23324 Commits

Author SHA1 Message Date
hc-github-team-secure-vault-core
2c4d9993bb Merge remote-tracking branch 'remotes/from/ce/main' 2026-05-04 17:30:33 +00:00
Vault Automation
68564cde45
[UI] billing dashboard remaining tickets (#14447) (#14465)
* VAULT-44326 only poll currentmonth and intial load

* VAULT-44370 API always returns the value now, so we can remove this logic

* Fix tests..

* Add logic back in

Co-authored-by: Kianna <30884335+kiannaquach@users.noreply.github.com>
2026-05-04 17:02:15 +00:00
hc-github-team-secure-vault-core
a21751a2f4 Merge remote-tracking branch 'remotes/from/ce/main' 2026-05-04 16:31:10 +00:00
Vault Automation
f48f3f2436
PKI: Allow SCEP to leverage PKCS#11 managed keys (#14247) (#14449)
* Initial implementation of PKCS11 managed key support for SCEP

* Add test using managed keys for SCEP

* Tweak docs and make pkcs7 decrypter tests after initial direct key tests

* Add cl

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2026-05-04 16:29:21 +00:00
hc-github-team-secure-vault-core
5c75028a7f Merge remote-tracking branch 'remotes/from/ce/main' 2026-05-04 15:35:36 +00:00
Vault Automation
ab7e7ef70f
UI: Update kv max_version validation (#14430) (#14455)
* update kv max_version validation to ensure non-negative whole number, add min max options to number validator

* update tests

* add changelog entry

Co-authored-by: lane-wetmore <lane.wetmore@hashicorp.com>
2026-05-04 15:10:29 +00:00
Vault Automation
ce37adeecf
[UI] Fix secrets to secrets-engines redirect for bookmarked URLs. (#14445) (#14453)
* Fix secrets -> secrets-engines redirect

* Add changelog..

* Add tests and another route for path

* Fix test name

* Ensure we delete the engine

Co-authored-by: Kianna <30884335+kiannaquach@users.noreply.github.com>
2026-05-04 14:58:40 +00:00
hc-github-team-secure-vault-core
c5ec49bfdd Merge remote-tracking branch 'remotes/from/ce/main' 2026-05-01 15:19:23 +00:00
Vault Automation
18ef01267b
[UI] Ember Data Migration - OIDC Providers (#14386) (#14443)
* cleanup from clients migrations

* updates oidc provider list views to use api client

* updates oidc provider details view to use api service

* adds oidc provider form class

* updates oidc provider create and edit routes to use api service and form

* updates oidc provider-form component to support form class

* updates oidc acceptance tests

* updates oidc provider delete to use api service

* test fixes

* updates search-select fallback to check if fallback component is defined

Co-authored-by: Jordan Reimer <zofskeez@gmail.com>
2026-05-01 07:47:31 -07:00
hc-github-team-secure-vault-core
c8828dd2ec Merge remote-tracking branch 'remotes/from/ce/main' 2026-04-30 16:28:36 +00:00
Vault Automation
392a72652b
VAULT-44412: upgrade github.com/Azure/go-ntlmssp to resolve GHSA-pjcq-xvwq-hhpj
* VAULT-44412: upgrade github.com/Azure/go-ntlmssp to resolve GHSA-pjcq-xvwq-hhpj

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2026-04-30 09:33:01 -06:00
hc-github-team-secure-vault-core
b4c3e810ef Merge remote-tracking branch 'remotes/from/ce/main' 2026-04-30 15:32:46 +00:00
Vault Automation
ab7c54872a
Backport Allow nodes to join a cluster with a multi-seal configuration into ce/main (#14426)
* Allow nodes to join a cluster with a multi-seal configuration (#14271)

* Move SealGenerationInfo validation logic to its own file.

Refactor methog SealGenerationInfo.Validate into function
ValidateSealGeneration.

* Refactor SealGeneationInfo.Validate to func ValidateMultiSealGenerationInfo.

* Allow nodes to join a cluster with a multi-seal configuration.

Relax the multi-seal restriction when setting the Vault seal: allow an initial
multi-seal configuration if there is no stored seal generation information.

Validate multi-seal configuration at initialization time, but do not allow for
an initial multi-seal configuration at this time.

* Add unit tests.

* Run make fmt. Add copyright header.

* Add changelog entry.

* Add godoc comments to unit tests.

* Add seal generation validation stub files.

---------

Co-authored-by: Victor Rodriguez Rizo <vrizo@hashicorp.com>
2026-04-30 11:10:36 -04:00
hc-github-team-secure-vault-core
8c33e39089 Merge remote-tracking branch 'remotes/from/ce/main' 2026-04-30 08:42:19 +00:00
Vault Automation
a39fb02724
VAULT-43451: batching query instead of splitting based on semi-colen in MSSQL while deletion (#13474) (#14418)
* batching query instead of splitting based on semi colen

* added tests

* updated test

* updated test

* updated

* added changelog

* updated the query map

Co-authored-by: suraj-simha <suraj.s@hashicorp.com>
2026-04-30 13:08:30 +05:30
hc-github-team-secure-vault-core
9ab8c872cc Merge remote-tracking branch 'remotes/from/ce/main' 2026-04-29 21:21:41 +00:00
Vault Automation
a3adda9940
Backport Fix a test sdk bug relating to joining nodes when using autoseal into ce/main (#14427)
Co-authored-by: Nick Cabatoff <ncabatoff@hashicorp.com>
2026-04-29 20:40:42 +00:00
hc-github-team-secure-vault-core
7fec40165a Merge remote-tracking branch 'remotes/from/ce/main' 2026-04-29 18:26:05 +00:00
Vault Automation
5905c638d3
Backport Expand docker cluster config to support more things like seals into ce/main (#14415) 2026-04-29 14:24:00 -04:00
hc-github-team-secure-vault-core
78c916f5dc Merge remote-tracking branch 'remotes/from/ce/main' 2026-04-29 17:30:12 +00:00
Vault Automation
58656a160c
Fix MSSQL Default Revocation to use Least Privilege Metadata Query (#13528) (#14328)
* Fix mssql lease revocation

* Add changelog

* Update comments

Co-authored-by: sachin-chand01 <sachin.chand@hashicorp.com>
2026-04-29 22:41:23 +05:30
hc-github-team-secure-vault-core
0d2a2768f5 Merge remote-tracking branch 'remotes/from/ce/main' 2026-04-29 16:30:45 +00:00
Vault Automation
57d45e4981
bump go-pgmultiauth (#13895) (#14406)
* bump go-pgmultiauth

* add changelog

* add azure with backward compatibility

Co-authored-by: ajmera-naman <naman.ajmera@hashicorp.com>
2026-04-29 15:39:31 +00:00
hc-github-team-secure-vault-core
132ad9c2e0 Merge remote-tracking branch 'remotes/from/ce/main' 2026-04-29 14:41:56 +00:00
Vault Automation
0ec3e363ee
Vault-44369 return keys regardless of value inside billing endpoint (#14286) (#14371)
* create the metrics inside the response even if the value is zero

* tests

* fix a test

Co-authored-by: Amir Aslamov <amir.aslamov@hashicorp.com>
2026-04-29 14:10:39 +00:00
hc-github-team-secure-vault-core
c5812e4a43 Merge remote-tracking branch 'remotes/from/ce/main' 2026-04-29 13:32:01 +00:00
Vault Automation
684a372589
feat(enos): migrate vault_verify_undo_logs to vault_run_blackbox_test module (#14170) (#14374)
- Migrate undo logs verification from shell script to Go blackbox test
- Add session_metrics.go and session_remote.go helpers to blackbox SDK
- Create undo_logs_test.go in vault/external_tests/blackbox/verify package
- Update autopilot scenario to use vault_run_blackbox_test module
- Remove deprecated vault_verify_undo_logs module
- Update vault_run_blackbox_test module to support test environment variables

This change improves test maintainability and consistency by using the
standardized blackbox testing framework instead of custom shell scripts.

Co-authored-by: brewgator <12831681+brewgator@users.noreply.github.com>
2026-04-29 09:25:06 -04:00
hc-github-team-secure-vault-core
1e89fbf7fd Merge remote-tracking branch 'remotes/from/ce/main' 2026-04-29 10:34:16 +00:00
Vault Automation
c9430538b3
VAULT-44064 - Add rollback support to the snowflake key pair root credentials rotation (#14046) (#14400)
* Add rollback support to the snowflake key pair root rotation flow

* Added changelog

* Updated changelog

* Updated changelog

* Updated rollback logic

* Updated rollback logic

* Updated rollback logic

* Updated rollback logic

* Updated tests

* Addressed PR comments

* Updated tests

* Addressing PR Review Comments



---------

Co-authored-by: santoshhashicorp <santosh.yelamarthi@hashicorp.com>
Co-authored-by: John-Michael Faircloth <fairclothjm@users.noreply.github.com>
2026-04-29 15:29:02 +05:30
hc-github-team-secure-vault-core
63f4ea79a0 Merge remote-tracking branch 'remotes/from/ce/main' 2026-04-29 09:39:10 +00:00
Vault Automation
ba53e126a2
changing cloning to a bool (#14050) (#14363)
* changing cloning to a bool

* fixing linting and bad error return

* adding changelog

* moving tests in to external tests, adding helper

Co-authored-by: JMGoldsmith <spartanaudio@gmail.com>
2026-04-29 11:09:16 +02:00
hc-github-team-secure-vault-core
467b31b361 Merge remote-tracking branch 'remotes/from/ce/main' 2026-04-28 23:17:41 +00:00
Kianna
cb41400bf2
Manual backport... (#14369) 2026-04-28 15:28:07 -07:00
hc-github-team-secure-vault-core
8ee02d4929 Merge remote-tracking branch 'remotes/from/ce/main' 2026-04-28 22:17:50 +00:00
Vault Automation
b2675da223
call RegisterRotationJobWithResponse from RegisterRotationJob from the grpcsystem server instead of duplicating the code (#14315) (#14383)
Co-authored-by: Robert <17119716+robmonte@users.noreply.github.com>
2026-04-28 21:37:21 +00:00
hc-github-team-secure-vault-core
cb4a687f41 Merge remote-tracking branch 'remotes/from/ce/main' 2026-04-28 21:21:27 +00:00
Vault Automation
06b3374bd5
VAULT-43442: Adding Enos SDK AWS test to add/delete Vault AWS Roles (#14248) (#14358)
* updating matrix workflow format for easier visualization

* adding test to create and delete Vault AWS Roles

* refactoring functions

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* finishing up role deletion test

* finishing up role deletion test

Co-authored-by: Tin Vo <tintvo08@gmail.com>
2026-04-28 13:46:11 -07:00
hc-github-team-secure-vault-core
f8e0489905 Merge remote-tracking branch 'remotes/from/ce/main' 2026-04-28 20:26:18 +00:00
Vault Automation
3f3c29607f
[UI] Add total credential units + GCP KMS in data protection calls (#14312) (#14367)
* Add tests!

* Add gcp kms value

* Update to use enum

* Update metric helper test

Co-authored-by: Kianna <30884335+kiannaquach@users.noreply.github.com>
2026-04-28 12:57:30 -07:00
hc-github-team-secure-vault-core
79ee930e3a Merge remote-tracking branch 'remotes/from/ce/main' 2026-04-28 17:31:57 +00:00
Vault Automation
42780fbcf2
[UI] Ember Data Migration - OIDC Clients (#14288) (#14353)
* updates oidc clients list view to use api service

* updates oidc client and client details routes to use api service

* updates form field groups component to yield out form field yields

* adds oidc client form class

* updates oidc client client and edit routes to use api service

* updates oidc client-form component to use form class and removes store/model support

* updates oidc provider client route to use api service

* updates oidc key clients route to use api service

* fixes tests

Co-authored-by: Jordan Reimer <zofskeez@gmail.com>
2026-04-28 17:22:28 +00:00
Vault Automation
38461975db
added 1.20.x back (#14294) (#14307)
Co-authored-by: kelly <69541941+kporter101@users.noreply.github.com>
2026-04-28 17:12:41 +00:00
hc-github-team-secure-vault-core
1ce6289c5e Merge remote-tracking branch 'remotes/from/ce/main' 2026-04-28 16:33:10 +00:00
Vault Automation
ceada1d29a
Backport Provide more information around seal migrations into ce/main (#14345) 2026-04-28 15:54:15 +00:00
hc-github-team-secure-vault-core
e867b15f88 Merge remote-tracking branch 'remotes/from/ce/main' 2026-04-28 15:46:28 +00:00
Vault Automation
1d4d9bc61c
override lodash dep (#14316) (#14317)
Co-authored-by: lane-wetmore <lane.wetmore@hashicorp.com>
2026-04-28 08:37:26 -07:00
Vault Automation
2f4fe5345a
Backport fix: add timeout context around UpdateUser to prevent static role rotation hang into ce/main (#13971)
* fix: add timeout context around UpdateUser to prevent static role rotation hang (#13697)

* fix: add timeout context around UpdateUser to prevent static role rotation hang

* changelog: add entry for static role rotation timeout fix

* fix: rename changelog file to match expected format

* fix: update changelog format to release-note style

* Bound database Initialize to prevent static rotation stalls

* add missing go doc

* pr comments: close changelog block, distinguish parent context cancellation from UpdateUser timeout

* changelog: include Initialize timeout handling

* async Close on init cancel/timeout, add test, and set PluginName in test config

* add UpdateUser timeout test coverage for static role rotation

* go doc comments fix

* Apply suggestions from code review

Co-authored-by: Copilot Autofix powered by AI <175728472+Copilot@users.noreply.github.com>

* welp copilot prompt was out of date and I shouldn't have accepted it.

---------

Co-authored-by: Angel Garbarino <argarbarino@gmail.com>
Co-authored-by: Angel Garbarino <Monkeychip@users.noreply.github.com>
Co-authored-by: Copilot Autofix powered by AI <175728472+Copilot@users.noreply.github.com>

* fix(database): remove async UpdateUser timeout and use synchronous context to avoid race conditions

* fix(backport): restore async UpdateUser timeout behavior

---------

Co-authored-by: arslan23-push <arslan.muhammad@ibm.com>
Co-authored-by: Angel Garbarino <argarbarino@gmail.com>
Co-authored-by: Angel Garbarino <Monkeychip@users.noreply.github.com>
Co-authored-by: Copilot Autofix powered by AI <175728472+Copilot@users.noreply.github.com>
2026-04-28 09:01:57 -06:00
hc-github-team-secure-vault-core
933d304b94 Merge remote-tracking branch 'remotes/from/ce/main' 2026-04-28 13:32:26 +00:00
Vault Automation
3b43df47ae
VAULT-43741 (enos) Convert vault_verify_version to Use Blackbox SDK (#13950) (#14323)
* Update vault version verify to use Go BB SDK test

* Add missing env vars

* more

* formatting

* typo

* formatting

* fmt

* more-fmt

* requested changes

* formatting

* Apply suggestions from code review

Co-authored-by: brewgator <ltcarbonell@pm.me>

* formatting

* remove external test access

* remove exec mode

* formtting

* Delete sdk/helper/testcluster/blackbox/session_remote.go

Co-authored-by: brewgator <lt.carbonell@hashicorp.com>
2026-04-28 08:59:34 -04:00
hc-github-team-secure-vault-core
68c5959bdb Merge remote-tracking branch 'remotes/from/ce/main' 2026-04-27 23:16:40 +00:00