21667 Commits

Author SHA1 Message Date
Vault Automation
6f96abf80f
VAULT-40398: remove 1.18.x for the active versions config (#10550) (#10558) (#10564)
Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-11-04 13:47:22 -07:00
Vault Automation
3f4238906a
Backport Updating go version from 1.24.8 to 1.24.9 into ce/release/1.20.x (#10298)
* Updating go version from 1.24.8 to 1.24.9 (#10291)

* update changelog

Signed-off-by: Ryan Cragun <me@ryan.ec>

---------

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: ericjones <eric.jones@hashicorp.com>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-11-03 14:08:25 -07:00
Vault Automation
630222b71d
fix csp header for posthog on hvd (#10519) (#10525) (#10530)
Co-authored-by: Dan Rivera <dan.rivera@hashicorp.com>
2025-11-03 19:43:25 +00:00
Vault Automation
ba00e00170
Update perf replication checking script (#10134) (#10504) (#10528)
* change what performance replication checker script is checking

* fix lint errors

* enable consul backends for ent build samples

* fix up samples

* fix linting

* update release samples

* fix linting again

* output to stderr

Co-authored-by: Josh Black <raskchanky@gmail.com>
2025-11-03 19:11:31 +00:00
Vault Automation
de0f5f0a30
Backport Upgrade jsondiffpatch dependency version into release/1.20.x+ent (#10286) (#10437)
* Upgrade jsondiffpatch dependency version (#9651)

* update jsondiffpatch dep + use webpack to convert into UMD format

* do not lint vendor files

* update test

* lint fix

* fix merge conflict error

* revert extra changes

* update header

---------

Co-authored-by: lane-wetmore <lane.wetmore@hashicorp.com>
2025-11-03 11:14:18 -06:00
Vault Automation
f9ba2af4b1
actions(slack): quote yaml strings that start with ':' (#10477) (#10489) (#10498)
Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-10-30 10:13:45 -06:00
Vault Automation
fa9713fcd3
UI: fix PKI certificate key_usage parsing and add extended key flags to role form (#10416) (#10481) (#10506)
* fix parsing of key_usage VAULT-40303

* VAULT-40220 add extended key usage flags and test coverage

* add test coverage

* add changelog

* fix mislabeled role parameter

* update tests

* VAULT-40219 link jira

* update changelog text

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>
2025-10-30 09:10:38 -07:00
Vault Automation
7e488e79b8
enos: remove us-east-1 from config due to instance stuck in pending issues (#10448) (#10453) (#10462)
Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-10-28 22:39:17 +00:00
Vault Automation
0bd069eed5
actions: pin to latest actions (#10407) (#10421) (#10425)
Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-10-28 13:47:50 -06:00
Vault Automation
26e1ee2e13
[VAULT-40166] go: check go.mod drift on changes to ce/branches
When a pull request is created against a CE branch and it has changed any files in the `gotoolchain` group we'll automatically trigger the diff for every Go module file in the repo against the equivalent in the corresponding enterprise branch. If there's a delta in like configuration it will automatically fail the `build/ce-checks` job. It will also write a complete explanation of the diff to the step output and also to the `build/ce-checks` job step summary.

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-10-28 13:26:41 -06:00
Vault Automation
131516d120
update help text url to avoid appearance of real secret usage (#10398) (#10405) (#10429)
Co-authored-by: lane-wetmore <lane.wetmore@hashicorp.com>
2025-10-28 09:47:31 -05:00
Vault Automation
5e17cf7f9d
Backport UI: update aws generate credential form inputs to rely on credentialType into release/1.20.x+ent (#10355) (#10375)
* UI: update aws generate credential form inputs to rely on credentialType (#10045)

* update aws generate credential form inputs to rely on credentialType

* update tests

* show credential type + style updates

* Update ui/app/components/generate-credentials.ts



* update test, naming and help text

* add changelog

* rename changelog

---------



* removed duplicated selector

---------

Co-authored-by: lane-wetmore <lane.wetmore@hashicorp.com>
Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>
2025-10-28 09:46:14 -05:00
Vault Automation
2a06f7934b
[VAULT-40165] pipeline(github): add check go-mod-diff command (#10369) (#10381) (#10391)
* [VAULT-40165] pipeline(github): add `check go-mod-diff` command

Add `pipeline github check go-mod-diff` command that is capable of
creating a Go module diff between one-or-more go.mod files in two
different Github branches. There are flags for the owner, repo, and
branch for both the A and B sides of the diff, as well as the `--path`
or `-p` flag that can be specified any number of times with relative
paths in the repository of go.mod files to compare. We assume that the
path is the same in both repositories.

This work will be followed up with another PR that removes the
enterprise only go.mod file and enables Go module diff checking on pull
requests to CE branches that change the go toolchain.

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-10-27 13:27:42 -06:00
Vault Automation
24d1c59e1d
license: update headers to IBM Corp. on release/1.20.x+ent (#10335) (#10343)
* headers: update headers to IBM Corp. on release/1.20.x
* fix MPL-2.0 header in golangci-lint config
* remove ignore directive since 1.20 is still on Go 1.24

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-10-23 09:36:43 -06:00
Vault Automation
0d8dd0cd1b
[VAULT-40043]: pipeline: add go diff mod command (#10188) (#10296) (#10305)
* [VAULT-40043]: pipeline: add `go diff mod` command

Add a `pipeline go diff mod` command that is capable of comparing two
go.mod files at a directive level. We also support strict or lax
comparisons of several directives to flexible diff comparisons. This is
especially useful when you want to compare two go.mod files that have
some different dependencies (CE vs. Ent) but still want to compare
versions of like dependencies.

This command is not currently used in the pipeline but was useful in
developing the diff library that is used. Subsequent work will use the
library and be integrated into CI.

---------

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-10-22 15:19:31 -06:00
Vault Automation
01c88db77d
Backport license: update headers to IBM Corp. into release/1.20.x+ent (#10238) (#10251)
* license: update headers to IBM Corp.
* `make proto`
* update offset because source file changed
* update licenses in files that were not included in backport

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-10-21 15:20:27 -06:00
Vault Automation
9b17503da6
pipeline(changed-files): one more small false positive fix (#10247) (#10262) (#10270)
Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-10-21 14:16:38 -06:00
Vault Automation
b60e71fb6d
Backport Backport pipeline(changed-files): fix false positives for some files into release/1.20.x+ent into ce/release/1.20.x (#10255)
* Backport pipeline(changed-files): fix false positives for some files into release/1.20.x+ent (#10244)
* pipeline(changed-files): fix false positives for some files (#10239)
* make fmt


Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-10-21 13:03:09 -06:00
Vault Automation
d516601581
[VAULT-40033] Migrate Slack notifications to ibm-hashicorp workspace (#10205) (#10211) (#10226)
Migrate all slack notifications to the `ibm-hashicorp` workspace. This
required creating three new `incoming-webhook` configurations which are
capable of posting into three different Slack channels, depending on the
workflow.

As they all use the `incoming-webhook` event, many of our integrations
had to be migrated from `chat.postMessage` and those changes are
reflected here.

Of note, there are lots of changes to the `release-procedure-ent`
workflow as it has by far the most uses of the Slack integrations. In
some cases it was to appease `actionlint` issues, in others I made small
idiomatic tweaks. I translated all of the payload messages to YAML
instead of JSON, which fits better into our existing workflows and also
because most of the payload messages were invalid JSON all together.

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-10-20 20:43:41 +00:00
Vault Automation
2a1f757745
release: update notification slack channel (#10213) (#10218) (#10220)
Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-10-20 09:43:23 -06:00
Ryan Cragun
f210fe1cc1
go: synchronize module deps with enterprise (#10190)
Synchronize all common Go module versions with enterprise.

Signed-off-by: Ryan Cragun <me@ryan.ec>
2025-10-17 11:09:17 -06:00
Vault Automation
4302ea4f8a
VAULT-39444 Fix locking in rotation queue (#9336) (#9469) (#9479)
* adding new locks

* adding initial testing

* changelog

* Update changelog/_9336.txt

* fixing test to use proper error output

* added additional locks on pops and last push.

* fixing tests since I cant use t.Fatalf in a go func

* adding rotation window, removing lock as reached a deadlock in test

* removing locking from the OnFailure

* removing unused locks.

---------

Co-authored-by: JMGoldsmith <spartanaudio@gmail.com>
Co-authored-by: John-Michael Faircloth <fairclothjm@users.noreply.github.com>
2025-10-17 10:06:16 +02:00
Vault Automation
5a54319cb0
1.20: Update slack channel IDs (#10158) (#10171)
Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
2025-10-16 15:54:10 +00:00
Vault Automation
7e4f621204
Coerce unspecified timezone schedules to UTC (#9942) (#10027) (#10087)
Co-authored-by: kpcraig <3031348+kpcraig@users.noreply.github.com>
2025-10-15 10:37:28 -04:00
Vault Automation
57429e945f
VAULT-39752 adding int check (#9870) (#10117) (#10138)
* adding int check

* change to assertion rather than reflect.

* adding changelog

* grammar

* adding tests as an example

* removing excessive testing

* fixing test for leases and expected values

* adding godoc

Co-authored-by: JMGoldsmith <spartanaudio@gmail.com>
2025-10-15 09:58:39 +02:00
Vault Automation
6590e9442c
VAULT-39598: Fixing Enos Dev Scenario KMIP Error (#9375) (#9400) (#9410)
* testing kmip enos dev fix

* updating kmip

* updating kmip

* updating kmip

* updating kmip

* updating description

Co-authored-by: Tin Vo <tintvo08@gmail.com>
2025-10-14 08:10:41 -07:00
Vault Automation
3d0649e0dd
Backport VAULT-35084, VAULT-36948, VAULT-36952: Small tasks left over from the recovery work into release/1.20.x+ent (#10102) (#10104)
* VAULT-35084, VAULT-36948, VAULT-36952: Small tasks left over from the recovery work (#10083)

* small tasks left over from the recovery work

* changelog

* fix test

* fix error

---------

Co-authored-by: miagilepner <mia.epner@hashicorp.com>
2025-10-14 12:42:17 +02:00
Vault Automation
d379e64f0c
Backport 1.20.x+ent UI: Fix auth form when token is the preferred type for a namespace (#10081) (#10095)
* normalize type for ns_ prefixed methods

* add changelog.

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>
2025-10-13 23:49:48 +00:00
Vault Automation
d4dbf69058
pin actions workflows to latest versions (#10035) (#10057) (#10066)
Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-10-10 18:38:21 +00:00
Vault Automation
afc1d48503
[VAULT-39424] pipeline(close-origin-pr): add support for closing the origin of copied PRs (#9907) (#10033) (#10037)
* [VAULT-39424] pipeline(close-origin-pr): add support for closing the origin of copied PRs

When we copy a community contributed Pull Request to Enterprise the
source PR is effectively orphaned, leaving the original PR still
opened, the author unsure of what state the copied PR is in, and any
issues associated with it open.

When the copied PR is closed we ought to close the origin PR if it's
still open, and any other issues that might be associated with either
the origin PR or the copied PR.

We can also add comments to both PRs that include links to each other
and the squash commit to make discovery of the work visible to those
with access to both repos. Unfortunately there is no way to know what
the SHA will be when it's synced so we have to rely on the
'Co-Authored-By:' trailers in commit message.

There are some challenges to this:
  - The automation should only execute when copied PRs are closed
  - How to determine the origin PR from only the copied PR
  - How to determine the PR's linked issues (which the v3 REST API does not expose)

We solved them by:
  - Requiring the PR HEAD ref to start with `copy/`
  - Encoding the origin PR information in the PR HEAD ref.
    e.g. `copy/hashicorp/vault/31580/ryan/VAULT-39424-test-ce`
  - Using the V4 GraphQL API to determine "closed issue references"

The result is a new `pipeline` CLI command that can close the origin PR,
all of the issues, and write status comments on each PR with links to
everything to establish omnidirectional linking in the Github UI.

```bash
pipeline github close origin-pull-request 9903
```

* fix feedback

---------

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-10-09 22:51:20 +00:00
Vault Automation
61840dec39
actions(doormat): yank doormat action and use configure-aws everywhere (#9999) (#10004) (#10010)
Our service users now have compatible use-case's that allow us to use
the service user credentials everywhere. Drop `action-doormat` so that
our workflows execute correctly in the `hashicorp/vault` context.

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-10-08 22:40:38 +00:00
Vault Automation
cc6e1c7493
Backport go: bump .go-version to 1.24.8 on release/1.20.x+ent into ce/release/1.20.x (#9994)
* go: bump .go-version to 1.24.8 on release/1.20.x+ent (#9989)

* go: bump .go-version to 1.24.8
* go: handle changes to net/url parsing enforcement in Go 1.24.8

    The fixes for CVE-2025-47912 (https://go.dev/issue/75678) change
    behavior when parsing invalid IPv4 addresses. Update the test to
    for these changes.

Signed-off-by: Ryan Cragun <me@ryan.ec>

* go mod tidy

Signed-off-by: Ryan Cragun <me@ryan.ec>

---------

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-10-08 15:35:37 -06:00
Vault Automation
1ff203d673
[VAULT-39890] actions(copy-pr): enforce license/cla before triggering copy workflow (#9795) (#9927) (#9965)
* [VAULT-39890] pipeline(github): add list commit-statuses command
* [VAULT-39890] pipeline(github): add check commit-status command
* [VAULT-39890] actions(copy-pr): enforce license/cla before triggering copy workflow

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-10-08 18:48:29 +00:00
Vault Automation
a221041a72
Backport [VAULT-39150]: actions(copy-pr): add step summary to copy PR workflow into release/1.20.x+ent (#9934) (#9972)
* [VAULT-39150]: actions(copy-pr): add step summary to copy PR workflow (#9828)

When we copy a Pull Request from CE to Ent we already add a status
comment to the origin PR but we don't actually bubble up the information
to the workflow summary. Instead, render the copy PR output as a
markdown table and write it to the step summary.



 Conflicts:
	.github/workflows/copy-external-contributor-pull-request-ent.yml

---------

Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-10-08 11:45:13 -06:00
Vault Automation
cb2f69ee02
Backport Fix seal rewrap running unnecessarily into release/1.20.x+ent (#9899) (#9956) 2025-10-07 21:49:41 +00:00
Vault Automation
68dde4028d
[VAULT-39942] tools: always statically link and strip binaries (#9909) (#9926) (#9953)
Occasionally it seems that the tools will get built and linked against
the platform glibc. We definitely do not want that.

Now we always disable CGO when building tools. While doing this I
realized that we could also strip debug symbols and reduce the size of
the tools significantly, so that is included as well.

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-10-07 14:25:55 -06:00
hc-github-team-secure-vault-core
046cba3756 Merge remote-tracking branch 'remotes/from/ce/release/1.20.x' into release/1.20.x 2025-10-03 23:02:27 +00:00
Vault Automation
243cb9a786
Add root rotation for snowflake database secrets keypair configurations (#9432) (#9854) (#9861)
* Initial implementation

* Use rotation_statements, handle both password and private_key

* Remove debug prints

* Merge in main

* Remove duplicated error text

* Rename keypair root rotation function

* Use NewRotateRootCredentialsWALPasswordEntry

* Add changelog file

* Move back to original file for now, for review

* put generatePassword into function

* Fix names, call helper for generatePassword

* Generalize the rotation flow and keypair path

* Fix conditional check, remove new file

* Fix changelog

* Add test file

* Fix username check var name

* Fix name variable

* Return an error when both fields are set during rotation, and return an error if somehow walEntry is nil

* Fix test godoc

* Remove print

* change rotated key bits to 4096

Co-authored-by: Robert <17119716+robmonte@users.noreply.github.com>
2025-10-03 22:41:08 +00:00
hc-github-team-secure-vault-core
ffe8299bd0 Merge remote-tracking branch 'remotes/from/ce/release/1.20.x' into release/1.20.x 2025-10-02 18:02:17 +00:00
Vault Automation
3cc0adcfa1
bump cap/ldap dependency to fix data race (#9760) (#9787) (#9792)
Co-authored-by: John-Michael Faircloth <fairclothjm@users.noreply.github.com>
2025-10-02 13:00:51 -05:00
hc-github-team-secure-vault-core
790498dcb8 Merge remote-tracking branch 'remotes/from/ce/release/1.20.x' into release/1.20.x 2025-10-02 11:01:59 +00:00
Vault Automation
2bc84138f7
Check rate limits before doing json limits checking (#9688) (#9779) (#9780)
* update the order of the requests handlers

* switch back to maxrequestsize, prevent the error by restricting the buffer size

* add test

Co-authored-by: miagilepner <mia.epner@hashicorp.com>
2025-10-02 10:16:30 +00:00
hc-github-team-secure-vault-core
5dc66cda77 Merge remote-tracking branch 'remotes/from/ce/release/1.20.x' into release/1.20.x 2025-10-01 15:02:50 +00:00
Vault Automation
b63af19e54
JSON limits covering new use cases and MaxTokens (#9406) (#9600) (#9758)
Co-authored-by: Bianca <48203644+biazmoreira@users.noreply.github.com>
2025-10-01 14:12:42 +00:00
hc-github-team-secure-vault-core
5c966d9d64 Merge remote-tracking branch 'remotes/from/ce/release/1.20.x' into release/1.20.x 2025-10-01 13:10:29 +00:00
Vault Automation
37359961f6
Use bitnamilegacy cassandra image for tests (#8984) (#8989) (#9759)
* use default cassandra image for tests

* switch to bitnamilegacy

Co-authored-by: miagilepner <mia.epner@hashicorp.com>
2025-10-01 07:51:49 -05:00
hc-github-team-secure-vault-core
6f80323917 Merge remote-tracking branch 'remotes/from/ce/release/1.20.x' into release/1.20.x 2025-09-30 18:02:38 +00:00
Vault Automation
297c4b40b0
Copy Backport of Add a note on newlines in indirect reference values in seal configs into release/1.20.x into release/1.20.x+ent (#9728) (#9730)
* Copy https://github.com/hashicorp/vault/pull/31354 into release/1.20.x+ent




* backport of commit 8309387230524d320dcda3cb923f877b6c675e6a

---------

Co-authored-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Scott Miller <smiller@hashicorp.com>
Co-authored-by: Tony Wittinger <anwittin@users.noreply.github.com>
2025-09-30 17:23:44 +00:00
hc-github-team-secure-vault-core
0bd1a749a9 Merge remote-tracking branch 'remotes/from/ce/release/1.20.x' into release/1.20.x 2025-09-30 17:02:33 +00:00
Vault Automation
6753cb7258
secrets/database: escape usernames/passwords in self-managed static roles, unless disable_escaping is set (#9660) (#9734) (#9740)
Co-authored-by: kpcraig <3031348+kpcraig@users.noreply.github.com>
2025-09-30 12:43:24 -04:00