20405 Commits

Author SHA1 Message Date
akshya96
e1d3c322e7
Auto-rolling billing start docs PR (#27926)
* auto-roll docs changes

* addressing comments

* address comments

* Update website/content/api-docs/system/internal-counters.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* addressing some changes

* update docs

* update docs with common explanation file

* updated note info

* fix 1.18 upgrade doc

* fix content-check error

* Update website/content/partials/auto-roll-billing-start-example.mdx

Co-authored-by: miagilepner <mia.epner@hashicorp.com>

---------

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
Co-authored-by: miagilepner <mia.epner@hashicorp.com>
2024-08-06 16:09:00 +00:00
Paul Banks
b276c122c0
Clarify audit log failure telemetry docs. (#27969)
* Clarify audit log failure telemetry docs.

* Add the note about the misleading counts
2024-08-06 14:51:23 +01:00
Theron Voran
a17121c138
Update hana db pkg (#27950)
* database/hana: use go-hdb v1.10.1

* docs/hana: quotes around password so dashes don't break it
2024-08-05 16:26:24 -07:00
Adam Rowan
8b8069a30c
Update interoperability-matrix.mdx (#27977)
Updating the existing Vault/YubiHSM integration with a newer version of Vault as well as now supporting Managed Keys.
2024-08-05 18:31:30 -04:00
Ryan Cragun
6366455922
enos: don't expect curl available in docker image (#27984)
Signed-off-by: Ryan Cragun <me@ryan.ec>
2024-08-05 15:25:39 -06:00
Jonathan Frappier
1fb20dbc3d
Add regular (e.g. not API) doc for cross namespace (#27975)
* Add regular (e.g. not API) doc for cross namespace

* Update website/content/docs/enterprise/namespaces/configure-cross-namespace-access.mdx

Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>

* Update website/content/docs/enterprise/namespaces/configure-cross-namespace-access.mdx

Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>

* Update website/content/docs/enterprise/namespaces/configure-cross-namespace-access.mdx

Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>

---------

Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
2024-08-05 16:31:56 -04:00
Angel Garbarino
a81b482158
Prep for configuration.edit refactor (#27948)
* move files around

* move fetches to config to the configuration.index route

* working... for aws, lots of clean up left

* move error handling to parent route

* standarize configModel param

* add test coverage

* welp a miss for non configurable engines

* pr comments

* remove mirage interrupts and test actual api

* update configuration details test to test for template only things

* api error coverage
2024-08-05 13:39:10 -06:00
Ryan Cragun
40698e962b
docker: use alpine 3 and UBI 8 tags instead of minor version pins (#27971)
Signed-off-by: Ryan Cragun <me@ryan.ec>
2024-08-05 12:09:19 -06:00
VBouiller
9b3a73daba
Update userpass CLI doc for custom path flag (#27968)
It's not clear from the get go how to use the userpass auth method with a custom path.

Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
2024-08-05 17:42:23 +00:00
Meggie
1f7e589850
Add link from api-docs to namespace docs (#27502)
I wanted to make the list of API endpoints with restricted namespace access easier to find.

I considered adding the partial directly here, but thought the explanation in the link would have been helpful.
2024-08-05 12:44:26 -04:00
Peter Wilson
d824e572be
merge two consecutive if checks, update comments (#27963) 2024-08-05 13:54:37 +00:00
Steven Clark
1d476381c2
Add new GetSignerFromKeyEntry method for ent usage (#27961) 2024-08-05 09:18:27 -04:00
Steven Clark
37513e0bd0
Pin PKI test suite to zlint v3.6.2 (#27964)
- Avoid this error for now

zlint_test.go:149: got unexpected error from test e_subj_orgunit_in_ca_cert: map[details:The OU attribute in the Subject is prohibited in Root and TLS CA certificates result:error]
2024-08-05 13:10:50 +00:00
Ryan Cragun
e246b2652c
enos: support ancient systemd in vault_upgrade (#27960)
Amazon Linux 2 uses an ancient version of Systemd/systemctl so instead
of using -P when determining the unit file we use the less convenient
-p.

Signed-off-by: Ryan Cragun <me@ryan.ec>
2024-08-02 20:36:46 +00:00
Ryan Cragun
720e942662
[VAULT-2937] Verify the /sys/version-history in enos scenarios (#27947)
When verifying the Vault version, in addition to verifying the CLI
version we also check that the `/sys/version-history` contains the
expected version.

As part of this we also fix a bug where when doing an in-place upgrade
with a Debian or Redhat package we also remove the self-managed
`vault.service` systemd unit to ensure that correctly start up using the
new version of Vault.

Signed-off-by: Ryan Cragun <me@ryan.ec>
2024-08-02 13:26:39 -06:00
aphorise
37dbe7bf38
Docs: Approle removed incorrect token_num_uses that's incomplete with batch (#27909)
Corrected Docs at: [vault/docs/auth/approle **Via the CLI**](https://developer.hashicorp.com/vault/docs/auth/approle#via-the-cli-1) which results in the error message below on versions near to Vault 1.17.x.

```
Error writing data to auth/approle/role/my-role: Error making API request.

URL: PUT https://.../v1/auth/approle/role/my-role
Code: 400. Errors:

* 'token_type' cannot be 'batch' or 'default_batch' when set to generate tokens with limited use count
```

Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
2024-08-02 19:23:33 +00:00
Peter Wilson
6b9261e1db
Attempt to improve explanation of the current metric so Operators don't think things are failing when they aren't (#27955) 2024-08-02 20:21:03 +01:00
Peter Wilson
2dbb3d4dcb
Audit: rewrite audit entry formatting to improve performance (#27952)
* rewrite audit entry formatting to improve performance
2024-08-02 19:04:39 +01:00
Chelsea Shaw
ec5dfceaa2
update imports of getOwner to be from @ember/owner (#27953) 2024-08-02 10:58:15 -05:00
Violet Hynes
f786af16a9
Add docs note about Windows paths (#27946) 2024-08-02 09:49:54 -04:00
miagilepner
2d1c3db46b
VAULT-25883: Fix namespace errors with path filters on sys/internal/ui/mounts (#27939)
* include namespace in prefix fopr sys/internal/ui/mounts

* changelog
2024-08-02 10:28:34 +02:00
Angel Garbarino
01709e992a
Swap route settings.configure-secret-backend for nested edit and index route under secret.configuration (#27918)
* router changes and appropriate file shuffling

* changelog

* fix test routes

* handle redirect... is this okay?

* test redirect coverage

* move configure-secret-backend test and cleanup

* coverage for non configurable secret engine:

* clean up

* remove redirect
2024-08-01 16:06:04 -06:00
Chelsea Shaw
68a5741c49
UI: fix export button tests (#27945) 2024-08-01 13:55:54 -05:00
Scott Miller
2d1f692d1e
Increase cert auth role cache max size (#27942) 2024-08-01 13:08:44 -05:00
John-Michael Faircloth
899ebd4aff
db/postgres: add feature flag protected sslinline configuration (#27871)
* adds sslinline option to postgres conn string
* for database secrets type postgres, inspects the connection string for sslinline and generates a tlsconfig from the connection string.

* support fallback hosts

* remove broken multihost test

* bootstrap container with cert material

* overwrite pg config and set key file perms

* add feature flag check

* add tests

* add license and comments

* test all ssl modes

* add test cases for dsn (key/value) connection strings

* add fallback test cases

* fix error formatting

* add test for multi-host when using pgx native conn url parsing

---------

Co-authored-by: Branden Horiuchi <Branden.Horiuchi@blackline.com>
2024-08-01 11:43:54 -05:00
Chelsea Shaw
10068ffb0a
UI: Use Client Count export API (#27455) 2024-08-01 11:03:31 -05:00
John-Michael Faircloth
c23ebb173f
docs: add note on microsoft's saml auth bound attributes syntax (#27938) 2024-08-01 11:16:00 -04:00
Peter Wilson
c555503f39
Audit: Test fixes and improvements (#27934)
* update tests/fix tests
2024-08-01 13:57:04 +00:00
Ellie
e938ff350f
[docs] Document known issue with duplicate identity groups (#27904)
* init

* fix versions

* remove whitespace

* update version

* fix file name

* fix link

* fix links (included one from other known issue too

* Fix spacing
2024-08-01 08:09:19 -05:00
aphorise
79c559cc65
README.md - build instructions refined (#27540)
Added notes for fix when encountering the error below as part of either `make bootstrap` or `made dev`
2024-07-31 16:48:48 -06:00
Chelsea Shaw
266ea693cc
UI: remove initial date from client counts (#27816) 2024-07-31 17:35:11 +00:00
Ellie
4ccf568480
add namespace ID to loading groups debug message on unseal (#27922) 2024-07-31 12:29:44 -05:00
Peter Wilson
aeae52fc4f
Audit: Use existing cloned object for hashing (don't re-clone) (#27913)
* unexport hashstructure funcs

* don't re-copy/clone LogInput fields when this object belongs to the pipeline
2024-07-31 10:47:10 +01:00
Chelsea Shaw
111647f851
UI: Remove deprecated Client Count keys (#27916)
* remove destructureClientCounts

* Update type and mirage generator

* remove deprecated keys from hardcoded response samples

* Add back destructureClientCounts with updated description
2024-07-30 13:04:20 -05:00
Ryan Cragun
174da88b9d
VAULT-28146: Add IPV6 support to enos scenarios (#27884)
* VAULT-28146: Add IPV6 support to enos scenarios

Add support for testing all raft storage scenarios and variants when
running Vault with IPV6 networking. We retain our previous support for
IPV4 and create a new variant `ip_version` which can be used to
configure the IP version that we wish to test with.

It's important to note that the VPC in IPV6 mode is technically mixed
and that target machines still associate public IPV6 addresses. That
allows us to execute our resources against them from IPV4 networks like
developer machines and CI runners. Despite that, we've taken care to
ensure that only IPV6 addresses are used in IPV6 mode.

Because we previously had assumed the IP Version, Vault address, and
listener ports in so many places, this PR is essentially a rewrite and
removal of those assumptions. There are also a few places where
improvements to scenarios have been included as I encountered them while
working on the IPV6 changes.

Signed-off-by: Ryan Cragun <me@ryan.ec>
2024-07-30 11:00:27 -06:00
Steven Clark
7049424c16
Allow SignCert callers to override CSR signature checks (#27914)
- We are leveraging this new feature flag to ignore the CSR's
   signature as we are constructing a CSR based on the information
   from a CMPv2 message.
2024-07-30 12:20:10 -04:00
Peter Wilson
4f6c215a65
unexport hashstructure funcs (#27911) 2024-07-30 15:31:59 +01:00
idnandre
e26c246cbb
chore: fix deprecated ioutil readall (#27823)
Signed-off-by: idnandre <andre@idntimes.com>
2024-07-30 09:18:24 -04:00
Angel Garbarino
1f982bf13a
Restructure SSH and AWS configuration screens (#27831)
* setup the toggle to display mount configuration options

* whew.. getting there. aws only, borked for ssh

* another round, better than before

* masked things

* changelog

* fix broken oss test

* move to component

* handle ssh things and cleanup

* wip test coverage

* test coverage for the component

* copywrite header miss

* update no model error

* setup configuration aws acceptance tests

* update CONFIURABLE_SECRET_ENGINES

* acceptance tests for aws

* ssh configuration

* clean up

* remove comment

* move to confirm model before destructuring

* pr comments

* fix check for ssh config error

* add message check in api error test

* pr comments
2024-07-29 19:52:42 -06:00
Scott Miller
d75aee21b8
Improve trusted cert loading in Certificate Auth (#27902)
* Improve trusted cert loading in Certificate Auth

Currently, cert auth has a cache of certName->trusted certificate data.  This cache is updated lazily on login.  In highly concurrent situations, several logins
of the same cert or more likely, logins not specifying role name may happen simulataneously.  In the status quo, each results in going to storage, fetching the role data
(or all roles!), unmarshalling, and certificate parsing.

This change puts a lock matrix in front of the cache miss scenario, so only one of the logins will load and process the role data.  In addition, we treat
the absent role name specially, caching it separately so that it cannot be flushed by eviction on the role cache.

* changelog

* cleanup
2024-07-29 21:16:08 +00:00
claire bontempo
fe18e6ca87
UI: add subkey request to kv v2 adapter (#27804)
* add subkey request to ui

* WIP kv subkey display

* revert subkey changes to see view in ui

* finish subkey component

* remove reamining user facing changes

* update jsdoc

* add subtext depending on toggle

* finish tests

* organize adapter tests into modules

* add adapter tests

* woops, make beforeEach

* encode paths and add wrap secret test

* reword subkey component

* extract subkey path logic into util

* extract subkey path logic into util

* rename yielded subtext block
2024-07-29 13:12:40 -07:00
Will-Low
7d093f4e11
Add expected and default values for the vault.hashicorp.com/agent-pre-populate annotation (#27895)
Co-authored-by: Theron Voran <tvoran@users.noreply.github.com>
2024-07-29 11:51:14 -07:00
Ben Ash
f5963cfe00
Update VSO docs for v0.8.1 (#27898)
* Including missing Helm documentation.
* Add version tip for instant updates
2024-07-29 14:45:32 -04:00
Thy Ton
a2b4bb1b15
Fix mounts of external plugins that were registered before Vault v1.0.0 could not be tuned to use versioned plugins (#27881) 2024-07-29 10:01:26 -07:00
Violet Hynes
b689fc62f1
VAULT-29198 CE side changes for Proxy update forwarding (#27891)
* VAULT-29198 CE side changes for Proxy update forwarding

* VAULT-29198 changelog
2024-07-29 12:58:55 -04:00
VAL
ff46d3abc9
Add note requiring GOBIN to readme (#27886)
* Add note requiring GOBIN to readme

* simplify
2024-07-29 09:37:13 -07:00
Steven Clark
297a9831f1
Pin protoc-gen-go-grpc to 1.4.0 (#27892)
* Pin protoc-gen-go-grpc to 1.4.0

They introduced a replace statement within the go.mod file which
causes failures running go install protoc-gen-go-grpc@latest

Workaround for now is to pin to the previous version

See https://github.com/grpc/grpc-go/issues/7448

* Add missing v to version v1.4.0 instead of 1.4.0 within tools/tools.sh
2024-07-29 14:36:43 +00:00
kevin-loehfelm
7c13168d7d
added delete role to website documentation (#27883)
* added delete role to website documentation

* added changlog
2024-07-26 15:18:45 -07:00
kpcraig
32fdae08d6
pass nil function for auth/aws when no externalID supplied (#27858) 2024-07-26 14:55:04 -04:00
Angel Garbarino
5787fa20f6
Prep for SSH and AWS configuration changes (#27869)
* move non user facing changes to another pr

* remove non-relevant test coverage

* address pr fixes

* Update mountable-secret-engines.js

* Update secrets-engine-mount-config.ts

* clean up

* put back console because of tests and use debug instead

* missed one

* blah fix
2024-07-26 10:47:33 -06:00