20405 Commits

Author SHA1 Message Date
Kit Haines
5da8750a93
Split the Key_Usage Field into separate fields (#28500)
* Split the Key_Usage Field into separate fields - one for the Cert
Endpoints (Sign-intermediate/Generate Root) the other for the CSR
Endpoint (intermediate generate).  These have different defaults,
and descriptions.

* Fix schema test.
2024-09-24 15:35:24 -04:00
Chris Capurso
f0782ee3fb
calculate token lease TTL using tune config (#28498)
* calculate token lease TTL using tune config

* add changelog entry
2024-09-24 15:29:56 -04:00
Violet Hynes
6d66990cb6
Fix static secret caching race condition (#28494)
* Fix static ssecret caching data race

* Fix static ssecret caching data race

* Changelog
2024-09-24 14:08:48 -04:00
Raja Nadar
7cf6cbd330
Update libraries.mdx section for VaultSharp (#28426)
* Update libraries.mdx section for VaultSharp

Added more info on VaultSharp for latest .NET version support and comprehensiveness of auth and secret backends supported

* Update website/content/api-docs/libraries.mdx

Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>

---------

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
2024-09-24 09:20:08 -07:00
claire bontempo
8567b75ff2
UI: add allow_empty_principals to ssh engine (fixes failing test) (#28484) 2024-09-24 09:09:04 -07:00
Ryan Cragun
c8c51b1b9d
VAULT-30819: verify DR secondary leader before unsealing followers (#28459)
* VAULT-30819: verify DR secondary leader before unsealing followers

After we've enabled DR replication on the secondary leader the existing
cluster followers will be resealed with the primary clusters encryption
keys. We have to unseal the followers to make them available. To ensure
that we absolutely take every precaution before attempting to unseal the
followers we now verify that the secondary leader is the cluster leader,
has a valid merkle tree, and is streaming wals from the primary cluster
before we attempt to unseal the secondary followers.

Signed-off-by: Ryan Cragun <me@ryan.ec>
2024-09-24 09:13:40 -06:00
Scott Miller
12f03b073a
Make reception of an empty valid principals configurable based on a role flag. (#28466)
* Make reception of an empty valid principals configurable based on a role flag.

Adds allow_empty_principals, which if true allows valid_principals on credential generation calls
to be empty.

* changelog

* Allow empty principals on unrelated unit test

* whitespace
2024-09-23 17:20:11 -05:00
hc-github-team-secure-vault-core
2e6ba29f5b
Update vault-plugin-secrets-openldap to v0.14.1 (#28479)
* Update vault-plugin-secrets-openldap to v0.14.1

* Add changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
2024-09-23 20:43:27 +00:00
Scott Miller
4515a016f7
Fix accidental debug logging in the OCSP helper client (#28450)
* Fix accidental debug logging in the OCSP helper client

* changelog
2024-09-23 18:17:11 +00:00
Steven Clark
6acfc8e212
Add a core test logger to help capture the MSSQL container output (#28472)
* Add a core test logger to help capture the MSSQL container output

 - I believe the if t.Failed prevents the logging of the container
   logging as when executed the test isn't considered failed yet.
 - Use a test core logger so that we can capture the container output
   all the time and get it from the captured log files when the test
   fails

* bump image tag to 2022-latest

---------

Co-authored-by: JM Faircloth <jmfaircloth@hashicorp.com>
2024-09-23 13:57:21 -04:00
Tero Saarni
6f13aec0d3
core/api: Add missing LICENSE files to sub-modules (#27920)
Go module tooling mandates that each sub-module contains its own LICENSE file.
If absent, it defaults to the LICENSE file in the root of the git repository.
This resulted in the api/auth/* modules erroneously inheriting the BUSL
license instead of the correct MPL license, as indicated by the SPDX info in
the actual API code.

This update ensures that module documentation is displayed correctly on
pkg.go.dev and resolves issues with various tools showing incorrect license
information for the sub-modules.

Signed-off-by: Tero Saarni <tero.saarni@est.tech>
2024-09-23 13:06:35 -04:00
Steven Clark
13de053935
Do not shadown err within MSSQL test container intialization (#28468)
- Get better test failure error messages by not shadowing the errors
   when we are attempting to start the MSSQL docker container, so
   we can fail the tests with the proper error message that is occuring
   instead of mssqlhelper.go:60: Could not start docker MSSQL: %!s(<nil>)
2024-09-23 12:22:11 -04:00
Luis (LT) Carbonell
7c1a83422b
Improve Error Handling for Missing Credentials in AppRole and UserPass (#28441)
* Return invalid credentials for missing login parameters (400 vs 500)

* Add changelog

* Update test
2024-09-23 10:55:20 -04:00
framsouza
efd2fb2ae4
[docs] Updating Kubernetes upgrade instruction (#25286)
* [docs] Updating kubernetes upgrade instruction

* Fixing code block

* Update website/content/docs/platform/k8s/helm/run.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/docs/platform/k8s/helm/run.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/docs/platform/k8s/helm/run.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/docs/platform/k8s/helm/run.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/docs/platform/k8s/helm/run.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

---------

Co-authored-by: Peter Wilson <peter.wilson@hashicorp.com>
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
Co-authored-by: divyaac <divya.chandrasekaran@hashicorp.com>
Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
2024-09-23 14:09:05 +00:00
Brian Howe
fc5ed22fd1
pass context to S3 and dynamoDB storage calls (#27927)
* pass context to S3 and dynamoDB storage calls

* add changelog

* fix changelog
2024-09-23 08:46:15 -04:00
Andrew Talbot
2fc8e35ec3
docs(lambda-extension): update distributed tracing headers warning; (#28319)
* docs(lambda-extension): update cache header warning;

* docs(lambda-extension): tweak language;

* docs(lambda-extension): accept pr comment

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

---------

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2024-09-20 14:39:16 -07:00
rajesht-source
0c986fc660
updated vault helm chart doc with usecase of nlb (#27690)
* updated vault helm chart doc with usecase of nlb

Signed-off-by: Kumar, Rajesh (XINBM1A) <Rajesh.Kumar2@fmr.com>

* Update index.mdx - changes as per the pr comment

Signed-off-by: Kumar, Rajesh (XINBM1A) <Rajesh.Kumar2@fmr.com>

---------

Signed-off-by: Kumar, Rajesh (XINBM1A) <Rajesh.Kumar2@fmr.com>
2024-09-20 16:53:38 -04:00
Chelsea Shaw
520f141608
UI: refactor KMIP role model (#28418)
* update kmip/role model and adapter

* New KMIP role form component

* cleanup on kmip role adapter/model

* fix role details view

* update tests to check for kmip role form and details validity

* cleanup

* Add kmip-role-fields test

* add headers, remove old component

* Address PR comments
2024-09-20 18:52:59 +00:00
Chelsea Shaw
2ce68778e4
UI: Fix LDAP Mirage Handler (#28432)
* update ldap mirage scenario to allow check-in/check-out action

* update libraries test to mount engine

* update mirage, fix tests

* update lease renew CLI command

* fix test

* update tests
2024-09-20 13:44:29 -05:00
Owen Zhang
e848f1683d
Update namespaces.mdx (#28314)
Add "@include 'alerts/enterprise-only.mdx'" since namespace is an enterprise feature

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2024-09-19 18:28:58 -07:00
Mark Lewis
a89f8d5228
Update index.mdx (#28350)
Typo

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2024-09-19 18:28:50 -07:00
gerardma77
17664bcfbe
Adding AD lifetime period of an old password note to Vault LDAP secrets Engine API Documentation (#28429)
* adding_OldPasswordAllowedPeriod_waring

* Updated note for AD password

* Update website/content/api-docs/secret/ldap.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

---------

Co-authored-by: Equus quagga <jan.prinsloo@hashicorp.com>
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2024-09-19 12:08:32 -07:00
gerardma77
2e6944d93e
Adding AD lifetime period of an old password note to Vault LDAP secrets Engine Documentation. (#28428)
* adding_OldPasswordAllowedPeriod_waring

* Updated note for AD passwords

* Update website/content/docs/secrets/ldap.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

---------

Co-authored-by: Equus quagga <jan.prinsloo@hashicorp.com>
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2024-09-19 11:44:00 -07:00
Sarah Chavis
343cc88e03
Update index.mdx (#28436)
Fix list typo
2024-09-18 16:27:45 -07:00
Tony Wittinger
20b48f6963
Update CHANGELOG.md (#28435)
* Update CHANGELOG.md

* Update CHANGELOG.md
2024-09-18 22:38:14 +00:00
Jonathan Frappier
66fa7606ac
Add set up vault service doc (#28272)
* Add set up vault service doc
* Suggestions/edits (#28394)
---------

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2024-09-18 11:12:06 -07:00
Violet Hynes
3df04b8aae
Update LTS language to not contradict (#28424) 2024-09-18 13:37:48 -04:00
Ryan Cragun
b977fac936
VAULT-30819: DR replicatio: wait for seal rewrap before enabling DR (#28425)
Ensure that both clusters have completed their seal rewrap before
enabling DR on the secondary. We don't want the secondary to come back
up in an in-between state.

Signed-off-by: Ryan Cragun <me@ryan.ec>
2024-09-18 10:29:03 -06:00
Violet Hynes
fdc871370d
Update Okta SDK to latest minor version (#28407) 2024-09-17 16:12:23 -04:00
Chelsea Shaw
a9e6704267
UI: Handle some deprecations (#28276)
* don't update the passed object directly
fixes deprecation https://deprecations.emberjs.com/id/setting-on-hash

* replace hasRecordForId with peekRecord -- ember-data:deprecate-has-record-for-id

* fix deprecation ember-data:deprecate-has-record-for-id

* update deprecation workflow
2024-09-17 14:59:01 -05:00
Chris Capurso
75bea5c05a
add end-to-end test for audit HMACing (#28415)
* add end-to-end test for audit HMACing

* fix some comments

* add clarification for entry count assertion

* more comment clarity

* use const for hmac prefix

* add check for disabling audit device
2024-09-17 15:50:03 -04:00
Violet Hynes
e17fc06824
Add note about vault kv get to Proxy docs (#28400) 2024-09-17 15:22:34 -04:00
Violet Hynes
450506ba9c
Fix link to mongodb atlas page (#28403)
* Fix link to mongodb atlas page

* Fix missing space
2024-09-17 15:22:06 -04:00
Ryan Cragun
1082629d1f
VAULT-30819: Fix two potential flakes in DR replication (#28409)
Fix two occasional flakes in the DR replication scenario:
* Always verify that all nodes in the cluster are unsealed before
  verifying test data. Previously we only verified seal status on
  followers.
* Fix an occasional timeout when waiting for the cluster to unseal by
  rewriting the module to retry for a set duration instead of
  exponential backoff.

Signed-off-by: Ryan Cragun <me@ryan.ec>
2024-09-17 12:32:15 -06:00
Kuba Wieczorek
1736addedf
Send the UI test results from the CI to DataDog (#28412) 2024-09-17 12:29:04 +01:00
miagilepner
d00715d129
VAULT-28478: Updates to autopilot docs (#28331)
* restructure

* update command

* fixes

* fix command flags

* revert makefile change

* remove tick log
2024-09-17 10:53:18 +02:00
Violet Hynes
c140470639
Fix Vercel error caused by spaces before code snippet (#28408) 2024-09-16 15:54:38 -04:00
hc-github-team-secure-vault-core
7a5d99d316
Update vault-plugin-database-redis to v0.4.0 (#28404)
* Update vault-plugin-database-redis to v0.4.0

* Add changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
2024-09-16 17:41:35 +00:00
Andrew Talbot
336e0c7f0d
docs(lambda-extension): add line to document new revoke token header feature; (#28318) 2024-09-16 13:09:09 -04:00
Robert
d466d7949b
Add activation flags cluster note (#28399) 2024-09-16 10:40:03 -05:00
Luis (LT) Carbonell
352bbeb06c
VAULT-12732: Add Heap Profiling Option to Vault Server Command Line (#27033)
* Add pprof output option to CLI

* Add to docs

* Add changelog

* Update website/content/docs/commands/server.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* some changes

* Update changelog/27033.txt

Co-authored-by: Josh Black <raskchanky@gmail.com>

---------

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
Co-authored-by: Josh Black <raskchanky@gmail.com>
2024-09-16 11:00:08 -04:00
Raja Nadar
a439428855
Remove 100% dup section for 1.13.6 (#28398)
removed the section
2024-09-16 09:04:56 -04:00
Robert
7112c7be5d
Add activation-flags cluster known issue (#28341) 2024-09-13 17:40:31 -05:00
Chelsea Shaw
c7ed13f1a2
UI: Add expected attr to pass tests (#28389)
* Add expected attr to pass tests

* add tidyCmpv2NonceStore to tidy forms
2024-09-13 13:00:57 -07:00
Steven Clark
6cf885f85a
Fix key usage changelog entry (#28391)
- Change it from a feature to an improvement.
2024-09-13 13:38:43 -04:00
Chelsea Shaw
1c16994bc3
UI: stabilize replication tests (#28384)
* Add specificity to replication title selectors

* Use specific selectors for replication titles in tests
2024-09-12 14:50:37 -05:00
Ellie
84c58f66bb
add warning to identify which entities have 1+ aliases with the same mount accessor (#28054)
* add warning to identity which entities have 1+ aliases with the same mount accessor

* remove redundant log
2024-09-12 14:26:09 -05:00
Rachel Culpepper
978b3aee52
add ce changes and documentation for tidying cmpv2 nonce store (#28362)
* add ce changes and documentation for tidying cmpv2 nonce store

* add build tag

* fix test failures

* fix backend test
2024-09-12 11:32:51 -05:00
kpcraig
d01db33b33
Update release notes and knowns issues for aws auth external id bug (#28129)
* add documentation for external_id bug

* Update website/content/docs/release-notes/1.17.0.mdx

Co-authored-by: Ellie <ellie.sterner@hashicorp.com>

* fix partials include

* Update website/content/partials/known-issues/aws-auth-external-id.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/partials/known-issues/aws-auth-external-id.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

---------

Co-authored-by: Ellie <ellie.sterner@hashicorp.com>
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2024-09-12 10:31:32 -05:00
JMGoldsmith
cc38383732
VAULT-30694 Adding a check for nil values returned by the queue (#28330)
* adding a check for nil values returned by the queue

* adding changelog

* changing to be more idiomatic

* fixing error message to be a bit more clear

* reverting change to error handling

* Update builtin/logical/aws/path_static_roles.go

Co-authored-by: John-Michael Faircloth <fairclothjm@users.noreply.github.com>

---------

Co-authored-by: John-Michael Faircloth <fairclothjm@users.noreply.github.com>
2024-09-12 17:26:46 +02:00