Commit Graph

414 Commits

Author SHA1 Message Date
hc-github-team-secure-vault-core
4989f05292 backport of commit 81e0030538 (#18327)
Co-authored-by: Scott Miller <smiller@hashicorp.com>
2022-12-13 11:22:23 -06:00
hc-github-team-secure-vault-core
e6825d5363 backport of commit 6795afe14d (#18314)
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2022-12-12 18:35:26 +00:00
hc-github-team-secure-vault-core
7a3e236047 backport of commit a8383f34a2 (#18275)
Co-authored-by: Josh Black <raskchanky@users.noreply.github.com>
2022-12-08 20:29:06 +00:00
hc-github-team-secure-vault-core
489e175532 backport of commit 7d9bc82bee (#18076)
Co-authored-by: Chris Capurso <1036769+ccapurso@users.noreply.github.com>
2022-11-22 17:30:26 +00:00
hc-github-team-secure-vault-core
894ff291f2 backport of commit 24166d1c41 (#17995)
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2022-11-16 15:30:57 -08:00
hc-github-team-secure-vault-core
ea2d6e348c backport of commit 501f1fdedf (#17961)
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
2022-11-16 11:00:52 -05:00
hc-github-team-secure-vault-core
e3d5ccdffa backport of commit 3a7ce59d01 (#17884)
Co-authored-by: Chris Capurso <1036769+ccapurso@users.noreply.github.com>
2022-11-10 13:00:48 -08:00
hc-github-team-secure-vault-core
25cb1ef458 backport of commit e19ce98a97 (#17854)
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
2022-11-08 11:58:35 -08:00
hc-github-team-secure-vault-core
53e9293c75 backport of commit af953e9ab3 (#17802)
Co-authored-by: Ellie <ellie.sterner@hashicorp.com>
2022-11-03 09:51:39 -05:00
hc-github-team-secure-vault-core
ae1b64eeeb backport of commit 64e0a2a938 (#17785)
Co-authored-by: Tom Proctor <tomhjp@users.noreply.github.com>
2022-11-02 13:11:35 -07:00
hc-github-team-secure-vault-core
51727e207d backport of commit c56b198161 (#17721)
Co-authored-by: aphorise <aphorise@gmail.com>
2022-10-28 08:33:45 -04:00
hc-github-team-secure-vault-core
45b3486659 backport of commit eff53c2a64 (#17706)
Co-authored-by: aphorise <aphorise@gmail.com>
2022-10-27 09:13:56 -07:00
hc-github-team-secure-vault-core
fe268678fd backport of commit 184a4e4ff1 (#17702)
Co-authored-by: Bernhard Kaindl <43588962+bernhardkaindl@users.noreply.github.com>
2022-10-27 11:39:28 -04:00
hc-github-team-secure-vault-core
263b138daa backport of commit 90fe084218 (#17645)
Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
2022-10-24 17:18:52 -07:00
Yoko Hyakuna
14828258fb added note regarding persistence for log level changes (#17596) (#17632)
Co-authored-by: Rowan Smith <86935689+rowansmithhc@users.noreply.github.com>
2022-10-21 14:23:03 -04:00
hc-github-team-secure-vault-core
07cf122b3d website: fixes redirected links (#17574) (#17587)
* fixes redirected links

* fix broken link to key wrapping guide

Co-authored-by: Bryce Kalow <bkalow@hashicorp.com>
2022-10-18 15:15:42 -04:00
hc-github-team-secure-vault-core
18cc72a5a9 Backport of website: content updates for developer into release/1.12.x (#17569)
* no-op commit due to failed cherry-picking

* website: content updates for developer (#17035)

* Chore (dev portal): update learn nav data links  (#15515)

* Update docs-nav-data.json

* Update docs-nav-data.json

* website: fixes internal redirects (#15750)

* chore: remove duplicate overview item (#15805)

* Use `badge` for `<sup>` tags in nav data JSON files (#15928)

* Replacing <sup> tags with badge

* Adding type and color to badges

* fix broken links in vault docs (#15976)

* website: Update old learn links to redirect locations (#16047)

* update previews to render developer UI

* update redirects

* adjust content so it is backwards compat

Co-authored-by: HashiBot <62622282+hashibot-web@users.noreply.github.com>
Co-authored-by: Kendall Strautman <36613477+kendallstrautman@users.noreply.github.com>
Co-authored-by: Ashlee M Boyer <43934258+ashleemboyer@users.noreply.github.com>

Co-authored-by: temp <temp@hashicorp.com>
Co-authored-by: Bryce Kalow <bkalow@hashicorp.com>
Co-authored-by: HashiBot <62622282+hashibot-web@users.noreply.github.com>
Co-authored-by: Kendall Strautman <36613477+kendallstrautman@users.noreply.github.com>
Co-authored-by: Ashlee M Boyer <43934258+ashleemboyer@users.noreply.github.com>
2022-10-17 13:19:22 -04:00
hc-github-team-secure-vault-core
fb23c5b261 backport of commit b5047fd8c8 (#17546)
Co-authored-by: Scott Miller <smiller@hashicorp.com>
2022-10-13 17:01:09 -05:00
hc-github-team-secure-vault-core
343442a11c backport of commit 71af786913 (#17512)
Co-authored-by: Shueh Chou Lu <evanlu361425@gmail.com>
2022-10-13 17:07:13 -04:00
hc-github-team-secure-vault-core
90aac721a9 backport of commit d46c655e6e (#17542)
Co-authored-by: Milena Zlaticanin <60530402+Zlaticanin@users.noreply.github.com>
2022-10-13 14:18:04 -05:00
hc-github-team-secure-vault-core
b8acf795e7 backport of commit 3622faaba5 (#17536)
Co-authored-by: deidra.prado <108368054+deidraprado@users.noreply.github.com>
2022-10-13 12:35:10 -04:00
hc-github-team-secure-vault-core
518baafbdc backport of commit 8bf0866164 (#17498)
Co-authored-by: Tom Proctor <tomhjp@users.noreply.github.com>
2022-10-11 23:20:50 +01:00
hc-github-team-secure-vault-core
cb6652bcbb backport of commit 4625729de1 (#17479)
Co-authored-by: Brian Shumate <brianshumate@users.noreply.github.com>
2022-10-10 13:32:48 -04:00
hc-github-team-secure-vault-core
a7124a2089 backport of commit f3940ce0a6 (#17456)
Co-authored-by: Austin Gebauer <34121980+austingebauer@users.noreply.github.com>
2022-10-07 09:58:47 -04:00
hc-github-team-secure-vault-core
4abe534b51 backport of commit 665b8e31b7 (#17446)
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
2022-10-06 15:46:55 -04:00
hc-github-team-secure-vault-core
89cb11cd6a backport of commit 95860c6a69 (#17440)
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
2022-10-06 12:35:16 -04:00
hc-github-team-secure-vault-core
50729f869c backport of commit 96e04666d6 (#17434)
Co-authored-by: Austin Gebauer <34121980+austingebauer@users.noreply.github.com>
2022-10-05 16:23:55 -04:00
hc-github-team-secure-vault-core
18bf0106a8 backport of commit 71fa60481f (#17392)
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2022-10-03 15:57:01 -04:00
hc-github-team-secure-vault-core
0261e84caf backport of commit 31ce005fe5 (#17333)
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2022-09-27 13:26:37 -07:00
hc-github-team-secure-vault-core
93994bc135 backport of commit 847e7df8cf (#17299)
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
2022-09-23 07:24:15 -07:00
hc-github-team-secure-vault-core
28872d6a14 backport of commit 6fc6bb1bb5 (#17283)
Co-authored-by: Rachel Culpepper <84159930+rculpepper@users.noreply.github.com>
2022-09-22 13:53:45 -06:00
hc-github-team-secure-vault-core
59d5476d67 backport of commit 20bc151c84 (#17275)
Co-authored-by: Rachel Culpepper <84159930+rculpepper@users.noreply.github.com>
2022-09-22 11:06:35 -05:00
Steven Clark
523e916013 Bring back managed key documentation update from ENT to OSS (#17190) 2022-09-19 11:46:30 -04:00
Max Coulombe
5abe1f8e36 + added Redis ElastiCache documentation (#17133)
* added Redis ElastiCache documentation
2022-09-19 10:26:49 -04:00
Jordan Reimer
664e0c3616 Prevent Requests to resultant-acl Endpoint When Unauthenticated (#17139)
* prevents requests to resultant-acl endpoint when not logged in

* removes unauthenticated mentions from resultant-acl api doc

* adds changelog entry
2022-09-15 12:45:33 -06:00
Devon Powley
b4e5411008 Update Vault Azure Secrets docs for permanent deletion feature (#17045)
* Update Vault Azure Secrets docs for permanent deletion feature

* Add changelog for vault azure doc update

* Update CL based on PR feedback

Co-authored-by: Devon Powley <dpowley@users.noreply.github.com>
2022-09-13 16:25:19 -07:00
Scott Miller
5d8791631c Implement partial_failure_response_code_override for batch requests (#17118)
* Implement partial_failure_response_code_override for batch requests

* docs

* changelog

* one more test case
2022-09-13 12:51:09 -05:00
Alexander Scheel
8122574573 Add more docs on revocation changes (#17085)
* Add more notes about issuer revocation

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Note BYOC in considerations

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add note about http access to CRLs, OCSP

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Recommend enabling auto-tidy & crl rebuilding

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add missing paths to personas

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2022-09-12 11:46:01 -05:00
Steven Clark
b7f4b6d6ad Update PKI documentation to clear up PKCS8 marshalling behavior (#17080)
- Update the documentation in regards to the private_key_format
   argument only controls the behavior of the private_key response field
   and does not modify the encoding of the private key within the
   pem_bundle.
2022-09-09 11:31:08 -04:00
deidra.prado
ca5da42da6 Update validate.mdx (#17023)
Removed reference of ``` --header "X-Vault-Token: ..." \``` in Sample request. X-Vault-Token is not required for this endpoint.
2022-09-08 12:50:42 -07:00
Matt Schultz
3628bb8fb1 Update transform documentation to include MSSQL. (#17021) 2022-09-06 10:55:48 -05:00
Scott Miller
d6a1ce2e7b Add support for a dedicated HMAC type in Transit. (#16668)
* Get import correct

* limits, docs

* changelog

* unit tests

* And fix import for hmac unit test

* typo

* Update website/content/api-docs/secret/transit.mdx

Co-authored-by: Matt Schultz <975680+schultz-is@users.noreply.github.com>

* Update builtin/logical/transit/path_keys.go

Co-authored-by: Matt Schultz <975680+schultz-is@users.noreply.github.com>

* Validate key sizes a bit more carefully

* Update sdk/helper/keysutil/policy.go

Co-authored-by: Matt Schultz <975680+schultz-is@users.noreply.github.com>

Co-authored-by: Matt Schultz <975680+schultz-is@users.noreply.github.com>
2022-09-06 10:17:58 -05:00
Remco Buddelmeijer
3e6f7a35f6 Add fields 'ttl' and 'num_uses' to SecretID generation. (#14474)
* Add fields 'ttl' and 'num_uses' to SecretID generation.

Add fields 'ttl' and 'num_uses' when generating/obtaining a SecretID.
Rather than just being able to use the Role's SecretID ttl and num uses. #14390

* Add secret_id_num_uses response field to generating SecretID

Add the response field secret_id_num_uses to the endpoints for generating
SecretIDs. Used in testing but also to supply the vendor with this variable.

* Add tests for new ttl and num_uses SecretID generation fields

Add tests to assert the new TTL and NumUses option in the SecretID entry.
Separate test for testing with just parameters vs a -force example.

* Patch up test for ttl and num_uses fields

* Add changelog entry for auth/approle 'ttl' and 'num_uses' fields

* Add fields to API Docs and AppRole Auth Docs example

* Correct error message for failing test on missing field.
Change the error message produced when a test fails due to a missing field.
Previous values did not map to correct fields.

* Remove unnecessary int cast to int "secret_id_num_uses" field.
Unnecessary cast to int where type already is int.

* Move numUses field check to after assignment.

* Remove metadata entry in sample payload to limit change to changes made.
Remove metadata entry in sample payload for custom-secret-id. The metadata was not
changed in the features pull request.

* Bind fields 'ttl' and 'num_uses' to role's configuration.

Rather than implicitly overriding, error when the ttl is lower than and the num
uses higher than the role's configuration. #14390

* Update changelog 14474 with a more detailed description.

More elaborate description for the changelog. Specifying the per-request based fields.

* Elaborate more on the bounds of the 'ttl' and 'num_uses' field.

Specify in both the api-docs and the CLI the limits of the fields.
Specify that the role's configuration is still the leading factor.

* Upper bound ttl with role secret id ttl

Upper bound ttl with role secret id ttl when creating a secret id
Adding test cases for infinite ttl and num uses
Adding test cases for negative ttl and num uses
Validation on infinite ttl and num uses

* Formatting issues. Removed unnecessary newline

* Update documentation for AppRole Secret ID and Role

Changed that TTL is not allowed to be shorter to longer

* Cleanup approle secret ID test and impl

* Define ttl and num_uses in every test

Define ttl and num_uses in every test despite them not being tested.
This is to ensure that no unexpected behaviour comes to mind.

* Rename test RoleSecretID -> RoleSecretIDWithoutFields

* Test secret id generation defaults to Role's config

Test secret id generation defaults to Role's configuration entries.

* Change finit -> finite

Co-authored-by: Josh Black <raskchanky@users.noreply.github.com>

* Rephrase comments to the correct validation check

* Rephrase role-secret-id option description

* Remove "default" incorrect statement about ttl

* Remove "default" incorrect statement about ttl for custom secret id

* Touch up approle.mdx to align more with path_role documentation

Co-authored-by: Remco Buddelmeijer <r.buddelmeijer@fullstaq.com>
Co-authored-by: Josh Black <raskchanky@users.noreply.github.com>
2022-09-02 09:29:59 -07:00
Alexander Scheel
3fd7e53dd5 Add ability to request manual rebuild of Delta CRLs (#16964)
* Add path to manually rebuild delta CRLs

The crl/rotate-delta path behaves like crl/rotate, triggering a
cluster-local rebuild of just the delta CRL. This is useful for when
delta CRLs are enabled with a longer-than-desired auto-rebuild period
after some high-profile revocations occur.

In the event delta CRLs are not enabled, this becomes a no-op.

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add tests for Delta CRL rebuilding

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Update documentation about Delta CRLs

Also fixes a omission in the If-Modified-Since docs to mention that the
response header should probably also be passed through.

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2022-08-31 12:42:59 -07:00
Alexander Scheel
76d89fd45f Add ability to cancel PKI tidy operations, pause between tidying certs (#16958)
* Allow tidy operations to be cancelled

When tidy operations take a long time to execute (and especially when
executing them automatically), having the ability to cancel them becomes
useful to reduce strain on Vault clusters (and let them be rescheduled
at a later time).

To this end, we add the /tidy-cancel write endpoint.

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add missing auto-tidy synopsis / description

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add a pause duration between tidying certificates

By setting pause_duration, operators can have a little control over the
resource utilization of a tidy operation. While the list of certificates
remain in memory throughout the entire operation, a pause is added
between processing certificates and the revocation lock is released.
This allows other operations to occur during this gap and potentially
allows the tidy operation to consume less resources per unit of time
(due to the sleep -- though obviously consumes the same resources over
the time of the operation).

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add tests for cancellation, pause

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add API docs on pause_duration, /tidy-cancel

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add changelog entry

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add lock releasing around tidy pause

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Reset cancel guard, return errors

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2022-08-31 11:36:12 -07:00
Trishank Karthik Kuppusamy
754c11995a Allow configuring the possible salt lengths for RSA PSS signatures (#16549)
* accommodate salt lengths for RSA PSS

* address feedback

* generalise salt length to an int

* fix error reporting

* Revert "fix error reporting"

This reverts commit 8adfc15fe3303b8fdf9f094ea246945ab1364077.

* fix a faulty check

* check for min/max salt lengths

* stringly-typed HTTP param

* unit tests for sign/verify HTTP requests

also, add marshaling for both SDK and HTTP requests

* randomly sample valid salt length

* add changelog

* add documentation
2022-08-31 12:27:03 -04:00
Violet Hynes
42645c008b VAULT-7707 Add docs around making mass amounts of lease count quotas via automation (#16950)
* VAULT-7707 Add docs around making mass amounts of lease count quotas via automation

* VAULT-7707 Changelog

* VAULT-7707 add word

* VAULT-7707 Update some small wordings

* VAULT-7707 use a real em dash
2022-08-31 11:50:01 -04:00
Steven Clark
0636467e5d Add remove_roots_from_chain to sign and issue pki apis (#16935)
* Add remove_roots_from_chain flag to sign and issue pki apis

 - Add a new flag to allow end-users to control if we return the
   root/self-signed CA certificate within the list of certificates in
   ca_chain field on issue and sign api calls.

* Add cl

* PR feedback
2022-08-31 09:51:26 -04:00
Alexander Scheel
f0c318e4e7 Add ability to perform automatic tidy operations (#16900)
* Add ability to perform automatic tidy operations

This enables the PKI secrets engine to allow tidy to be started
periodically by the engine itself, avoiding the need for interaction.
This operation is disabled by default (to avoid load on clusters which
don't need tidy to be run) but can be enabled.

In particular, a default tidy configuration is written (via
/config/auto-tidy) which mirrors the options passed to /tidy. Two
additional parameters, enabled and interval, are accepted, allowing
auto-tidy to be enabled or disabled and controlling the interval
(between successful tidy runs) to attempt auto-tidy.

Notably, a manual execution of tidy will delay additional auto-tidy
operations. Status is reported via the existing /tidy-status endpoint.

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add changelog entry

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add documentation on auto-tidy

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add tests for auto-tidy

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Prevent race during parallel testing

We modified the RollbackManager's execution window to allow more
faithful testing of the periodicFunc. However, the TestAutoRebuild and
the new TestAutoTidy would then race against each other for modifying
the period and creating their clusters (before resetting to the old
value).

This changeset adds a lock around this, preventing the races.

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Use tidyStatusLock to gate lastTidy time

This prevents a data race between the periodic func and the execution of
the running tidy.

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add read lock around tidyStatus gauges

When reading from tidyStatus for computing gauges, since the underlying
values aren't atomics, we really should be gating these with a read lock
around the status access.

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2022-08-30 15:45:54 -04:00
Milena Zlaticanin
e75173a894 update azure docs (#16819) 2022-08-29 14:55:37 -05:00