23198 Commits

Author SHA1 Message Date
hc-github-team-secure-vault-core
524e02f814 Merge remote-tracking branch 'remotes/from/ce/main' 2026-04-17 16:19:08 +00:00
Vault Automation
ac4503cf69
generate csp nonce for code editor styling (#13303) (#14057)
* generate csp nonce for code editor styling

* add nonce to test index.html

* add test policy

* tidy

* address merging into custom headers

* update test to expect csp nonce

* revert appConfig change

* add unsafe inline for CI only

* simplify adding csp nonce to headers

* revert ci-nonce

* add changelog entry

* Update changelog/_13303.txt



---------

Co-authored-by: lane-wetmore <lane.wetmore@hashicorp.com>
Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
2026-04-17 15:33:30 +00:00
hc-github-team-secure-vault-core
af0b459a87 Merge remote-tracking branch 'remotes/from/ce/main' 2026-04-17 14:25:11 +00:00
Vault Automation
3cd22d2d06
VAULT-43728: Extract enterprise token txn claim and write to audit log (#13962) (#14051)
Co-authored-by: miagilepner <mia.epner@hashicorp.com>
2026-04-17 16:12:47 +02:00
hc-github-team-secure-vault-core
448f4eeb58 Merge remote-tracking branch 'remotes/from/ce/main' 2026-04-17 13:29:49 +00:00
Vault Automation
a3d0147dc4
Normalize external token req client token to internal ID (#13434) (#13825)
* core: normalize JWT req client token to internal ID

Fix enterprise JWT request handling to replace req.ClientToken with the
internal jwt.<jti> token ID after JIT token entry creation, ensuring
downstream auth/lease flows use internal IDs instead of raw JWT strings.

Add regression assertions in request handling enterprise tests to verify
req/auth/token entry IDs are normalized and raw JWT is not propagated.



* vault: document perf-standby JIT forwarding



* vault: fix enterprise JWT RAR enforcement

Preserve internal JWT token-id normalization while enforcing RAR constraints from request-populated authorization details, with JWT parsing fallback for compatibility.



* Fix perf-standby JWT forwarding token restoration

Prefer inbound original token when restoring forwarding auth headers so perf-standby forwards raw JWT instead of normalized internal token ID.

Also add regression tests for header restoration behavior and clarify godocs for InboundSSCToken semantics.



* Add missing Go docs for forwarding tests

Fix code-checker lint failure by adding go doc comments to new Test* functions in request_handling_test.go.



* Address PR review feedback on type checks and CE wording

Split map lookup and type assertion in getMapString for clarity, and adjust InboundSSCToken doc wording to avoid JWT-specific language in CE file.



* Canonicalize enterprise token handling

Normalize enterprise token inputs to canonical internal IDs in token store paths and remove dual-representation RAR fallback.



* Address review nits on token normalization

Rename enterprise token normalization helper for clarity and update tests to use require.NoError/require.Equal as requested in review feedback.



* Guard sdk ent token tests with enterprise tag

Add enterprise build constraint to sdk/logical/token_ent_test.go so CE-mode sdk/logical checks can run without enterprise-only EntToken fields.



* Remove enterprise build tag from token_ent_test

Revert the temporary build constraint addition in sdk/logical/token_ent_test.go.



---------

Co-authored-by: Bianca <48203644+biazmoreira@users.noreply.github.com>
Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
2026-04-17 15:17:14 +02:00
Vault Automation
8c58356d5e
[VAULT-43581] sdk: Add MongoDB blackbox tests for static roles (#13746) (#14010)
* Add MongoDB blackbox tests for static roles

- Implement core static role tests (create, read credentials, manual rotation, validation)
- Add helper functions for MongoDB user creation and credential verification
- Implement basic connection config test
- Remove stub functions, add TODOs for future implementation
- All tests follow blackbox SDK patterns with parallel execution and proper cleanup

* make it work

* WIP

* mongo private/public urls

* Apply suggestion from @brewgator

* regex for readability

Co-authored-by: brewgator <lt.carbonell@hashicorp.com>
2026-04-17 09:15:38 -04:00
hc-github-team-secure-vault-core
40538588fa Merge remote-tracking branch 'remotes/from/ce/main' 2026-04-17 10:24:36 +00:00
Vault Automation
4d3f5d93f1
Add external token expiration E2E tests for SCIM-backed database leases (#11879) (#13428) 2026-04-17 10:12:50 +00:00
hc-github-team-secure-vault-core
a40aeea641 Merge remote-tracking branch 'remotes/from/ce/main' 2026-04-16 23:13:12 +00:00
Vault Automation
f913868b71
feat(tests): playwright test suite for custom messages feature (#14038) (#14041)
Co-authored-by: Nina Bucholtz <nina.balachandranmary@gmail.com>
2026-04-16 22:26:04 +00:00
hc-github-team-secure-vault-core
bf503ba6b2 Merge remote-tracking branch 'remotes/from/ce/main' 2026-04-16 19:28:49 +00:00
Vault Automation
a21d46ac1c
exclude .git files from make fmt check (#13963) (#14020)
Co-authored-by: Amir Aslamov <amir.aslamov@hashicorp.com>
2026-04-16 19:13:52 +00:00
hc-github-team-secure-vault-core
785e473888 Merge remote-tracking branch 'remotes/from/ce/main' 2026-04-16 18:21:04 +00:00
Vault Automation
5fa39379da
Pin Node for pnpm and local version managers (#13575) (#13987)
Move the exact UI Node version into devEngines.runtime so
package.json becomes the pnpm source of truth. Keep
engines.node broad, remove the workspace useNodeVersion
setting, and keep the root version files as manual mirrors.

Update the UI README to describe the root version files as
mirrors and refresh the lockfile to record the Node 20.20.2
runtime dependency.

Co-authored-by: Angelo Cordon <angelo.cordon@hashicorp.com>
Co-authored-by: OpenCode (gpt-5.4) <opencode.noreply@hashicorp.com>
2026-04-16 10:34:52 -07:00
hc-github-team-secure-vault-core
080ba36e93 Merge remote-tracking branch 'remotes/from/ce/main' 2026-04-16 16:29:03 +00:00
Vault Automation
203a452960
Attempt to fix build test failures due to docker user change (#13979) (#14006)
* Attempt to fix build test failures due to docker user change

* Set SKIP_SETCAP as workaround

* SKIP_SETCAP in a few more places

* Try to run command as root for TestConsulFencing_PartitionedLeaderCantWrite test

* Add run as root on a few more commands

* Fix for TestSealHA_SealUnavailable

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2026-04-16 16:09:11 +00:00
hc-github-team-secure-vault-core
1c1cd3f617 Merge remote-tracking branch 'remotes/from/ce/main' 2026-04-16 14:33:16 +00:00
Vault Automation
1ab9ee49db
[VAULT-43581] sdk: Add MongoDB static role read tests (#13748) (#13900)
- Implement read configuration test
- Add read non-existent role error handling test
- Add read after update test
- Add list multiple roles test
- Follow established patterns with constants and helper reuse
- All tests verify no sensitive data in responses

Co-authored-by: Luis (LT) Carbonell <lt.carbonell@hashicorp.com>
2026-04-16 10:09:44 -04:00
hc-github-team-secure-vault-core
cabebd095f Merge remote-tracking branch 'remotes/from/ce/main' 2026-04-16 11:21:49 +00:00
Vault Automation
716941e2fb
Make scenario blackbox tests output non-sensitive (#13933) (#13942)
Co-authored-by: Luis (LT) Carbonell <lt.carbonell@hashicorp.com>
2026-04-16 07:05:40 -04:00
hc-github-team-secure-vault-core
f1fc9d3fc0 Merge remote-tracking branch 'remotes/from/ce/main' 2026-04-15 18:19:52 +00:00
Vault Automation
a0f74e193a
show pagination regardless of filter (#13973) (#13981)
Co-authored-by: lane-wetmore <lane.wetmore@hashicorp.com>
2026-04-15 17:47:35 +00:00
hc-github-team-secure-vault-core
ba02147f1d Merge remote-tracking branch 'remotes/from/ce/main' 2026-04-15 05:40:28 +00:00
Vault Automation
f479e89567
core: Reject wildcards in acl templates (#13864) (#13924)
Return a templating error if a rendered identity template contains a
glob (*) or directory wildcard (+) .

Co-authored-by: Theron Voran <tvoran@users.noreply.github.com>
2026-04-14 21:41:22 -07:00
hc-github-team-secure-vault-core
196fb6cb4b Merge remote-tracking branch 'remotes/from/ce/main' 2026-04-15 01:41:46 +00:00
Vault Automation
88b300edbf
Update CHANGELOG.md for 2.0.0, 1.21.5, 1.20.10, 1.19.16 (#13954) (#13955)
* Update CHANGELOG.md for 2.0.0, 1.21.5, 1.20.10, 1.19.16

* Update CHANGELOG.md with 2.0.0

Co-authored-by: Chris Foran <Christopher.Foran@ibm.com>
2026-04-14 18:38:03 -07:00
hc-github-team-secure-vault-core
cda595e163 Merge remote-tracking branch 'remotes/from/ce/main' 2026-04-14 18:20:23 +00:00
Vault Automation
6b91151e72
[UI] Bump handlebars to 4.7.9 (#13932) (#13941)
Update the UI's direct handlebars dependency and refresh the
lockfile so the resolved dependency graph picks up 4.7.9.

This clears the open handlebars security findings without pulling in
unrelated dependency upgrades.

Co-authored-by: Angelo Cordon <angelo.cordon@hashicorp.com>
Co-authored-by: OpenCode (gpt-5.4) <opencode.noreply@hashicorp.com>
2026-04-14 13:42:08 -04:00
hc-github-team-secure-vault-core
3314475ce6 Merge remote-tracking branch 'remotes/from/ce/main' 2026-04-14 16:22:05 +00:00
Vault Automation
82ed6cf5f9
[UI][VAULT-43823][VAULT-43824] Custom messages filter button (#13920) (#13934)
* VAULT-43823 make apply filters a primary button when there are filters selected

* VAULT-43824 update pageSize to 10

* Add filter and pagination tests

* Add changelog

* Fix a11y errors

* Update test selectors

* Remove unused getter

Co-authored-by: Kianna <30884335+kiannaquach@users.noreply.github.com>
2026-04-14 09:13:40 -07:00
hc-github-team-secure-vault-core
9f959f3b10 Merge remote-tracking branch 'remotes/from/ce/main' 2026-04-13 21:14:52 +00:00
Vault Automation
13fa8cd0db
[UI][VAULT-43825] Have inactive custom messages show the message end date (#13884) (#13913)
* fix(custom-messages): show end time for expired/inactive messages

* test: update tests to verify badge text and color combinations

* chore(test-selectors): prefer using generalized test selectors over individual data-test-*

Co-authored-by: Nina Bucholtz <nina.balachandranmary@gmail.com>
2026-04-13 20:51:36 +00:00
hc-github-team-secure-vault-core
0475d096d1 Merge remote-tracking branch 'remotes/from/ce/main' 2026-04-13 14:31:16 +00:00
Vault Automation
7cbe817ff5
fix namespace scim invalidation issue (#13603) (#13627)
Co-authored-by: miagilepner <mia.epner@hashicorp.com>
2026-04-13 11:21:58 -03:00
hc-github-team-secure-vault-core
b672097748 Merge remote-tracking branch 'remotes/from/ce/main' 2026-04-10 22:09:01 +00:00
Vault Automation
59f8b38ffa
[VAULT-43581] sdk: Add MongoDB static role delete tests (#13747) (#13886)
- Implement delete existing role test
- Add delete prevents credential access test
- Add delete idempotency test
- Add delete non-existent role test
- Follow established patterns with constants and helper reuse
- All tests verify proper cleanup and error handling

Co-authored-by: Luis (LT) Carbonell <lt.carbonell@hashicorp.com>
2026-04-10 21:32:17 +00:00
Vault Automation
619d865ed7
Enable sys/billing/overview in admin namespace (#13049) (#13885)
* allow billing overview endpoint from admin ns

* add changelog

* add enterprise build tag

Co-authored-by: akshya96 <87045294+akshya96@users.noreply.github.com>
2026-04-10 14:20:33 -07:00
Vault Automation
4f973ee4df
Backport go: resolve GHSA-92mm-2pjq-r785 by upgrade github.com/hashicorp/go-getter into ce/main (#13879)
* go: resolve GHSA-92mm-2pjq-r785 by upgrade github.com/hashicorp/go-getter (#13878)

* go: resolve GHSA-92mm-2pjq-r785 by upgrade github.com/hashicorp/go-getter

Signed-off-by: Ryan Cragun <me@ryan.ec>

* go mod tidy

NOTE: go-getter is only used in vault-enterprise. As such this change
only represents modified transient dependencies.

Signed-off-by: Ryan Cragun <me@ryan.ec>

---------

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2026-04-10 14:11:45 -07:00
hc-github-team-secure-vault-core
f5fcb453e6 Merge remote-tracking branch 'remotes/from/ce/main' 2026-04-10 17:15:21 +00:00
Vault Automation
af1134ca3f
VAULT-43968 allow simple value filter on SCIM group member PATCH (#13833) (#13870)
* first LLM attempt

* temporarily return to version 2 to allow HCP image build

* fix test and set version back to 3

* undo version change

* lint and changelog

* rename changelog

* rename changelog.. again

Co-authored-by: Bruno Oliveira de Souza <bruno.souza@hashicorp.com>
2026-04-10 17:10:35 +00:00
hc-github-team-secure-vault-core
fe9be7e934 Merge remote-tracking branch 'remotes/from/ce/main' 2026-04-10 16:15:43 +00:00
Vault Automation
6441ee5d14
fixes issue with entity delete request failure displaying success flash message (#13856) (#13865)
Co-authored-by: Jordan Reimer <zofskeez@gmail.com>
2026-04-10 15:27:52 +00:00
hc-github-team-secure-vault-core
51121c728f Merge remote-tracking branch 'remotes/from/ce/main' 2026-04-10 15:15:19 +00:00
Vault Automation
a02c0fa26a
[UI][Bugfix] VAULT-43725 Add validations for LDAP roles create / edit forms (#13757) (#13859)
* LDAP create role name field should only contain lowercase and alphanumeric characters

* Add changelog..

* Fix controller issue

Co-authored-by: Kianna <30884335+kiannaquach@users.noreply.github.com>
2026-04-10 07:43:56 -07:00
hc-github-team-secure-vault-core
3565522bc3 Merge remote-tracking branch 'remotes/from/ce/main' 2026-04-10 14:22:07 +00:00
Vault Automation
4a2a1133fc
Backport Add default ceiling policy into ce/main (#13821) 2026-04-10 07:04:46 -07:00
hc-github-team-secure-vault-core
8fff9dd129 Merge remote-tracking branch 'remotes/from/ce/main' 2026-04-10 08:27:33 +00:00
Vault Automation
b98004d1dc
Allow oauth profile alias accessors (#13482) (#13548)
* identity: allow oauth profile alias accessors

Allow identity/entity-alias mount_accessor to use sys/config/oauth-resource-server/<profile> when the profile exists in the request namespace, while preserving existing mount accessor and namespace checks for real mounts.

Add focused identity alias tests for valid profile accessor acceptance and unknown profile rejection.



* identity: document alias accessor validation cases

Add GoDoc for validateAliasMountAccessor to clarify supported mount_accessor validation for auth-method aliases and OAuth/External JWT profile-style aliases.



* identity: use namespace+configid oauth alias accessor

Implement synthetic OAuth alias mount_accessor format as oauth_resource_server_<namespace_id>_<config_id> and validate by namespace and config ID for identity/entity-alias.

Add stable config_id to OAuth resource-server profiles, expose it on profile read responses, and add compatibility hydration for older stored profiles missing config_id.

Update identity alias tests for new accessor encoding and add cross-namespace rejection coverage.



* oauth: persist legacy profile config ids on read

Backfill missing OAuth Resource Server profile config_id under profile lock and persist it so config_id remains stable for synthetic identity alias accessors.

Update config-id lookup to resolve profiles through the read path so legacy entries are migrated before matching.

Add regression test covering legacy no-config_id profile migration and successful alias creation with migrated accessor.



* identity: clarify oauth profile existence check

Document that getOAuthResourceServerConfigProfileByConfigID is used only to verify the referenced OAuth profile exists during synthetic mount_accessor validation.



* oauth: add config-id index for O(1) lookup

Add profiles-by-config-id storage index and switch getOAuthResourceServerConfigProfileByConfigID to index-based resolution to avoid O(N) profile scans during alias accessor validation.

Persist index entries on profile upsert, clean them up on delete, and keep legacy config_id backfill path consistent with indexed storage.

Add regression tests for indexed lookup, missing-index behavior, and index cleanup on delete.



* vault: isolate oauth alias validation by build tag



* vault: move oauth accessor constants to enterprise file



* vault: tighten alias accessor validation returns



* vault: require oauth profile config_id on read



* vault: redact oauth profile identifiers in logs



* vault: remove oauth profile identifiers from logs



* vault: harden oauth log redaction paths



* vault: fix oauth invalidation replicated-path test fixture



* vault: remove sensitive error payloads from oauth logs



* Address PR review feedback for logging and tests

- restore operational error logging in OAuth invalidation/read/delete paths

- improve nil synthetic alias validator diagnostics with explicit log + internal error

- move config_id index tests from core-based vault tests to external NewTestCluster tests

- export GetOAuthResourceServerConfigProfileByConfigID for external coverage



* Apply review feedback for alias validator nil case

- include mount_accessor context in operational log when synthetic validator is nil

- return accessor-specific internal configuration error for easier troubleshooting



* Consolidate OAuth config_id tests into existing storage test file

- move config_id index coverage into oauth_resource_storage_ent_test.go

- remove standalone oauth_resource_config_id_index_ent_test.go



* Apply review nit for accessor prefix constant

- trim oauthResourceServerAliasAccessorPrefix to remove trailing underscore

- build synthetic accessor using explicit separator concatenation



* tests: migrate oauth alias accessor coverage to external



* identity: switch oauth synthetic accessor prefix to hyphenated



---------

Co-authored-by: Bianca <48203644+biazmoreira@users.noreply.github.com>
Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
2026-04-10 09:36:15 +02:00
hc-github-team-secure-vault-core
8416951dd7 Merge remote-tracking branch 'remotes/from/ce/main' 2026-04-09 23:13:38 +00:00