20459 Commits

Author SHA1 Message Date
Angel Garbarino
1229f5723a
Ember data remove deprecation Ember Promise Many Array behaviors (#28652)
* fix

* remove deprecation from config
2024-10-09 11:19:10 -07:00
Robert
60d7051700
Add docs and api-docs info for gcp replication locations sync, github environments, github organizations beta, and add sys/activation-flags page (#28463)
* Add field to API docs, add small section to overview

* Update examples, wording

* Update github API docs

* Apply suggestions from code review

Co-authored-by: John-Michael Faircloth <fairclothjm@users.noreply.github.com>

* Update wording

* Be a little more specific on repository owner

* Put BETA tag on each org field, put visibility explanation in paragraph

* Add org secrets limitation

* Add sys/activation-flags page

* Update Vercel granularity note

* Apply suggestions from code review

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/docs/sync/vercelproject.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Apply suggestions from code review

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Small rewording, remove optional tags with defaults

---------

Co-authored-by: John-Michael Faircloth <fairclothjm@users.noreply.github.com>
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2024-10-09 10:27:33 -05:00
Scott Miller
3c0656e4c4
Update marcellanz/transit_pkcs1v15 RSA encryption support (#25486)
* [transit-pkcs1v15] transit support for the pkcs1v15 padding scheme – without UI tests (yet).

* [transit-pkcs1v15] renamed padding_scheme parameter in transit documentation.

* [transit-pkcs1v15] add changelog file.

* [transit-pkcs1v15] remove the algorithm path as padding_scheme is chosen by parameter.

* Update ui/app/templates/components/transit-key-action/datakey.hbs

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>

* Update ui/app/templates/components/transit-key-action/datakey.hbs

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>

* Update ui/app/templates/components/transit-key-action/datakey.hbs

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>

* Update website/content/api-docs/secret/transit.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/api-docs/secret/transit.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/api-docs/secret/transit.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Add warnings to PKCS1v1.5 usage

* Update transit

* Update transit, including separating encrypt/decrypt paddings for rewrap

* Clean up factory use in the presence of padding

* address review feedback

* remove defaults

* lint

* more lint

* Some fixes for UI issues

 - Fix padding scheme dropdown console error by adding values
   to the transit-key-actions.hbs
 - Populate both padding scheme drop down menus within rewrap,
   not just the one padding_scheme
 - Do not submit a padding_scheme value through POST for non-rsa keys

* Fix Transit rewrap API to use decrypt_padding_scheme, encrypt_padding_scheme

 - Map the appropriate API fields for the RSA padding scheme to the
   batch items within the rewrap API
 - Add the ability to create RSA keys within the encrypt API endpoint
 - Add test case for rewrap api that leverages the padding_scheme fields

* Fix code linting issues

* simply padding scheme enum

* Apply suggestions from code review

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>

* Fix padding_scheme processing on data key api

 - The data key api was using the incorrect parameter name for
   the padding scheme
 - Enforce that padding_scheme is only used on RSA keys, we
   are punting on supporting it for managed keys at the moment.

* Add tests for parsePaddingSchemeArg

* Add missing copywrite headers

* Some small UI fixes

* Add missing param to datakey in api-docs

* Do not send padding_scheme for non-RSA key types within UI

* add UI tests for transit key actions form

---------

Co-authored-by: Marcel Lanz <marcellanz@n-1.ch>
Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
Co-authored-by: Steve Clark <steven.clark@hashicorp.com>
Co-authored-by: claire bontempo <cbontempo@hashicorp.com>
2024-10-09 09:30:14 -05:00
Victor Rodriguez
770d902f60
Use stored seal generation info for response to sys/seal-backend-status (#28631)
Use stored seal generation info for response to sys/seal-backend-status.
2024-10-09 14:04:50 +00:00
Sarah Chavis
25ce991234
Add release notes for 1.18 (#28646)
* Add release notes for 1.18

* Make corrections per feedback

* Update website/content/docs/release-notes/1.18.0.mdx

Co-authored-by: Jonathan Frappier <92055993+jonathanfrappier@users.noreply.github.com>

---------

Co-authored-by: Jonathan Frappier <92055993+jonathanfrappier@users.noreply.github.com>
2024-10-08 21:30:39 -07:00
ram-parameswaran
518027ba83
Update Azure SDK logger variable in docs (#28622)
* Update azure.mdx

Update Azure secrets engine docs to use AZURE_SDK_GO_LOGGING for Azure debug

* Update azure.mdx

Update Azure Auth engine docs to use AZURE_SDK_GO_LOGGING for Azure debug
2024-10-08 16:55:55 -07:00
Ben Ash
0f296522c3
Update VSO docs for v0.9.0 (#28639) 2024-10-08 18:36:40 -04:00
claire bontempo
902d853f7a
UI: Add copy button for secret path (#28629)
* add copy button to secret headers

* add changelog

* add test
2024-10-08 14:06:39 -07:00
Steven Clark
8fec0056c1
Update buf to 1.45.0 (#28632) 2024-10-08 15:02:15 -06:00
Yoko Hyakuna
af8c9571b1
[Docs] Add a missing parameter (#28630)
* Add a missing parameter

* Update website/content/docs/configuration/replication.mdx

Co-authored-by: Nick Cabatoff <ncabatoff@hashicorp.com>

* Fix the cross referencing link

---------

Co-authored-by: Nick Cabatoff <ncabatoff@hashicorp.com>
2024-10-08 13:49:09 -07:00
Angel Garbarino
9d4d5630c2
Address Deprecation no-a-wth-array-like (#28613)
* fixes mfa test suite for no a with array like

* Update mfa-login-enforcement-form.js

* remove deprecation

* pr feedback
2024-10-08 13:40:37 -06:00
claire bontempo
163cfd225f
remove dep (#28628) 2024-10-08 16:26:28 +00:00
claire bontempo
7774261c15
UI: Ember upgrade: Handle deprecation router service from host (#28603)
* use alias for router injection

* update @router declarations in engine files

* fix remaining pki router imports

* dynamically set router based on owner

* address replication routers

* update markdown docs

* use non-deprecated import for getOwner

* revert out of scope changes

* add transition-to test
2024-10-08 09:01:46 -07:00
Ryan Cragun
b6145bc3bb
protobuf: rebuild protos with protobuf 1.35.1 (main) (#28617)
* protobuf: rebuild protos with protobuf 1.35.1
* protobuf: unpin protoc-gen-go-grpc on main

Signed-off-by: Ryan Cragun <me@ryan.ec>
2024-10-07 14:54:51 -06:00
Steven Clark
0687353788
Cleanup some duplication in the PKI tidy response field definitions (#28614) 2024-10-07 16:20:57 -04:00
Steven Clark
9808006be9
Update Vault PKCS11 Provider docs (#28615)
- Add a missing architecture that we have published for a while
- Add a Changelog to the end of the page
2024-10-07 16:18:45 -04:00
Ryan Cragun
c8e6169d5d
VAULT-31402: Add verification for all container images (#28605)
* VAULT-31402: Add verification for all container images

Add verification for all container images that are generated as part of
the build. Before this change we only ever tested a limited subset of
"default" containers based on Alpine Linux that we publish via the
Docker hub and AWS ECR.

Now we support testing all Alpine and UBI based container images. We
also verify the repository and tag information embedded in each by
deploying them and verifying the repo and tag metadata match our
expectations.

This does change the k8s scenario interface quite a bit. We now take in
an archive image and set image/repo/tag information based on the
scenario variants.

To enable this I also needed to add `tar` to the UBI base image. It was
already available in the Alpine image and is used to copy utilities to
the image when deploying and configuring the cluster via Enos.

Since some images contain multiple tags we also add samples for each
image and randomly select which variant to test on a given PR.

Signed-off-by: Ryan Cragun <me@ryan.ec>
2024-10-07 10:16:22 -06:00
vinay-gopalan
08e8776dfb
Add documentation for new rootless password rotation workflow for DB Static Roles (#28374)
Co-authored-by: John-Michael Faircloth <fairclothjm@users.noreply.github.com>
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2024-10-07 15:51:30 +00:00
Chris Capurso
69411d7925
VAULT-30108: Include User-Agent header in audit requests by default (#28596)
* include user-agent header in audit by default

* add user-agent audit tests

* update audit default headers docs

* add changelog entry

* remove temp changes from TestAuditedHeadersConfig_ApplyConfig

* more TestAuditedHeadersConfig_ApplyConfig fixes

* add some test comments

* verify type assertions in TestAudit_Headers

* more type assertion checks
2024-10-07 10:02:17 -04:00
claire bontempo
05f32b69ee
UI: upgrade HDS to 4.12.0 (#28525)
* update hds to latest version

* yield dropdown Interactive text instead of use @text arg, results after running codemod

* remaining dropdown changes

* address sidebar nav IconButton deprecation, fix secret tests

* revert

* explicitly select popupmenu

* more test changes

* fix pki toggle button

* remove tracked prop in oidc client controller

* aaand more test updates

* change to tilde

* tilde yarn lock changes

* small cleanup items
2024-10-04 20:07:48 +00:00
Scott Miller
bae00721d2
Dont add the error from validating via issuer signature if the subsequent verification from extraCas succeeds (#28597)
* Dont add the error from validating via issuer signature if the subsequent verification from extraCas succeeds

* changelog
2024-10-04 18:59:40 +00:00
Guillermo Barroso
aeca0cdee6
secrets/aws: add sts_region parameter to root config (#22726)
* Set region parameter to be used for STS only on AWS secrets engine

* Add changelog

* Fix formatting

* region fix when not setting iam_endpoint or sts_endpoint

* Add 'sts_region' parameter for AWS secrets engine.

* Update TestBackend_PathConfigRoot for aws secrets

* Update changelog entry

---------

Co-authored-by: Robert <17119716+robmonte@users.noreply.github.com>
2024-10-04 18:33:09 +00:00
Josh Black
7307c56f59
-agent-address flag should have higher precedence than the env var (#28574)
* -agent-address flag should have higher precedence than the env var

* add changelog
2024-10-04 11:29:03 -07:00
Josh Black
d1355cb98f
explain how -output-curl-string works in comments to avoid confusion (#28576) 2024-10-04 11:14:21 -07:00
Mike Palmiotto
6a145af82a
CE: Remove RequestLimiter config plumbing (#28592)
This PR provides some plumbing for the enterprise counterpart PR:
hashicorp/vault-enterprise#6791
2024-10-04 13:48:16 -04:00
Bianca Moreira
c7b029eb01
Clone entity memdb (#28593) 2024-10-04 15:00:54 +00:00
Scott Miller
6ad78c4102
Remove one more use of ScalarMult from CE (#28585)
* Remove one more use of ScalarMult from CE

* get param order right
2024-10-03 15:59:42 -05:00
claire bontempo
287f5606b0
UI: pin rollup version in resolutions to 2.79.2 (#28589)
* pin rollup version in resolutions

* SECVULN-13161 link jira
2024-10-03 13:32:05 -07:00
Angel Garbarino
c006568085
Handle promise-proxy deprecation (#28563)
* fix promise issues on transformation-edit

* fix one test and the transition problem

* cannot call capabilities service directly inside template because its an unresolved promise

* address transit capabilities issues

* remove deprecations line for promise-proxies

* handle hot mess of delete permissions and such

* blah

* update flash message language. It will now show a flash message for each role whose transformationw as not removed.

* small wording change

* one small change to the default flash message

* Update ui/app/components/transformation-edit.js

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>

* Update ui/app/components/transformation-edit.js

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>

* Update ui/app/components/transformation-edit.js

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>

* fix policy flow

* fix linting and can't define let outside if block

* fix flashmessage things

* make show and edit use same param

---------

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>
2024-10-03 13:49:21 -06:00
Scott Miller
1eaca82bbd
Log when the seal is unavailable as error (#28564)
* Log when the seal is unavailable as error

* changelog

* Update changelog/28564.txt

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>

---------

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2024-10-03 18:47:50 +00:00
claire bontempo
e8a432c4f8
UI: removeember-fetch which used vulnerable version of rollup (#28575) 2024-10-03 09:54:30 -07:00
Steven Clark
baf794b621
Remove duplicated allow_empty_principals parameter in role api docs (#28580) 2024-10-03 09:54:22 -04:00
claire bontempo
f2656be89f
add model to linkto (#28573) 2024-10-02 15:46:52 -07:00
VAL
53bb78ce5f
Log when MAP_POPULATE gets disabled (#28526)
* add warning for when MAP_POPULATE mmap flag not set

* Make mmap flags method handle any flags, where MAP_POPULATE is just one of them

* Only have the log print out on restores

* Add test, make logic more consistent

* Add changelog

* Add godoc for test

* Make test less dangerous
2024-10-02 12:27:25 -07:00
Tin Vo
4836c83e5a
removing unused variable (#28537)
* removing unused variable

* testing pipeline

* testing pipeline
2024-10-02 12:06:26 -07:00
Jason Joo
a5caf4e1cb
fix: cert auth method watches cert file change and NewCreds() notification (#28126)
Signed-off-by: Jason Joo <hblzxsj@gmail.com>
2024-10-02 13:41:55 -04:00
Steven Clark
159e780d74
Have go-test timeout before the GH step timeout to gather information (#28559)
- If we encounter a deadlock/long running test it is better to have go
   test timeout. As we've noticed if we hit the GitHub step timeout, we
   lose all information about what was running at the time of the timeout
   making things harder to diagnose.
 - Having the timeout through go test itself on a long running test it
   outputs what test was running along with a full panic output within
   the logs which is quite useful to diagnose
2024-10-02 10:27:25 -04:00
Steven Clark
7efc1af5d0
Do not acquire a read lock twice on tidyStatusLock during tidy-status api call. (#28556) 2024-10-02 08:58:05 -04:00
Angel Garbarino
a3772c852d
remove from config (#28550) 2024-10-01 13:20:41 -07:00
Victor Rodriguez
e7e16fd175
Move writing of stored keys to the end of Vault initialization. (#28538)
Move the call to SetStoredKeys to the end of the initialization process. On
Vault Enterprise, this minimizes the chances that the initial seal re-wrap fails
when a node other than the one performing initialization becomes the active one.
2024-10-01 14:29:19 -04:00
Steven Clark
32d09a72f8
Update PKI tests to leverage the tidy-status test helper (#28531)
- I have a suspicion the for loop with the timer can be infinite loops
   in certain circumstances. Instead leverage the normal test helpers
   for fetching tidy status
2024-10-01 14:22:15 -04:00
claire bontempo
71422d4cdd
UI: Fix oidc auth method missing default_role field (#28539)
* add auth-config/oidc to openapi model helper

* alphabetize

* update maskedinput selector to be standard data-test-input

* add test

* add changelog

* fix maskedinput test and kv selector

* final textarea selector!
2024-10-01 09:21:16 -07:00
Eléonore Carpentier
b195342e51
Add sys/storage/raft/bootstrap option to reset TLS keyring (#18615)
* Add sys/storage/raft/bootstrap option to reset TLS keyring

* Add a comment

* Remove resetTLSKeyring arg & fix based on review comments

* Add changelog

* Update vault/raft.go

Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>

* fix failing test

* typo in go doc  :sadpanda:

---------

Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
2024-10-01 11:52:12 -04:00
Chris Capurso
759751a27b
add aws and k8s auth examples to export (#28481)
* add aws and k8s auth examples to export

* add clarification to alias name source

* fix links
2024-10-01 09:44:00 -04:00
Luis (LT) Carbonell
2d46c8d1fd
Add clarifying message (#28535) 2024-09-30 15:48:55 +00:00
Steven Clark
70d5c5e582
Update ssh docs to add missing conditional for valid_principals (#28530) 2024-09-27 17:13:20 -04:00
Lee Boynton
55dac2a319
Fix potential error revoking privileges in postgres secret engine (#28519)
* Fix potential error revoking privileges in postgres secret engine

* add changelog entry

* fix changelog format

---------

Co-authored-by: JM Faircloth <jmfaircloth@hashicorp.com>
2024-09-26 16:08:14 -05:00
claire bontempo
6dfde31f94
UI: address body-parser security vulnerability (#28520)
* add body-parser to resolutions block

* revert resolutions pin

* upgrade ember-a11y-testing package

* add back to resolutions block;
2024-09-26 10:58:42 -07:00
Steven Clark
2db2a9fb5d
PKI: Track last time auto tidy was run across restarts (#28488)
* Track the last PKI auto-tidy time ran for use across nodes

 - If the interval time for auto-tidy is longer then say a regularly
   scheduled restart of Vault, auto-tidy is never run. This is due to
   the time of the last run of tidy is only kept in memory and
   initialized on startup to the current time
 - Store the last run of any tidy, to maintain previous behavior, to
   a cluster local file, which is read in/initialized upon a mount
   initialization.

* Add auto-tidy configuration fields for backing off at startup

* Add new auto-tidy fields to UI

* Update api docs for auto-tidy

* Add cl

* Update field description text

* Apply Claire's suggestions from code review

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>

* Implementing PR feedback from the UI team

* remove explicit defaults and types so we retrieve from backend, decouple enabling auto tidy from duration, move params to auto settings section

---------

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>
Co-authored-by: claire bontempo <cbontempo@hashicorp.com>
2024-09-26 09:47:11 -04:00
Tom Chwojko-Frank
31d58145fd
Updated changelog for the 1.17.6, 1.16.10, and 1.15.15 releases (#28513) 2024-09-25 18:51:26 -07:00