20405 Commits

Author SHA1 Message Date
Scott Miller
415d260995
Support trimming trailing slashes via a mount tuneable to support CMPv2 (#28752)
* Support trimming trailing slashes via a mount tuneable to support CMPv2

* changelog/

* Perform trimming in handleLoginRequest too

* Eagerly fetch the mount entry so we only test this once

* Add a mount match function that gets path and entry

* Update vault/request_handling.go

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>

* more docs

* Some patches (from ENT) didnt apply

* patch fail

* Update vault/router.go

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>

* PR feedback

* dupe

* another dupe

* Add support for enabling trim_request_trailing_slashes on mount creation

* Fix read mount api returning configuration for trim_request_trailing_slashes

* Fix test assertion

* Switch enable and tune arguments to BoolPtrVal to allow end-users to specify false flag

* Add trim-request-trailing-slashes to the auth enable API and CLI

---------

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2024-10-24 10:47:17 -05:00
miagilepner
314874c2b1
Remove newline to fix enterprise merge (#28758) 2024-10-24 14:25:39 +02:00
Ryan Cragun
ce5885279b
VAULT-31181: Add pipeline tool to Vault (#28536)
As the Vault pipeline and release processes evolve over time, so too must the tooling that drives them. Historically we've utilized a combination of CI features and shell scripts that are wrapped into make targets to drive our CI. While this 
approach has worked, it requires careful consideration of what features to use (bash in CI almost never matches bash in developer machines, etc.) and often requires a deep understanding of several CLI tools (jq, etc). `make` itself also has limitations in user experience, e.g. passing flags.

As we're all in on Github Actions as our pipeline coordinator, continuing to utilize and build CLI tools to perform our pipeline tasks makes sense. This PR adds a new CLI tool called `pipeline` which we can use to build new isolated tasks that we can string together in Github Actions. We intend to use this utility as the interface for future release automation work, see VAULT-27514.

For the first task in this new `pipeline` tool, I've chosen to build two small sub-commands:

* `pipeline releases list-versions` - Allows us to list Vault versions between a range. The range is configurable either by setting `--upper` and/or `--lower` bounds, or by using the `--nminus` to set the N-X to go back from the current branches version. As CE and ENT do not have version parity we also consider the `--edition`, as well as none-to-many `--skip` flags to exclude specific versions.

* `pipeline generate enos-dynamic-config` - Which creates dynamic enos configuration based on the branch and the current list of release versions. It takes largely the same flags as the `release list-versions` command, however it also expects a `--dir` for the enos directory and a `--file` where the dynamic configuration will be written. This allows us to dynamically update and feed the latest versions into our sampling algorithm to get coverage over all supported prior versions.

We then integrate these new tools into the pipeline itself and cache the dynamic config on a weekly basis. We also cache the pipeline tool itself as it will likely become a repository for pipeline specific tooling. The caching strategy for the `pipeline` tool itself will make most workflows that require it super fast.


Signed-off-by: Ryan Cragun <me@ryan.ec>
2024-10-23 15:31:24 -06:00
Deniz Onur Duzgun
afd023e41c
ci: update the security-scanner gha token (#28410)
* ci: update the security-scanner gha token

* fix codeql version

---------

Co-authored-by: mickael e <mickael@hashicorp.com>
2024-10-23 13:53:35 -06:00
miagilepner
4439ee8798
Fix Windows chown error (#28748)
* noop for windows chown

* changelog
2024-10-22 14:57:26 +02:00
claire bontempo
9097689d2a
Adds copy button to entity, alias and mfa method ID fields (#28742)
* make id buttons copyable

* add changelog
2024-10-21 12:48:00 -07:00
Luis (LT) Carbonell
efd6148f43
Fix typo in changelog (#28743) 2024-10-21 15:12:31 -04:00
Yoko Hyakuna
a3eef86f47
Format fixes & tweaks (#28731) 2024-10-21 08:35:37 -07:00
Kit Haines
c0b2a6d370
Add enrollment protocol sublinks. (#28737) 2024-10-21 09:18:17 -04:00
Yoko Hyakuna
a2390d3234
[Docs] Add usage metrics page (#28723)
* Add UI screenshots

* Add 'usage metrics' page

* Align the step instruction and its screenshot

* Additional notes

* Add link to API docs
2024-10-18 08:18:45 -07:00
Theron Voran
8f1850baa3
sdk: updating to docker v27.2.1 (#28456)
Also update to vault-testing-stepwise v0.3.2
2024-10-17 14:14:35 -07:00
Violet Hynes
33248ce9a1
VAULT-31789 Update proxy-proto version to 0.8.0 (#28729) 2024-10-17 15:46:20 -04:00
akshya96
435ecc63ba
Add tokens to local path (#28722) 2024-10-17 11:13:41 -07:00
Alex
0ab970cd93
Upgrade HDS to 4.13.0 (#28709) 2024-10-17 11:04:40 -07:00
claire bontempo
1fbbf9d76b
UI: Ember-data upgrade 5.3.2 prep: use custom service instead of extending ember-data store (#28695)
* rename store to pagination, remove store extension

* initial update of service test

* remove superfluous helper

* replace store with pagination service in main app

* update kmip engine syntax

* add pagination to kmip engine

* update to pagination in config-ui engine

* update sync engine to use pagination service

* use pagination service in kv engine

* use pagination service in ldap engine

* use pagination in pki engine

* update renaming clearDataset functions

* link to jira VAULT-31721

* remove comment
2024-10-17 10:00:57 -07:00
Angel Garbarino
f2041b00e5
Remove decodeURIComponent method for KVv2 secret path on list view (#28698)
* remove encoding for KVv2

* test coverage

* changelog

* validations

* Revert "validations"

This reverts commit d6fd291d856a2005ed8f3a1a4f0f42add4ecb272.

* update subtext for secret path

* Update list.js

* Update secret-edit.js

* test coverage for data-octets

* Update list-directory.js

* fix modelForm test

* amend subText

* test selector things
2024-10-16 23:06:52 +00:00
Adrian Todorov
a78d535945
update wording of Nomad Client Counting FAQ to reflect the new Integration (#28685)
* update wording of Nomad Client Counting FAQ to reflect Workload Identity and other updates

* Update computing-clients.mdx

* Update website/content/partials/faq/client-count/computing-clients.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/partials/faq/client-count/computing-clients.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

---------

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2024-10-16 12:35:38 -07:00
Steven Clark
bce085bd3f
Fix issue building urls with IPv6 IPs for ACME http-01 challenges (#28718)
* Fix ACME http-01 challenges for IPv6 IPs

 - We weren't properly encapsulating the IPv6 IP within the url provided
   to the http client with [].

* Add cl

* Cleanup a test println
2024-10-16 14:26:44 -04:00
Sarah Chavis
d3ef02b778
VAULT-29153: Update docs with IPv6 compliance info (#28707)
* update matrix doc and add IPv6 info

---------

Co-authored-by: Ryan Cragun <me@ryan.ec>
2024-10-15 16:34:16 -07:00
Sarah Chavis
9f2c4353ae
[DOCS] Add missing metric: vault.barrier.estimated_encryptions (#28708)
* Create placeholders for missing metric

* update metric info and rewrite rotation doc

* Deal with erroneous content error
2024-10-15 16:29:25 -07:00
Rachel Culpepper
9795c05d97
add error info to internal error (#28714) 2024-10-15 17:16:57 +00:00
Scott Miller
a0af792437
Adds ACME specific error types to errors returned by challenge validation functions. (#28678)
* wip

* Change test expectation

* changelog

* remove ultimately unnecessary changes

* adjust unit test again
2024-10-15 17:13:13 +00:00
Scott Miller
c41f5bdcb4
Document the encryption algorithms used in ADP auditing purposes (#28691) 2024-10-15 11:56:16 -05:00
hc-github-team-secure-vault-core
6caff7a02e
Update vault-plugin-auth-azure to v0.19.1 (#28712)
* Update vault-plugin-auth-azure to v0.19.1

* Add changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
2024-10-15 16:30:54 +00:00
hc-github-team-secure-vault-core
0a13127dbe
Update vault-plugin-secrets-openldap to v0.14.2 (#28704)
* Update vault-plugin-secrets-openldap to v0.14.2

* Add changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
2024-10-14 16:50:28 -05:00
John-Michael Faircloth
945d0f7989
docs: fix links and format for mongodbatlas secrets (#28688) 2024-10-14 11:17:04 -07:00
hc-github-team-secure-vault-core
fd96ac79b9
Update vault-plugin-secrets-azure to v0.20.1 (#28699)
* Update vault-plugin-secrets-azure to v0.20.1

* Add changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
2024-10-14 16:31:09 +00:00
Kuba Wieczorek
80729f063f
[VAULT-28762] Run Autopilot upgrade tests on main and PRs to main on ENT if the AP code has changed (#28697)
Co-authored-by: Josh Black <raskchanky@gmail.com>
2024-10-14 16:59:00 +01:00
Theron Voran
a94c8b8aa6
docs/vso: hvs rotating and dynamic secrets (#28656) 2024-10-11 17:50:47 -07:00
Sarah Chavis
927d1758e6
CLI content refresh - audit commands (#28642)
First CLI command doc updates:
* Rewrite CLI usage page
* Rewrite token helper page
* Move and rewrite CLI emulator doc
* Rewrite `vault audit` command family docs
2024-10-11 16:29:15 -07:00
Tom Chwojko-Frank
b753cc50d5
Updating the active version to 1.18.x (#28693)
* Updating the active version to 1.18.x

* Removed 1.15.x
2024-10-11 14:49:54 -07:00
claire bontempo
217380cf87
UI: Ember data upgrade prep: cleanup store and lazyPaginatedQuery (#28690)
* revert hacks necessary for ember-data 4.11

* remove stubbed unloadAll and unloadRecord methods

* remove clearAllDatasets and just use clearDataset()
2024-10-11 14:18:56 -07:00
davidadeleon
ef967a0d8c
update AOP docs (#28686)
Co-authored-by: davidadeleon <ddeleon@hashicorp.com>
2024-10-11 09:29:07 -04:00
miagilepner
5cbebacfce
VAULT-28520: Docs describing active node/leadership election timing (#28608)
* add leadership election delay explanations

* Update website/content/docs/internals/high-availability.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/docs/internals/high-availability.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/docs/internals/high-availability.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/docs/internals/integrated-storage.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/docs/internals/integrated-storage.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/docs/internals/high-availability.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/docs/internals/integrated-storage.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/docs/internals/high-availability.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* small fixes

---------

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2024-10-11 14:36:55 +02:00
Angel Garbarino
82133e7742
update language (#28673) 2024-10-10 16:51:25 -06:00
mickael-hc
e81b6bdbb2
Update changelog with recent advisories (#28680)
* add link to HCSEC-2024-20

* add HCSEC-2024-21
2024-10-10 17:58:41 -04:00
Victor Rodriguez
948332ed3e
Call ClearInitializationFlag before preSeal during Initialization. (#28679) 2024-10-10 20:58:58 +00:00
Victor Rodriguez
fc0483f046
Prevent node activation while Vault initialization is in progress. (#28674)
Store a value to storage to signal that initialization is in progress. Look for
this entry when trying to unseal using stored keys, and bail out if the entry is
found.
2024-10-10 15:42:57 -04:00
Victor Rodriguez
a5a48bb50c
Revert "Move writing of stored keys to the end of Vault initialization. (#28538)" (#28675)
This reverts commit e7e16fd1756afa5921f402ee9bff0bd58b422023.
2024-10-10 18:51:13 +00:00
Chris Capurso
458de6d118
only strip v1 prefix from path if present (#28669)
* only strip v1 prefix from path if present

* add changelog entry

* adjust changelog
2024-10-10 12:25:14 -04:00
Tom Chwojko-Frank
6bd2cc03e6
Fixing entry in the changelog (#28664) 2024-10-10 11:22:50 -04:00
Sarah Chavis
33872cc10b
Fix broken link in 1.18.x release notes (#28665) 2024-10-09 18:20:18 -07:00
Scott Miller
004dfc49f8
Add a max_crl_size parameter to CRL config (#28654)
* wip

* Unit test the CRL limit, wire up config

* Bigger error

* API docs

* wording

* max_crl_entries, + ignore 0 or < -1 values to the config endpoint

* changelog

* rename field in docs

* Update website/content/api-docs/secret/pki/index.mdx

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>

* Update website/content/api-docs/secret/pki/index.mdx

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>

---------

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2024-10-09 21:38:55 +00:00
Leland Ursu
3b0614abd0
added changelog update records for 1.18.0, 1.17.7, 1.16.11, and 1.15.16 (#28655)
* added changelog update records for 1.18.0, 1.17.7, 1.16.11, and 1.15.16

* removed the word enterprise to make consistant

* revert WIF chnage log item wording

* updated the backport versions to denote that they are enterprise releases

---------

Co-authored-by: lursu <leland.ursu@hashicorp.com>
2024-10-09 17:02:51 -04:00
Scott Miller
38df9cf488
Tweak the ocsp_ca_certificate param docs to be more clear about what kind of cert it wants (#28659) 2024-10-09 16:16:26 -04:00
Violet Hynes
210da8f705
Fix data race around static secret capability manager (#28653)
* Fix data race around static secret capability manager

* Actually, clone the map
2024-10-09 15:43:49 -04:00
Angel Garbarino
1229f5723a
Ember data remove deprecation Ember Promise Many Array behaviors (#28652)
* fix

* remove deprecation from config
2024-10-09 11:19:10 -07:00
Robert
60d7051700
Add docs and api-docs info for gcp replication locations sync, github environments, github organizations beta, and add sys/activation-flags page (#28463)
* Add field to API docs, add small section to overview

* Update examples, wording

* Update github API docs

* Apply suggestions from code review

Co-authored-by: John-Michael Faircloth <fairclothjm@users.noreply.github.com>

* Update wording

* Be a little more specific on repository owner

* Put BETA tag on each org field, put visibility explanation in paragraph

* Add org secrets limitation

* Add sys/activation-flags page

* Update Vercel granularity note

* Apply suggestions from code review

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/docs/sync/vercelproject.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Apply suggestions from code review

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Small rewording, remove optional tags with defaults

---------

Co-authored-by: John-Michael Faircloth <fairclothjm@users.noreply.github.com>
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2024-10-09 10:27:33 -05:00
Scott Miller
3c0656e4c4
Update marcellanz/transit_pkcs1v15 RSA encryption support (#25486)
* [transit-pkcs1v15] transit support for the pkcs1v15 padding scheme – without UI tests (yet).

* [transit-pkcs1v15] renamed padding_scheme parameter in transit documentation.

* [transit-pkcs1v15] add changelog file.

* [transit-pkcs1v15] remove the algorithm path as padding_scheme is chosen by parameter.

* Update ui/app/templates/components/transit-key-action/datakey.hbs

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>

* Update ui/app/templates/components/transit-key-action/datakey.hbs

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>

* Update ui/app/templates/components/transit-key-action/datakey.hbs

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>

* Update website/content/api-docs/secret/transit.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/api-docs/secret/transit.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/api-docs/secret/transit.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Add warnings to PKCS1v1.5 usage

* Update transit

* Update transit, including separating encrypt/decrypt paddings for rewrap

* Clean up factory use in the presence of padding

* address review feedback

* remove defaults

* lint

* more lint

* Some fixes for UI issues

 - Fix padding scheme dropdown console error by adding values
   to the transit-key-actions.hbs
 - Populate both padding scheme drop down menus within rewrap,
   not just the one padding_scheme
 - Do not submit a padding_scheme value through POST for non-rsa keys

* Fix Transit rewrap API to use decrypt_padding_scheme, encrypt_padding_scheme

 - Map the appropriate API fields for the RSA padding scheme to the
   batch items within the rewrap API
 - Add the ability to create RSA keys within the encrypt API endpoint
 - Add test case for rewrap api that leverages the padding_scheme fields

* Fix code linting issues

* simply padding scheme enum

* Apply suggestions from code review

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>

* Fix padding_scheme processing on data key api

 - The data key api was using the incorrect parameter name for
   the padding scheme
 - Enforce that padding_scheme is only used on RSA keys, we
   are punting on supporting it for managed keys at the moment.

* Add tests for parsePaddingSchemeArg

* Add missing copywrite headers

* Some small UI fixes

* Add missing param to datakey in api-docs

* Do not send padding_scheme for non-RSA key types within UI

* add UI tests for transit key actions form

---------

Co-authored-by: Marcel Lanz <marcellanz@n-1.ch>
Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
Co-authored-by: Steve Clark <steven.clark@hashicorp.com>
Co-authored-by: claire bontempo <cbontempo@hashicorp.com>
2024-10-09 09:30:14 -05:00
Victor Rodriguez
770d902f60
Use stored seal generation info for response to sys/seal-backend-status (#28631)
Use stored seal generation info for response to sys/seal-backend-status.
2024-10-09 14:04:50 +00:00