22387 Commits

Author SHA1 Message Date
hc-github-team-secure-vault-core
34e38af5f0 Merge remote-tracking branch 'remotes/from/ce/main' 2025-12-23 00:04:47 +00:00
Vault Automation
925676cc87
docker: build UBI containers on ubi10/minimal (#11409) (#11540)
* docker: build UBI containers on ubi10/minimal
* add changelog

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-12-22 16:12:19 -07:00
hc-github-team-secure-vault-core
87d9905ca8 Merge remote-tracking branch 'remotes/from/ce/main' 2025-12-22 22:03:15 +00:00
Vault Automation
7b470708ac
[VAULT-41521] enos(ec2_infor): update scenario base images (#11508) (#11533)
Update the base images for all scenarios:

- RHEL: upgrade base image for 10 to 10.1
- RHEL: upgrade base image for 9 to 9.7
- SLES: upgrade base image for 15 to 15.7
- SLES: add SLES 16.0 to the matrix
- OpenSUSE: remove OpenSUSE Leap from the matrix

I ended up removing OpenSUSE because the images that we were on were rarely updated and that resulted in very slow scenarios because of package upgrades. Also, despite the latest release being in October I didn't find any public cloud images produced for the new version of Leap. We can consider adding it back later but I'm comfortable just leaving SLES 15 and 16 in there for that test coverage.

I also ended up fixing a bug in our integration host setup where we'd provision three nodes instead of one. That ought to result in many fewer instance provisions per scenario. I also had to make a few small tweaks in how we detected whether or not SELinux is enabled, as the prior implementation did not work for SLES 16.

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-12-22 14:17:51 -07:00
hc-github-team-secure-vault-core
d4c3d56095 Merge remote-tracking branch 'remotes/from/ce/main' 2025-12-22 00:04:40 +00:00
Vault Automation
59b23f628f
use 'stable' instead of .go-version for the security scanner (#11374) (#11463)
* use 'stable' instead of .go-version for the security scanner

if we don't do this, the security scanner might not run because it's
using a different version of Go than what we have on whatever release
branch this is running on.

* update branches the scanner runs on

Co-authored-by: Josh Black <raskchanky@gmail.com>
2025-12-19 15:45:41 -08:00
hc-github-team-secure-vault-core
901c6675d2 Merge remote-tracking branch 'remotes/from/ce/main' 2025-12-19 19:03:10 +00:00
Vault Automation
ce23f4f2de
VAULT-41425: AWS secrets engine observations (#11395) (#11514)
* add observations for the aws secrets engine

* add mock recorder

* add tests to verify observations are created

* fix comment

* update godoc and switch to require

* fix type assertion, add test

Co-authored-by: miagilepner <mia.epner@hashicorp.com>
2025-12-19 10:57:08 -08:00
hc-github-team-secure-vault-core
a7587bca4c Merge remote-tracking branch 'remotes/from/ce/main' 2025-12-19 00:04:45 +00:00
Vault Automation
5013a5e764
UI: Updating KVV2 to use new config/tune flow (#11256) (#11511)
* separate header comp

* replacing header

* redirect to general settings

* moving kv configure under plugin settings

* add exit button

* removing all use of old header with new, updated logic

* reuse secretPath, add button to badge

* test updates pt1

* test updates pt2, refactors

* test fixes

* testing

* removing extendedConfig

* put tabs out of header

* adding new config edit page & updates

* adding page test

* pr comments

* replace type with effectiveType

* test fixes

* adding badges, cleanup test

Co-authored-by: Dan Rivera <dan.rivera@hashicorp.com>
2025-12-18 23:19:37 +00:00
hc-github-team-secure-vault-core
f614b143f5 Merge remote-tracking branch 'remotes/from/ce/main' 2025-12-18 21:02:51 +00:00
Vault Automation
05c153c70d
quotas: Pass storage through internal resolve role (#11488) (#11502)
Previously, quota updates would perform a resolve role operation without
filling in the underlying request's Storage view. This could result in a
panic on a plugin if they implement ResolveRole and don't guard against
nil Storage. Pass through the source requests storage view to prevent
this.

Co-authored-by: Mike Palmiotto <mpalmi@ibm.com>
2025-12-18 15:37:29 -05:00
Vault Automation
d25f12d943
pipeline: pin actions to latest versions (#11453) (#11458)
None of these appear to have any changes in behavior we ought to be
concerned with.

- actions/cache: https://github.com/actions/cache/releases/tag/v5.0.1
  Upgrade to Node 24

- actions/upload-artifact: https://github.com/actions/upload-artifact/releases/tag/v6.0.0
  Upgrade to Node 24

- actions/checkout: https://github.com/actions/checkout/releases/tag/v6.0.1
  Bug fix for persisted-credentials changes in 6

- actions/setup-node: https://github.com/actions/setup-node/releases/tag/v6.1.0
  Updates internal actions and removes always-auth config

- actions/download-artifact: https://github.com/actions/download-artifact/releases/tag/v7.0.0
  Upgrade to Node 24

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-12-18 13:19:23 -07:00
hc-github-team-secure-vault-core
963d312314 Merge remote-tracking branch 'remotes/from/ce/main' 2025-12-18 19:06:19 +00:00
Vault Automation
6c52175b8d
events: send events from primary to secondary clusters (#8214) (#11451)
Collect event subscriber filters on the active node of a cluster as
"cluster wide" filters, and send them from the secondary active to the
primary active node (`SendSecondaryFilters rpc`). The primary active
node forwards events downstream to the secondary active node if the
events match the secondary cluster's subscriber filters
(`RecvPrimaryEvents rpc`). Then the events are further distributed
around the secondary cluster via the existing `RecvActiveNodeEvents`
and `SendStandbyFilters` rpc's.

Events are forwarded downstream to the secondary cluster if the mount
exists on the secondary cluster, i.e. events from mounts with
`local=true` aren't forwarded, and events from mounts that are not
replicated via paths-filter aren't forwarded.

(This is the CE portion of the above^^)

Co-authored-by: Theron Voran <tvoran@users.noreply.github.com>
2025-12-18 10:56:55 -08:00
Vault Automation
09a2166d56
Backport pipeline: always initialize required request fields into ce/main (#11481)
* pipeline: always initialize required request fields (#11478)
* make fmt

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-12-18 18:47:50 +00:00
Vault Automation
91025c9ce7
[VAULT-33083] UI: support builtin plugins as external plugins (#11244) (#11489)
* [VAULT-33083] UI: support builtin plugins as external plugins

* address copilot review comments

* add changelog

* remove unused id property

* address some nits & add test coverage

* should use utils instead of mixins

* update comments

* move/consolidate logic for 'transform' engine type into ENGINE_TYPE_TO_MODEL_TYPE_MAP, added/updated test coverage

* cleanup: extract transform engine model type logic into helper functions

* address pr comment

* separation of concerns - move relevant vars/fns from all engines metadata to external plugin helpers & secret engine model helpers files

* add TODO; remove unnecessary exports

* rename secret-engine-model-helpers to secret-engine-helpers

* update unknown engine metadata from var to fn to handle a methodType param

* remove unnecessary test

* update changelog; return methodType for unknown engine metadata, simplify code for readability

* add optional chaining for fail-safe

* address kvv1 edge case - on exit configuration, kvv1 should redirect to list-root while kvv2 should redirect to the engineRoute defined in all-engines-metadata

* add ibm header

* fix test failure after updating unknown engine type

Co-authored-by: Shannon Roberts (Beagin) <beagins@users.noreply.github.com>
2025-12-18 18:29:20 +00:00
hc-github-team-secure-vault-core
879b7a9033 Merge remote-tracking branch 'remotes/from/ce/main' 2025-12-18 18:03:33 +00:00
Ryan Cragun
7c607b36d3
pipeline: various small things (#11450) (#11473)
A few smaller changes to `pipeline`:

- Change the regions that we use back to us-east-1 and us-west-2
- Don't backport anything to inactive branches. This behavior was a
  relic of prior behavior and is no longer necessary.
- Fix the go mod tests that rely on a strangely formatted mod file
- Ignore the module fixtures when running `make go-mod-tidy`
- Run `make go-mod-tidy`

Signed-off-by: Ryan Cragun <me@ryan.ec>
2025-12-18 10:58:13 -07:00
Vault Automation
20ffc6729a
Add OSS stub for core.IsReplicated() (#11456) (#11486)
Co-authored-by: Theron Voran <tvoran@users.noreply.github.com>
2025-12-18 17:50:01 +00:00
hc-github-team-secure-vault-core
215a5fabf6 Merge remote-tracking branch 'remotes/from/ce/main' 2025-12-18 17:05:02 +00:00
Ryan Cragun
f39d49e2fb
[UI] Ember Data Migration - Dashboard/Quick Actions Card (#11443) (#11480)
* converts quick-actions-card component to ts

* updates dashboard quick-actions-card to use hds super select component

* removes searchField from params search

* fixes kvv2 workflow test

Co-authored-by: Jordan Reimer <zofskeez@gmail.com>
2025-12-18 16:55:55 +00:00
Vault Automation
601e2cea29
[UI][VAULT-40916] Update page headers ui/app/components (#11104) (#11417)
* Update page headers for database components

* Update generate forms and license info

* Mount backend form page headers..

* Raft page headers

* Update role-aws-edit page header

* Tools, role-ssh, mount-backend-form and fix tests

* OIDC, TOTP and userpass page headers and tsts

* odic, keymgmt, and dashboard

* Fix dashboard title tests

* Fix breadcrumbs

* MFA, idenitity, and generated item

* Fix mfa enforcement page header tests

* Move tabs out of page header

Co-authored-by: Kianna <30884335+kiannaquach@users.noreply.github.com>
2025-12-18 11:29:04 -05:00
hc-github-team-secure-vault-core
7e080692d3 Merge remote-tracking branch 'remotes/from/ce/main' 2025-12-17 21:02:48 +00:00
Vault Automation
49974cb486
security: handle false positive OSV vulns in UBI images (#11436) (#11437)
Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-12-17 13:16:28 -07:00
hc-github-team-secure-vault-core
99a8e59592 Merge remote-tracking branch 'remotes/from/ce/main' 2025-12-17 18:03:39 +00:00
Vault Automation
4900cbfe1a
[UI] Ember Data Migration - Kubernetes Overview/Cleanup (#11430) (#11435)
* converts kubernetes overview page component to ts

* converts kubernetes role index controller to ts

* updates kubernetes overview to use api service

* removes store service from kubernetes engine

* removes kubernetes models, adapters and serializers

* removes unused types

* updates removed type references

* removes fetch-secrets-config decorator

Co-authored-by: Jordan Reimer <zofskeez@gmail.com>
2025-12-17 17:26:50 +00:00
Vault Automation
366e77bac5
UI: Convert file policy-form to typescript (#11368) (#11434)
* convert file to typescript

* remove unused util

* add support for nested options

* move automation snippets outside of builder component

* update snippet utils

* Revert "remove unused util"

This reverts commit bcb53271e63dd1fc3d2f735d7f7fcc54e5e31988.

* render automation snippets for only acl policy types

* cleanup old args

* add default arg for formatEot

* make tfvp formatters easier to follow, maybe?

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>
2025-12-17 17:20:19 +00:00
hc-github-team-secure-vault-core
c43a9ec002 Merge remote-tracking branch 'remotes/from/ce/main' 2025-12-17 00:03:05 +00:00
Vault Automation
304ba958fe
[UI] Ember Data Migration - Kubernetes Roles (#11403) (#11419)
* enables typescript in kubernetes engine

* adds api service to kubernetes engine

* removes mounts handler from kubernetes mirage handler

* adds kubernetes application route to handle withConfig decorator check

* updates usage of application model in kubernetes engine

* updates kubernetes configuration route to use api service fetched config

* adds kubernetes config form class

* updates error route backend references to secretsEngine

* updates kubernetes configure workflow to use api service and form class

* fixes tests

* converts kubernetes index route to ts

* adds capabilities service to kubernetes engine

* updates kubernetes roles view to use api service

* converts kubernetes role details component to ts

* updates kubernetes role details route to use api service

* reverts kubernetes mirage handler change

* converts kubernetes role index route to ts

* updates kubernetes generate credentials workflow to use api service

* converts kubernetes role edit and create routes to ts

* converts kubernetes create-and-edit component to ts

* adds form class for kubernetes role

* updates kubernetes create and edit routes to use api service and form class

* fixes tests

Co-authored-by: Jordan Reimer <zofskeez@gmail.com>
2025-12-16 23:13:18 +00:00
hc-github-team-secure-vault-core
46bbd40e9e Merge remote-tracking branch 'remotes/from/ce/main' 2025-12-16 20:02:37 +00:00
Vault Automation
2bc8a58cfd
[UI] Ember Data Migration - Kubernetes Config (#11358) (#11401)
* enables typescript in kubernetes engine

* adds api service to kubernetes engine

* removes mounts handler from kubernetes mirage handler

* adds kubernetes application route to handle withConfig decorator check

* updates usage of application model in kubernetes engine

* updates kubernetes configuration route to use api service fetched config

* adds kubernetes config form class

* updates error route backend references to secretsEngine

* updates kubernetes configure workflow to use api service and form class

* fixes tests

* reverts kubernetes mirage handler change

* updates type for inferredState in kubernetes config page component

* removes commented out form field in kubernetes config form

Co-authored-by: Jordan Reimer <zofskeez@gmail.com>
2025-12-16 19:24:27 +00:00
hc-github-team-secure-vault-core
89c88abd80 Merge remote-tracking branch 'remotes/from/ce/main' 2025-12-16 19:03:52 +00:00
Vault Automation
d5c5a3f1a8
mend: reintroduce mend scanner but request amd64 runners and update pinned actions (#11386) (#11387)
Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-12-16 18:36:22 +00:00
hc-github-team-secure-vault-core
1f550f622b Merge remote-tracking branch 'remotes/from/ce/main' 2025-12-16 00:04:38 +00:00
Vault Automation
cebee05e90
lint: don't check out the repository twice (#11360) (#11376)
Fix an incompatibility where we check out the repository with
checkout@v6 and then attempt to check it out again at checkout@v5 in the
set-product-version action.

* update enos directory to trigger lint

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-12-15 16:45:27 -07:00
hc-github-team-secure-vault-core
6554f0f1bb Merge remote-tracking branch 'remotes/from/ce/main' 2025-12-15 22:03:23 +00:00
Vault Automation
f7accefc40
VAULT-38917: adding verify prod release binaries in release procedure yaml (#10937) (#11200)
* adding verify prod release binaries in release procedure yaml

* adding verify prod release binaries in release procedure yaml

* fixing lint

* fixing lint

* fixing lint

* fixing lint

* fixing lint

* fixing lint

* adding list binary versions

* adding list binary

* adding list binary

* adding unit tests

* adding comments to tests and scripts

* adding comments to tests and scripts

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* fixing conflicts

* testing pipeline

* update verification logic

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* adding slack notification

* adding slack notification

* adding slack notification

* adding slack notification

* adding slack notification

* adding slack notification

* adding slack notification

* adding slack notification

* adding slack notification

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* addressing comment

Co-authored-by: Tin Vo <tintvo08@gmail.com>
2025-12-15 13:53:00 -08:00
hc-github-team-secure-vault-core
140682b6f6 Merge remote-tracking branch 'remotes/from/ce/main' 2025-12-15 21:04:05 +00:00
Vault Automation
56de87a0c8
UI: Implement visual policy builder (#11250) (#11367)
* replace Hds::Reveal with Hds::Accordion

* adjust spacing to render in Hds::Form component

* fix spacing in policy-example

* cleanup form-section class usage

* implement visual builder in create policy form

* hide visual editor in search select modal

* use general selectors, alphabetize form/field selectors

* update test coverage to check for visual policy editor

* reorganzie tests by module

* add saving functionality for visual editor

* refactor event handling methods

* refactor component so parent manages stanzas

* move snippets to automation-snippets tab component

* polish up policy diff modal

* refactor arg to be isCompact

* update test coverage and export new component

* rearrange methods to make diff easier

* small cleanup, abc vars and remove unneeded change

* add lanuage and update test coverage

* update comment

* fix form hierarchy

* fix modal spacing;

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>
2025-12-15 20:42:13 +00:00
hc-github-team-secure-vault-core
4fb3c9d5b4 Merge remote-tracking branch 'remotes/from/ce/main' 2025-12-15 20:02:47 +00:00
Vault Automation
f7c646ceff
reference aws-account-id instead of fetching it again (#11330) (#11352)
Co-authored-by: Josh Black <raskchanky@gmail.com>
2025-12-15 11:37:30 -08:00
Vault Automation
f9bb8aa7d4
Enforce Checks on Chain in Common Criteria Mode (#10915) (#11251)
* Add Disable-Time-Check flag, and also respect common criteria when doing so.

* Switch to EnableTimeChecks to not change default behavior.

* Check Common Criteria Flag Before Disabling Verification.

* Add Changelog.

* Update builtin/logical/pki/issuing/cert_verify_ent.go



* Update changelog/_10915.txt



* PR feedback.

* Merge-fix

* Test case requested by PR review.

---------

Co-authored-by: Kit Haines <khaines@mit.edu>
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2025-12-15 14:08:43 -05:00
Vault Automation
e78aea2ec1
Correctly set signature bits. (#10700) (#10977)
* Correctly set signature bits.

* All the other places that accidentally conflate issuer and issued key.

* Update builtin/logical/pki/path_roles.go



* PR Feedback.

* Add changelog.

* Test and validate keybits in a single call

* License header.

* Add/combine validate and get default hashbits calls.

* Actually set keyBits on the role.

* Fix storage test, switch to defaultOrValue.

* fix storage test.

* Update error return for linter.

* Look at underlaying key type not type which might include "managedKeyType" for ca-issuer.

* Update expected role values, and convert between PublicAlgorithm and KeyType internally.

* Move the ec to ecdsa transformation to helper functions.  More consistant usage.

* Speed improvement to testing - pregenerate CA bundles and CSR.

* Add go test doc.

* Fix issue with web-merge.

* Error wrapping error now warnings aren't errors.

* PR feedback - move ecdsa support to subfunctions.

---------

Co-authored-by: Kit Haines <khaines@mit.edu>
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2025-12-15 14:08:17 -05:00
hc-github-team-secure-vault-core
28f315c53a Merge remote-tracking branch 'remotes/from/ce/main' 2025-12-15 19:04:28 +00:00
Vault Automation
b4db60b6c8
Vault 40239/perf secondary approle periodic tidy (#10794) (#10939)
* Adding logic to run tidy on local secret IDs only for perf secondaries

* Modifying periodic tidy to run on local mounts

* Updating changelog for fix in VAULT-40239

Co-authored-by: Sean Ellefson <sellefson@hashicorp.com>
2025-12-15 11:34:21 -07:00
hc-github-team-secure-vault-core
7027ac64c8 Merge remote-tracking branch 'remotes/from/ce/main' 2025-12-15 17:05:33 +00:00
Vault Automation
41bc535dc9
sdk/rotation: Prevent rotation attempts on read-only storage (#10762) (#11156)
* sdk/rotation: Prevent rotation attempts on read-only storage

Rotation is a write operation that mutates both Vault's storage
and an external resource. Attempting this on a read-only node
(like in a performance secondary cluster) will fail.

This check preempts the rotation to prevent a split-brain scenario
where the external credential is changed but Vault's storage
cannot be updated.

* changelog

* fix failing test

Co-authored-by: John-Michael Faircloth <fairclothjm@users.noreply.github.com>
2025-12-15 10:47:28 -06:00
hc-github-team-secure-vault-core
e66d5d4399 Merge remote-tracking branch 'remotes/from/ce/main' 2025-12-12 23:03:21 +00:00
Vault Automation
6c2f2a84ee
VAULT-40506: Disable custom JSON limit parsing on ClusterListener (#10848) (#11075)
* add test for issue

* add bool to disable json limit parsing

* clean up tests

* fix godoc

* restore previous clustering setup

* add nil check for VaultNodeConfig

* add changelog

* move docker test to appropriate directory to allow testing in CI

---------

Co-authored-by: davidadeleon <56207066+davidadeleon@users.noreply.github.com>
Co-authored-by: davidadeleon <ddeleon@hashicorp.com>
2025-12-12 17:23:36 -05:00