation errors.

Signed-off-by: Ryan Cragun <me@ryan.ec>
2024-03-18 18:56:12 +00:00
Noelle Daley
4f6aef6664 update HDS and ember-flight-icons (#25946)
* chore: update hds and flight-icons

* fix: add missing deps and use .css from HDS

* update HDS components to new syntax

* database-connection-edit: add @waitFor to fix rotate-related acceeptance tests

* use stub to fix confirm-modal-test

---------

Co-authored-by: Alexey Kulakov <uni_que@me.com>
2024-03-18 10:42:45 -07:00
Chris Capurso
1274f2d79a document that LISTs with no results return 404 (#25989) 2024-03-18 13:11:42 -04:00
claire bontempo
1410d968d1 update ember-tether to remove vulnerable dep (#25985) 2024-03-18 08:56:30 -07:00
Chelsea Shaw
36bc1825ad UI: Update README and localhost (#25959)
* Update readme and localhost

* finish the thought
2024-03-18 10:49:57 -05:00
John-Michael Faircloth
594d304f25 api: do not require sudo for GetAuth wrapper (#25968)
* api: do not require sudo for GetAuth wrapper

* changelog
2024-03-15 14:40:22 -07:00
claire bontempo
8342cb5fdb UI: Add socket.io v4.5.4 to resolutions (#25975)
* bump ember-cli version 4.12.2

* Revert "bump ember-cli version 4.12.2"

This reverts commit 977323750729daaf0658e280d8723d476ec11652.

* add socket-io version to resolutions
2024-03-15 13:39:48 -07:00
dependabot[bot]
7834f45197 Bump github.com/jackc/pgx/v4 from 4.18.1 to 4.18.2 in /sdk (#25888)
* Bump github.com/jackc/pgx/v4 from 4.18.1 to 4.18.2 in /sdk

Bumps [github.com/jackc/pgx/v4](https://github.com/jackc/pgx) from 4.18.1 to 4.18.2.
- [Changelog](https://github.com/jackc/pgx/blob/v4.18.2/CHANGELOG.md)
- [Commits](https://github.com/jackc/pgx/compare/v4.18.1...v4.18.2)

---
updated-dependencies:
- dependency-name: github.com/jackc/pgx/v4
  dependency-type: indirect
...

Signed-off-by: dependabot[bot] <support@github.com>

* go mod tidy

---------

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Co-authored-by: Peter Wilson <peter.wilson@hashicorp.com>
2024-03-15 18:04:40 +00:00
dependabot[bot]
031e56d3a4 Bump github.com/go-jose/go-jose/v3 from 3.0.1 to 3.0.3 in /api (#25841)
Bumps [github.com/go-jose/go-jose/v3](https://github.com/go-jose/go-jose) from 3.0.1 to 3.0.3.
- [Release notes](https://github.com/go-jose/go-jose/releases)
- [Changelog](https://github.com/go-jose/go-jose/blob/v3.0.3/CHANGELOG.md)
- [Commits](https://github.com/go-jose/go-jose/compare/v3.0.1...v3.0.3)

---
updated-dependencies:
- dependency-name: github.com/go-jose/go-jose/v3
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Co-authored-by: Peter Wilson <peter.wilson@hashicorp.com>
2024-03-15 17:52:57 +00:00
dependabot[bot]
674f7b4fc9 Bump github.com/jackc/pgproto3/v2 from 2.3.2 to 2.3.3 in /sdk (#25962)
* Bump github.com/jackc/pgproto3/v2 from 2.3.2 to 2.3.3 in /sdk

Bumps [github.com/jackc/pgproto3/v2](https://github.com/jackc/pgproto3) from 2.3.2 to 2.3.3.
- [Commits](https://github.com/jackc/pgproto3/compare/v2.3.2...v2.3.3)

---
updated-dependencies:
- dependency-name: github.com/jackc/pgproto3/v2
  dependency-type: indirect
...

Signed-off-by: dependabot[bot] <support@github.com>

* go mod tidy

* go mod tidy

---------

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Co-authored-by: Peter Wilson <peter.wilson@hashicorp.com>
2024-03-15 16:29:20 +00:00
Angel Garbarino
1745d50c2d Test coverage and disable button fix on Secrets Sync opt-in modal (#25907)
* fix issue of checkbox value not disabling after canceling the modal

* add component test coverage in overview

* add acceptance test to see flow show banner to not show banner

* comment change

* remove unecessary hash and add settled because ci is funny

* circle ci play nice

* forgot to add my changes 🙃

* blah

* that was a lot for delinating the errors properly—😵‍💫

* pr review comments, thank you for the catches team
2024-03-15 09:59:08 -06:00
jmarcelletti
79f0ce2d74 Update step-down.mdx (#19329)
Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2024-03-14 11:21:46 -07:00
divyaac
74abae6f01 Added Invalid Token Error Message that will be returned for bad tokens (#25953)
Edited changelog

Added dummy policy to CE file to make tests pass

Added changelog
2024-03-14 11:15:20 -07:00
Tom Proctor
6482672d12 Docs: Updated plugin versioning usage docs for pinned versions (#25607) 2024-03-14 17:29:21 +00:00
John-Michael Faircloth
9523667a6a update ecosystem codeowners (#25950) 2024-03-14 16:21:53 +00:00
Ben Ash
2bbae2f1c9 Update codeowners for docs/platform/k8s (#25951) 2024-03-14 14:45:43 +00:00
Peter Wilson
dc1e0be0e5 helper/metricsutil: Update usage of expfmt (#25947)
* helper/metricsutil: Update usage of expfmt

The previous exposed constants are no longer exposed and we can use expfmt.Format instead.
https://github.com/prometheus/common/pull/576

* reodered imports

---------

Co-authored-by: Matthias Loibl <mail@matthiasloibl.com>
2024-03-14 10:13:45 +00:00
Ben Ash
77e3ebbad5 Update docs for VSO v0.5.2 (#25939) 2024-03-13 17:49:33 -04:00
Meggie
9ab05bbbce Update CHANGELOG.md (#25906)
* Update CHANGELOG.md

* Fix formatting

I fixed the formatting with one correction that I got from an engineer where the backporting of a changelog correction got tripped up with the branch cutting.

I deleted other lines that didn't follow the existing pattern for new features. Note that these will be regenerated when we do the GA changelog, so that will happen again.
2024-03-13 15:50:40 -04:00