Commit Graph

18193 Commits

Author SHA1 Message Date
Pavlos Karakalidis
bc69ef899a
docs(agent): clarify usage of exit_after_auth flag (#22954)
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2023-09-15 10:02:18 -07:00
soly-hashicorp
4b9b5d60e6
Update raft.mdx (#23001)
* Update raft.mdx
---------

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2023-09-15 09:55:35 -07:00
Jordan Reimer
111d472839
updates ember template lint config to override prettier in tests and removes ignore (#23108) 2023-09-15 10:41:05 -06:00
Marc Boudreau
e30c50321c
enable all audit devices in Enos's vault_cluster module (#22408) 2023-09-15 10:44:23 -04:00
Raymond Ho
25221fe012
downgrade go-ldap client to v3.4.4 due to race conditions in tests (#23103) 2023-09-14 23:18:20 +00:00
Kianna
71808c00ec
UI: [VAULT-19982] confirm delete modal for namespaces (#23066) 2023-09-14 12:19:35 -07:00
Jordan Reimer
b03300689a
updates file-to-array-buffer component to glimmer and fixes flaky issue in test runs (#23081) 2023-09-14 12:41:09 -06:00
Tony Wittinger
51b38cecf4
Update CHANGELOG.md (#23069)
* Update CHANGELOG.md

* Update CHANGELOG.md

* Update CHANGELOG.md

Co-authored-by: Calvin Leung Huang <1883212+calvn@users.noreply.github.com>

* Update CHANGELOG.md

Co-authored-by: Calvin Leung Huang <1883212+calvn@users.noreply.github.com>

* Update CHANGELOG.md

Co-authored-by: Calvin Leung Huang <1883212+calvn@users.noreply.github.com>

* Update CHANGELOG.md

Co-authored-by: Calvin Leung Huang <1883212+calvn@users.noreply.github.com>

* Update CHANGELOG.md

Co-authored-by: Calvin Leung Huang <1883212+calvn@users.noreply.github.com>

* Update CHANGELOG.md

Co-authored-by: Calvin Leung Huang <1883212+calvn@users.noreply.github.com>

* Update CHANGELOG.md

Removed docs changes that shouldn't be included

* Update CHANGELOG.md

updated with suggestions

* Update CHANGELOG.md

Co-authored-by: Calvin Leung Huang <1883212+calvn@users.noreply.github.com>

---------

Co-authored-by: Calvin Leung Huang <1883212+calvn@users.noreply.github.com>
2023-09-14 11:30:53 -07:00
Kianna
e5d2b2b842
UI: [VAULT-19340] update test selectors for dashboard (#23053) 2023-09-14 11:29:25 -07:00
Steven Clark
92afdb58e0
Add known issues around transit managed keys (#23080)
* Add known issues around transit managed keys

 - Document known issue around managed key encryption failure with Cloud KMS backed keys and the failure to sign with managed keys

* Fix filename typos

* Update website/content/partials/known-issues/transit-managed-keys-sign-fails.mdx

Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Update website/content/partials/known-issues/transit-managed-keys-panics.mdx

Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Apply PR feedback

* Missed new line to force error on new-line.

---------

Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-09-14 14:27:02 -04:00
Kuba Wieczorek
37215ae311
[VAULT-14497] Ensure Role Governing Policies are only applied down the namespace hierarchy (#23090) 2023-09-14 19:24:45 +01:00
Tom Proctor
e29c6c129d
Bump plugincontainer dep v0.2.0 -> v0.2.1 (#23075)
Fixes a bug that prevented Vault from streaming plugin containers' logs
2023-09-14 18:33:14 +01:00
Raymond Ho
018e5675fe
VAULT 18227/introduce cap ldap library (#22185) 2023-09-14 10:26:29 -07:00
Meggie
854ea77f9e
Added "enabled by default" language to 1.13 release notes. (#23076) 2023-09-14 13:01:29 -04:00
Jonathan Frappier
f0fb07b0b2
Add section about user lockout (#23068) 2023-09-13 18:37:38 -04:00
Christopher Swenson
b9099ee0ea
auth/centrify: Centrify auth method is now deprecated (#23050)
Slated for removal in 1.17
2023-09-13 21:45:06 +00:00
hc-github-team-secure-vault-core
3116e2ecab
Update hashicorp/vault-plugin-auth-azure to v0.16.2 (#23060)
* Automated dependency upgrades

* Add changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
2023-09-13 21:30:00 +00:00
Christopher Swenson
82e9b610df
events: Don't accept websocket connection until subscription is active (#23024)
The WebSocket tests have been very flaky because we weren't able to tell when a WebSocket was fully connected and subscribed to events.

We reworked the websocket subscription code to accept the websocket only after subscribing.

This should eliminate all flakiness in these tests. 🤞 (We can follow-up in an enterprise PR to simplify some of the tests after this fix is merged.)

I ran this locally a bunch of times and with data race detection enabled, and did not see any failures.

Co-authored-by: Tom Proctor <tomhjp@users.noreply.github.com>
2023-09-13 14:28:17 -07:00
Tom Proctor
8e7c6e80d5
events: Ensure pipelines are cleaned up on closing subscription (#23042)
* events: Ensure pipelines are cleaned up on closing subscription
* Re-register formatter node on each subscribe
2023-09-13 22:23:24 +01:00
Jason O'Donnell
27d647f97a
Update changelog for auth/azure v0.16.2 (#23059)
* update changelog for azure v0.16.2

* Add retry docs
2023-09-13 21:23:01 +00:00
Christopher Swenson
500cf21d0d
events: Update docs for beta release (#23036)
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2023-09-13 14:18:18 -07:00
Jonathan Frappier
15a50b8959
Add MSSQL version to EKM install doc (#23055) 2023-09-13 15:45:21 -04:00
Sarah Chavis
930b48882a
Fix broken markdown link (#23049) 2023-09-13 12:34:59 -05:00
Violet Hynes
a166cf6786
fix LDAP auto auth changelog (#23027) 2023-09-13 08:48:46 -04:00
Steven Clark
293e8b8ac5
Fix enterprise failure of TestCRLIssuerRemoval (#23038)
This fixes the enterprise failure of the test
 ```
  === FAIL: builtin/logical/pki TestCRLIssuerRemoval (0.00s)
     crl_test.go:1456:
         	Error Trace:	/home/runner/actions-runner/_work/vault-enterprise/vault-enterprise/builtin/logical/pki/crl_test.go:1456
         	Error:      	Received unexpected error:
         	            	Global, cross-cluster revocation queue cannot be enabled when auto rebuilding is disabled as the local cluster may not have the certificate entry!
         	Test:       	TestCRLIssuerRemoval
         	Messages:   	failed enabling unified CRLs on enterprise

 ```
2023-09-13 08:11:52 -04:00
Chelsea Shaw
52f8f0ddba
UI: Handle control group error on SSH (#23025)
* Handle control group error on SSH

* Add changelog
2023-09-12 21:01:52 +00:00
Alexander Scheel
e2ff1f1c71
Clean up unused CRL entries when issuer is removed (#23007)
* Clean up unused CRL entries when issuer is removed

When a issuer is removed, the space utilized by its CRL was not freed,
both from the CRL config mapping issuer IDs to CRL IDs and from the
CRL storage entry. We thus implement a two step cleanup, wherein
orphaned CRL IDs are removed from the config and any remaining full
CRL entries are removed from disk.

This relates to a Consul<->Vault interop issue (#22980), wherein Consul
creates a new issuer on every leadership election, causing this config
to grow. Deleting issuers manually does not entirely solve this problem
as the config does not fully reclaim space used in this entry.

Notably, an observation that when deleting issuers, the CRL was rebuilt
on secondary clusters (due to the invalidation not caring about type of
the operation); for consistency and to clean up the unified CRLs, we
also need to run the rebuild on the active primary cluster that deleted
the issuer as well.

This approach does allow cleanup on existing impacted clusters by simply
rebuilding the CRL.

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add test case on CRL removal

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add changelog entry

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

---------

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2023-09-12 20:56:47 +00:00
Andreas Gruhler
c63a84dc9f
Feature/document tls servername (#22714)
* Add Raft TLS Helm examples

Co-authored-by: Pascal Reeb <pascal.reeb@adfinis.com>
---------
2023-09-12 13:09:01 -07:00
Chris Capurso
5a83838f1d
ensure -log-level is added to core config (#23017) 2023-09-12 16:01:21 -04:00
Daniel Huckins
d1e1abd2c7
VAULT-19681 allow users to specify files for agent child process stdout/stderr (#22812)
* allow users to specify files for child process stdout/stderr

* added changelog

* check if exec config is nil

* fix test

* first attempt at a test

* revise test

* passing test

* added failing test

* Apply suggestions from code review

Co-authored-by: Anton Averchenkov <84287187+averche@users.noreply.github.com>

* code review suggestions

* always close log files

* refactor to use real files

* hopefully fixed tests

* add back bool gates so we don't close global stdout/stderr

* compare to os.Stdout/os.Stderr

* remove unused

---------

Co-authored-by: Anton Averchenkov <84287187+averche@users.noreply.github.com>
2023-09-12 13:54:37 -04:00
Chelsea Shaw
de1382e99b
UI: Fix empty item on kv list (#22838) 2023-09-12 17:01:57 +00:00
Jim
771470c28f
chore: update azurevaultkey wrapper dependency (#22994)
* chore: update azurevaultkey wrapper dependency

This update brings in PR #155 from go-kms-wrapping which adds support for azure
workload identity authentication

* chore: add changelog entry

* fixup! chore: add changelog entry
2023-09-12 12:31:33 -04:00
Austin Gebauer
a28ac08b8f
ui: remove a changelog entry for 1.15 (#22989) 2023-09-12 09:29:51 -07:00
claire bontempo
ab68f42234
encode namespace for API paths (#22962) 2023-09-12 09:03:59 -07:00
claire bontempo
112501a3f6
ui: More transit flakiness (#22969)
* fix group name typos

* add flaky note and cleanup generate function

* rename variable

* remove other test for other key types

* move key types to relevant test
2023-09-12 09:03:31 -07:00
Kianna
249d8d7b52
UI: [VAULT-18040] List all features in license info (#22855) 2023-09-12 08:48:15 -07:00
Jordan Reimer
8f6535cfaf
LDAP Roles Pagination (#22985)
* adds pagination to ldap roles list view

* fixes issue with list not refreshing on ldap roles delete
2023-09-12 09:38:26 -06:00
Alexander Scheel
21742020f0
Add API docs on Transit X.509 certificates (#22998)
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-09-12 11:35:37 -04:00
dzm
b583ab9b7e
Fix typo in AESGCMBarrier.encrypt (#22991) 2023-09-12 15:10:28 +00:00
Tom Proctor
7d7564b829
Events: Drop log level for events to debug (#22997) 2023-09-12 15:21:41 +01:00
Austin Gebauer
6fa1953ea5
codeowners: adds identity oidc and jwt integrations to ecosystem (#22990) 2023-09-11 17:21:22 -07:00
Angel Garbarino
adaef9deb8
remove test failure which cannot be checked anymore consistently due to removal of logout login. (#22978) 2023-09-11 16:02:56 -06:00
Angel Garbarino
6a7345a100
small fix: (#22976) 2023-09-11 15:43:02 -06:00
Ryan Cragun
9a7de066a9
test: handle the edition in the release testing workflow (#22979)
This adds edition handling to the test-run-enos-scenario-matrix
workflow. Previously we'd pass the version and edition from the caller,
but that isn't an option in the release testing workflow, which only
passes the metadata version without the edition.

Signed-off-by: Ryan Cragun <me@ryan.ec>
2023-09-11 21:04:48 +00:00
xka5h
7fd6d7a081
removed HCP Plus cluster (#22977) 2023-09-11 14:00:22 -07:00
Ryan Cragun
8dd3fa74df
release: remove concurrency groups from release testing (#22970)
The CRT orchestrator triggers the release testing workflows for all
release versions using the same main ref. Therefore, if we have
concurrency controls in place we could cancel them if more than one
release branch is executing workflows.

Signed-off-by: Ryan Cragun <me@ryan.ec>
2023-09-11 19:33:49 +00:00
Ryan Cragun
d634700c9e
artifactory: handle all package lookups (#22963)
Signed-off-by: Ryan Cragun <me@ryan.ec>
2023-09-11 18:05:58 +00:00
Steven Clark
6fc9905937
Only initialize the KMS config map if env map contains values (#22959)
- This protects against a test in ENT and a use-case in which
   we would force a migration for stored configs that had been
   written with a nil configuration
2023-09-11 11:22:24 -04:00
Amund Tenstad
8b26ac03a5
fix: cli arg doc (#22847)
Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
2023-09-11 13:03:06 +00:00
Max Coulombe
e6ed4835d1
- removed secrets sync experimental flag to prepare the release on Vault ENT (#22816) 2023-09-11 07:40:50 -04:00