24 Commits

Author SHA1 Message Date
Vault Automation
8cce47281e
[VAULT-41179] go: bump golang.org/x/crypto to v0.45.0 (#11056) (#11065)
* [VAULT-41179] go: bump golang.org/x/crypto to v0.45.0

Bump the golang.org/x/crypto module to v0.45.0 to resolve several CVE's
with the prior version:
  - https://github.com/advisories/GHSA-f6x5-jh6r-wrfv
  - https://github.com/advisories/GHSA-j5w8-q4qc-rx2x
  - https://pkg.go.dev/vuln/GO-2025-4134
  - https://pkg.go.dev/vuln/GO-2025-4135

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-12-02 21:00:06 +00:00
Vault Automation
77f1980d29
go: bump golang.org/x/crypto => v0.44.0 to resolve GO-2025-4116 (#10871) (#10891)
* go: bump golang.org/x/crypto => v0.44.0 to resolve GO-2025-4116

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-11-18 17:57:11 +00:00
Ryan Cragun
93e1879749
go: synchronize module deps with enterprise (#10192)
Synchronize all common Go module versions with enterprise.

Signed-off-by: Ryan Cragun <me@ryan.ec>
2025-10-17 11:13:53 -06:00
Violet Hynes
584a3daf21
Dependency updates for main (#31299)
* Dependency updates for main

* go mod tidy
2025-07-17 11:30:11 -04:00
ej-hashi
6bcb72af7e
update vault auth submodules to api/v1.20.0 (#30851)
* update vault auth submodules to api/v1.20.0

* updates to go mods

---------

Co-authored-by: Eric Jones <cirej2013@gmail.com>
2025-06-05 11:04:45 -07:00
Steven Clark
1802204dec
Update golang.org/x/net to v0.37.0 for GO-2025-3503 (#29925) 2025-03-14 11:53:38 -04:00
Steven Clark
152e5b53e1
Update go-jose to v3.0.4/v4.0.5 (#29771)
* Update go-jose to v3.0.4

 - Updating to address CVE-2025-27144

* Update v4 references in sdk and api

* Update go-jose across all api auth projects to v4.0.5
2025-02-28 11:15:59 -05:00
davidadeleon
6741773b0f
update vault auth submodules to api/v1.16.0 (#29548)
* update vault auth submodules to api/v1.16.0

* update go.mod

* make proto

---------

Co-authored-by: davidadeleon <ddeleon@hashicorp.com>
2025-02-11 07:28:45 -08:00
Violet Hynes
32d61c3893
Update go/x/net and go/x/crypto to latest versions throughout (#29422) 2025-01-27 10:47:40 -05:00
Victor Rodriguez
ab8bc34c53
update vault auth submodules to api/v1.15.0 (#28338) 2024-09-10 18:03:47 +00:00
Violet Hynes
037d82130c
VAULT-28422 Upgrade go-retryablehttp for CE (#27602) 2024-06-26 09:05:02 -04:00
Peter Wilson
545064cb6d
update vault auth submodules to api/v1.14.0 (#27190)
* update vault auth submodules to api/v1.14.0

* go mod tidy in repo root
2024-05-23 11:00:55 -04:00
Violet Hynes
1529422559
Update Vault auth submodule API versions for 1.16 (#25290) 2024-02-08 10:46:33 -05:00
Josh Black
1e34eb5ef8
update vault auth submodules to api/v1.10.0 (#22772) 2023-09-05 18:57:10 +00:00
Violet Hynes
cb7531d3e1
Update auth/api submodules to new API version (#20809)
* Update auth/api submodules to new API version

* Update auth/api submodules to new API version
2023-05-26 14:06:31 +00:00
Kuba Wieczorek
fffc3daa8d
update vault auth submodules to new version of API (#19127) 2023-02-10 08:12:10 -08:00
Anton Averchenkov
39335cc8cd
Update vault and api/auth submodules to use api/v1.8.3 (#18773) 2023-01-20 11:44:03 -05:00
AnPucel
b0adb620c4
Update vault to v1.8.1 (#17516)
* Update vault to v1.8.1

* Updating api/auth to use new version of api
2022-10-20 11:56:55 -07:00
Steven Clark
a156f4e4a6
update vault auth submodules to api/v1.8.0 (#17228) 2022-09-20 10:51:51 -04:00
VAL
8aac5c2057
Update to use latest api version (#16329) 2022-07-18 10:36:50 -07:00
Anton Averchenkov
8e0f267545
Update Vault to use api/v1.5.0 (#14718) 2022-03-28 12:11:03 -04:00
VAL
3688d63348
update vault and auth submodules to api v1.3.1 (#13509) 2021-12-23 09:45:30 -08:00
VAL
cd1f974f36
Remove reference to local api module, use v1.3.0 (#13105) 2021-11-09 14:49:46 -08:00
VAL
3ed7bca8e4
Native Login method for Go client (#12796)
* Native Login method, userpass and approle interfaces to implement it

* Add AWS auth interface for Login, unexported struct fields for now

* Add Kubernetes client login

* Add changelog

* Add a test for approle client login

* Return errors from LoginOptions, use limited reader for secret ID

* Fix auth comment length

* Return actual type not interface, check for client token in tests

* Require specification of secret ID location using SecretID struct as AppRole arg

* Allow password from env, file, or plaintext

* Add flexibility in how to fetch k8s service token, but still with default

* Avoid passing strings that need to be validated by just having different login options

* Try a couple real tests with approle and userpass login

* Fix method name in comment

* Add context to Login methods, remove comments about certain sources being inherently insecure

* Perform read of secret ID at login time

* Read password from file at login time

* Pass context in integ tests

* Read env var values in at login time, add extra tests

* Update api version

* Revert "Update api version"

This reverts commit 1ef3949497dcf878c47e0e5ffcbc8cac1c3c1679.

* Update api version in all go.mod files
2021-10-26 16:48:48 -07:00