Commit Graph

17838 Commits

Author SHA1 Message Date
hc-github-team-secure-vault-core 325e822e8a
VAULT-20476: vault.NewCore refactor. (#23644) (#23659)
* NewCore tech debt refactoring

* addExtraCredentialBackends

* singletonMounts => mountTypeToken instead of 'token'

* NewCore tests support ent backend addition

* PR feedback

* reorder method calls

* mounthPath___ standardization

* Try to be more explicit about the min number of backends

* Include cluster listener

* explicit declaration of events before assignment

* Removed nil checking

* resolve conflicts

Co-authored-by: Peter Wilson <peter.wilson@hashicorp.com>
2023-10-16 11:38:11 +00:00
hc-github-team-secure-vault-core cfdc96981f
backport of commit 1b2b647b2129023c1e43b62ad7dd7db522514691 (#23642)
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2023-10-12 20:08:36 +00:00
hc-github-team-secure-vault-core 79441cfed7
backport of commit 7872338ec15b263cf53073e973fa92dfc5b7a506 (#23639)
Co-authored-by: Jason O'Donnell <2160810+jasonodonnell@users.noreply.github.com>
2023-10-12 18:49:44 +00:00
davidadeleon ca247609c7
Backport of Implement user lockout log into release/1.14.x (#23630)
* Implement user lockout log (#23140)

* implement user lockout logger

* formatting

* make user lockout log interval configurable

* create func to get locked user count, and fix potential deadlock

* fix test

* fix test

* add changelog

* fix panic when unlocking unlocked user (#23611)
2023-10-12 11:24:52 -04:00
hc-github-team-secure-vault-core 354a8e90a3
backport of commit a485837cb624516701071e12681cc543bd5e45bf (#23631)
Co-authored-by: Skybladev2 <Skybladev2@users.noreply.github.com>
2023-10-12 14:12:58 +00:00
Sarah Chavis a80d1785c3
Update enterprise vs hcp alerts (#23619) (#23626) 2023-10-11 18:26:34 -05:00
hc-github-team-secure-vault-core a4604006e3
backport of commit 1f1ead0dc72e24ecaf5abe3784aac79cfbd5124b (#23615)
Co-authored-by: Josh Black <raskchanky@gmail.com>
2023-10-11 18:14:21 +00:00
hc-github-team-secure-vault-core fb590cc9da
backport of commit d74d920b6ee2f1b4822f771a6c98ad0bf0a58142 (#23578)
Co-authored-by: Skybladev2 <Skybladev2@users.noreply.github.com>
2023-10-11 11:11:55 -07:00
hc-github-team-secure-vault-core be902639fc
backport of commit 163c03f514261627275b1fd36e4b857a108391ac (#23606)
Co-authored-by: Hamid Ghaf <83242695+hghaf099@users.noreply.github.com>
2023-10-11 15:41:54 +00:00
hc-github-team-secure-vault-core 5f2a4083b4
backport of commit ec026ad2ce5818d78dba39dfca0a2c003c29c276 (#23574)
Co-authored-by: Skybladev2 <Skybladev2@users.noreply.github.com>
2023-10-09 13:10:07 -07:00
hc-github-team-secure-vault-core 8d656f9047
backport of commit 6ff9fcabab33d2f740d50e5afc012057257a16dc (#23576)
Co-authored-by: Skybladev2 <Skybladev2@users.noreply.github.com>
2023-10-09 20:08:22 +00:00
Hamid Ghaf 1834611e66
adding testonly CI test job (#22439) (#23423)
* adding testonly CI test job

* small instance for testonly tests

* feedback

* shopt

* disable glob expansion

* revert back to a large instance

* fix a mistake
2023-10-09 12:23:43 -07:00
Angel Garbarino f694c7ffb0
Fix copy button in collapsed sidebar nav in CopyButton component (#23564)
* fix (#23511)

* changelog
2023-10-09 11:39:50 -06:00
Angel Garbarino 89de6267c7
Allow AWS secret engine to send empty policy document (#23470) (#23509)
* fix

* changelog

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>
2023-10-08 13:10:35 -06:00
hc-github-team-secure-vault-core f4453384cb
events: Ignore send context (#23500) (#23538)
When sending an event asynchronously, the original context used for
whatever generated the event (probably a synchronous, quick HTTP
context) is probably not what is wanted for sending the event, which
could face delays if a consumer is backed up.

I will admit myself to sometimes having "context blindness", where
I just take whatever context is incoming in a function and thread it
out to all calls. Normally this is the right thing to do when, say,
tying downstream API calls to an upstream HTTP timeout.

When making KV events, for example, we used the HTTP context for
`SendEvent()`, and this can cause the events to be dropped if they
aren't taken from the channel before the HTTP request finishes.

In retrospect, it was probably unnecessary to include a context in
the `SendEvent` interface.

We keep the context in place for backwards compability, but also in
case we want to use it for purposes other than timeouts and
cancellations in the future.

Co-authored-by: Christopher Swenson <christopher.swenson@hashicorp.com>
2023-10-05 21:35:10 +00:00
Sarah Chavis 4c127795de
Fix table typo (#23532) 2023-10-05 12:42:12 -07:00
hc-github-team-secure-vault-core cf7c5ee6d9
backport of commit cbb96b230c296402341aba11fc1cf41d4f9c2e25 (#23524)
Co-authored-by: Jordan Reimer <zofskeez@gmail.com>
2023-10-05 09:54:03 -06:00
Sarah Chavis 8e27406717
[DOCS] Confirm restricted endpoint alerts (1.14 docs) (#23515)
* Remove duplicates and sort A-Z
* Remove plugin runtime listing (not in 1.14 CLI)
2023-10-04 17:42:21 -05:00
hc-github-team-secure-vault-core 64c865eb26
backport of commit 7d800b1af20de24149817fd735e2001403446ab1 (#23520)
Co-authored-by: Ryan Cragun <me@ryan.ec>
2023-10-04 14:44:02 -06:00
hc-github-team-secure-vault-core 4d910a3b43
backport of commit 5123ea933a1d8e4df0af2aefb049c3556f843b72 (#23505)
Co-authored-by: Jason O'Donnell <2160810+jasonodonnell@users.noreply.github.com>
2023-10-04 15:19:12 -04:00
hc-github-team-secure-vault-core c9919d599c
backport of commit b5ff3f81134f6d980c7380cb3eda995e6296f891 (#23499)
Co-authored-by: xka5h <74259424+xka5h@users.noreply.github.com>
2023-10-04 13:58:58 -04:00
hc-github-team-secure-vault-core c90b7cddb7
backport of commit 9019203e9f052b6e58a14cbfab4a559d5e7e5883 (#23491)
Co-authored-by: Conor McCullough <103977699+conor-mccullough@users.noreply.github.com>
2023-10-04 09:13:33 -05:00
hc-github-team-secure-vault-core 7624576e39
backport of commit 9afd5e52ae31d6c3b7ab6833836647392bb318e6 (#23478)
Co-authored-by: Ryan Cragun <me@ryan.ec>
2023-10-03 19:29:40 +00:00
hc-github-team-secure-vault-core 92997859cd
[VAULT-20630] CI: Use 'ref' (not 'base_ref') as a default git reference to check out code in the test-go GHA workflow (#23458) (#23469)
Co-authored-by: Kuba Wieczorek <kuba.wieczorek@hashicorp.com>
2023-10-03 17:47:44 +00:00
hc-github-team-secure-vault-core 86159f0382
[VAULT-20630] CI: Fix the CI workflow issue where we check out base ref instead of the ref that triggered the workflow run (#23453) (#23456)
Co-authored-by: Kuba Wieczorek <kuba.wieczorek@hashicorp.com>
2023-10-03 14:29:31 +01:00
hc-github-team-secure-vault-core 28f2585da3
backport of commit 0fa36a36ae1b4842d96623eef0d20af5dea557c0 (#23443)
Co-authored-by: Paul Banks <pbanks@hashicorp.com>
2023-10-02 09:49:05 -07:00
hc-github-team-secure-vault-core 15e85d26df
backport of commit 1b321e3e7ecf487741e722b1c9b224cbe1f3146e (#23413)
Co-authored-by: Ryan Cragun <me@ryan.ec>
2023-09-28 23:33:24 +00:00
hc-github-team-secure-vault-core b9e0d4666e
backport of commit 807bacbc9c0d499de206cfc1f901cea464d94195 (#23410)
Co-authored-by: Ryan Cragun <me@ryan.ec>
2023-09-28 22:51:49 +00:00
hc-github-team-secure-vault-core dd47cfdf2f
backport of commit 305d6d9b675339c300d5ce1ae697a71a8e17d92c (#23404)
Co-authored-by: Hamid Ghaf <83242695+hghaf099@users.noreply.github.com>
2023-09-28 15:14:53 -07:00
hc-github-team-secure-vault-core 611860780e
backport of commit a6ee197a73798ed3d578cab03512b774b5088f0b (#23399)
Co-authored-by: Ben Ash <32777270+benashz@users.noreply.github.com>
2023-09-28 17:02:49 -04:00
hc-github-team-secure-vault-core b81816ce08
backport of commit 9ffea8aee557da186bfa142af6fb217c2b967699 (#23395)
Co-authored-by: Ben Ash <32777270+benashz@users.noreply.github.com>
2023-09-28 16:42:17 -04:00
hc-github-team-secure-vault-core f761e5c1ee
backport of commit a3936f14679e34b5b84e88e94cc301704cf1df10 (#23372)
Co-authored-by: Marc Boudreau <marc.boudreau@hashicorp.com>
2023-09-28 13:16:28 -07:00
hc-github-team-secure-vault-core dcb99aea75
backport of commit 25bebfa91c4797d5a958c8d7f4c5330c9c845b0b (#23385)
Co-authored-by: Peter Wilson <peter.wilson@hashicorp.com>
2023-09-28 18:32:06 +00:00
hc-github-team-secure-vault-core 4ab34ef66e
Bump versions within transit managed key known issues (#23375) (#23377)
* Bump versions within transit managed key known issues

* Link in partials into 1.15.x upgrade release notes

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2023-09-28 16:49:30 +00:00
hc-github-team-secure-vault-core fd05101133
backport of commit 460b5de47b2b75b9cbeab06933f15774b7819d50 (#23358)
Co-authored-by: Ryan Cragun <me@ryan.ec>
2023-09-27 23:42:57 +00:00
hc-github-team-secure-vault-core 302284aafa
backport of commit 5cdce48a6a8380c185cf962a8e0768be006230e2 (#23347)
Co-authored-by: Ryan Cragun <me@ryan.ec>
2023-09-27 17:07:51 -06:00
hc-github-team-secure-vault-core d2465da3fd
[VAULT-20073] Docs: update upgrade guide for 1.15 with information on Sentinel RGP group policy application (#23296) (#23350)
Co-authored-by: Kuba Wieczorek <kuba.wieczorek@hashicorp.com>
Co-authored-by: Peter Wilson <peter.wilson@hashicorp.com>
2023-09-27 21:06:07 +00:00
Sarah Chavis 486865f704
[DOCS] Fix restricted endpoint info (#23333) (#23344)
* Update restricted API list and alert tags
* add cli commands w/o public endpoints
2023-09-27 13:52:31 -07:00
hc-github-team-secure-vault-core 1a707dc75c
backport of commit 6685565b7ed184afd0627781b2cd86788620bdf8 (#23341)
Co-authored-by: Kuba Wieczorek <kuba.wieczorek@hashicorp.com>
2023-09-27 21:41:03 +01:00
hc-github-team-secure-vault-core d8d5e440fe
backport of commit 547bff752e056ff81d4359267e0f8afa4629f505 (#23321) 2023-09-27 16:03:53 -04:00
hc-github-team-secure-vault-core fb88d3e4ec
backport of commit 7725117846a47dbd4faeecefa03c181251cbb371 (#23326)
Co-authored-by: Ryan Cragun <me@ryan.ec>
2023-09-27 12:59:02 -06:00
hc-github-team-secure-vault-core 4ccb3281f0
backport of commit d7e4447ec054ad9b8ce2dbdad6111f1587b325f8 (#23318)
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2023-09-27 10:31:57 -07:00
claire bontempo b7dca10a06
Fix typo OSCP -> OCSP (#22586) (#23316)
Co-authored-by: Thomas Schweizer-Bolzonello <thomas@schweizerbolzonello.net>
2023-09-27 17:15:53 +00:00
Ryan Cragun d2db7fbcdd
Backport [QT-602] Run `proxy` and `agent` test scenarios (#23176) into release/1.14.x (#23302)
* [QT-602] Run `proxy` and `agent` test scenarios (#23176)

Update our `proxy` and `agent` scenarios to support new variants and
perform baseline verification and their scenario specific verification.
We integrate these updated scenarios into the pipeline by adding them
to artifact samples.

We've also improved the reliability of the `autopilot` and `replication`
scenarios by refactoring our IP address gathering. Previously, we'd ask
vault for the primary IP address and use some Terraform logic to determine
followers. The leader IP address gathering script was also implicitly
responsible for ensuring that a found leader was within a given group of
hosts, and thus waiting for a given cluster to have a leader, and also for
doing some arithmetic and outputting `replication` specific output data.
We've broken these responsibilities into individual modules, improved their
error messages, and fixed various races and bugs, including:
* Fix a race between creating the file audit device and installing and starting
  vault in the `replication` scenario.
* Fix how we determine our leader and follower IP addresses. We now query
  vault instead of a prior implementation that inferred the followers and sometimes
  did not allow all nodes to be an expected leader.
* Fix a bug where we'd always always fail on the first wrong condition
  in the `vault_verify_performance_replication` module.

We also performed some maintenance tasks on Enos scenarios  byupdating our
references from `oss` to `ce` to handle the naming and license changes. We
also enabled `shellcheck` linting for enos module scripts.

* Rename `oss` to `ce` for license and naming changes.
* Convert template enos scripts to scripts that take environment
  variables.
* Add `shellcheck` linting for enos module scripts.
* Add additional `backend` and `seal` support to `proxy` and `agent`
  scenarios.
* Update scenarios to include all baseline verification.
* Add `proxy` and `agent` scenarios to artifact samples.
* Remove IP address verification from the `vault_get_cluster_ips`
  modules and implement a new `vault_wait_for_leader` module.
* Determine follower IP addresses by querying vault in the
  `vault_get_cluster_ips` module.
* Move replication specific behavior out of the `vault_get_cluster_ips`
  module and into it's own `replication_data` module.
* Extend initial version support for the `upgrade` and `autopilot`
  scenarios.

We also discovered an issue with undo_logs that has been described in
the VAULT-20259. As such, we've disabled the undo_logs check until
it has been fixed.

* actions: fix actionlint error and linting logic (#23305)

Signed-off-by: Ryan Cragun <me@ryan.ec>
2023-09-27 10:53:12 -06:00
hc-github-team-es-release-engineering be4f05ed25 Bumped product version to 1.14.5. 2023-09-26 18:09:22 -04:00
hc-github-team-secure-vault-core 6a15309a2e
Do not attempt to shutdown ACME thread on non-active nodes (#23293) (#23294)
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2023-09-26 21:01:17 +00:00
hc-github-team-secure-vault-core c08d731634
backport of commit dbfaa6f81a156ec1dcb85d8d76941d4ac70c91fb (#23285)
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2023-09-26 18:18:06 +00:00
claire bontempo ab1f3c8b83
cherry pick (#23264) 2023-09-22 21:29:05 +00:00
Chelsea Shaw 36452c0849
UI: add pagination to new PKI (#23193) (#23239)
* UI: add pagination to new PKI (#23193)

* fixes store type import

* fixes tests

---------

Co-authored-by: Jordan Reimer <zofskeez@gmail.com>
2023-09-22 10:47:55 -06:00
hc-github-team-secure-vault-core c29b24b07d
backport of commit 1d61aeb8aebc96eecbb6a35e10bd914b4d0f41f4 (#23250)
Co-authored-by: Sergey Kutovoy <kutovoy.s@gmail.com>
2023-09-22 09:06:23 -07:00