Commit graph

2558 commits

Author SHA1 Message Date
hc-github-team-secure-vault-core 36365ed7f4
backport of commit 3a46ecc389e9096ccea6c6f847b68ada7f8068d7 (#21362)
Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
2023-06-21 14:01:13 +00:00
hc-github-team-secure-vault-core 13fdb8f9bf
backport of commit 042dd57811c900c9f6e2c85b5460d50560f79105 (#21295)
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2023-06-15 21:47:54 +00:00
hc-github-team-secure-vault-core ec9fed4555
backport of commit 8cc7be234ac34ff0f703ab092a7314ba9e65b277 (#21293)
Co-authored-by: Matt Schultz <975680+schultz-is@users.noreply.github.com>
2023-06-15 21:15:01 +00:00
hc-github-team-secure-vault-core 25364ebb61
backport of commit 052719b9a824da4ee368c3d982070ab290846970 (#21226)
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-06-14 18:08:57 +00:00
hc-github-team-secure-vault-core 833fe4580b
backport of commit b346b52b62db8ddf2eeaace506f211ea02166b93 (#21224)
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-06-14 16:31:07 +00:00
hc-github-team-secure-vault-core 1be0ebae8a
backport of commit 3b14cd2061b49c8c698205eef87ceb3d0e69983b (#21181)
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2023-06-13 20:13:41 +00:00
hc-github-team-secure-vault-core f982465ec3
backport of commit aba75aac863d4aef51a9062af9b8557a7ecd2eeb (#21177)
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2023-06-13 17:21:19 +00:00
hc-github-team-secure-vault-core e8ce4a4787
Backport of Signal ACME challenge engine if existing challenges were loaded on startup into release/1.14.x (#21142)
* backport of commit c855ba6a903787fa3102f5dac8bf8a8eacac213b

* Remove changelog

 - Removing changelog as it ACME is not part of a release

---------

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2023-06-12 18:42:54 +00:00
hc-github-team-secure-vault-core 84b60f3056
backport of commit f147bc1fb1197495c865145e68015d369fb16a5c (#21086)
Co-authored-by: Matt Schultz <975680+schultz-is@users.noreply.github.com>
2023-06-08 18:09:17 +00:00
hc-github-team-secure-vault-core c8bda1de51
backport of commit 9f87bcfb3b67cbad9ee967ac574484938447f448 (#21085)
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-06-08 17:35:07 +00:00
hc-github-team-secure-vault-core 67c549de77
backport of commit 28bcf9a664d3f32a8c162248621ad19548bdccf2 (#21084)
Co-authored-by: Matt Schultz <975680+schultz-is@users.noreply.github.com>
2023-06-08 17:00:36 +00:00
hc-github-team-secure-vault-core 97b763fb91
backport of commit df975cf04e06e0c18c4b23308b7c82fb5664b6a0 (#21013)
Co-authored-by: Kit Haines <khaines@mit.edu>
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2023-06-08 16:27:42 +00:00
hc-github-team-secure-vault-core cb44d87787
backport of commit 61d35391a74bd8e7fcf0d1b37417c258859a4ddb (#21012)
Co-authored-by: Kit Haines <khaines@mit.edu>
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2023-06-08 11:48:10 -04:00
hc-github-team-secure-vault-core e87682eb66
backport of commit 8e576cf226d090d280ccfdd341107fc5a5a41c9a (#21076)
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-06-08 14:13:24 +00:00
hc-github-team-secure-vault-core 6a24e938df
backport of commit 08c1efa4d4fa516c40a8b5ede0e8e19f298d7755 (#21074)
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-06-08 13:25:07 +00:00
hc-github-team-secure-vault-core 8f255a061d
backport of commit ddaf5038f253546b15eae684a8114c04e552b731 (#21068)
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2023-06-08 04:00:10 +00:00
hc-github-team-secure-vault-core 63789ceb9f
backport of commit 0bd356f6cd9bd82c108535439a7f83796c89030e (#21065)
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2023-06-08 01:35:28 +00:00
hc-github-team-secure-vault-core d8979b449c
backport of commit f079b7b0a4de28f1230a270fc35ea5a787ad96d2 (#21060)
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-06-07 21:32:58 +00:00
hc-github-team-secure-vault-core 1f8c665eb3
backport of commit 3dbdee528a0ae581858c77512c46f4a1fda87283 (#21054)
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2023-06-07 20:34:22 +00:00
hc-github-team-secure-vault-core c61f8780ed
backport of commit 45b9dffea1cf4fe4e506a9ef9138229961bfbbb4 (#21026)
Co-authored-by: kpcraig <3031348+kpcraig@users.noreply.github.com>
2023-06-06 20:00:24 +00:00
hc-github-team-secure-vault-core 7ffedab7ce
backport of commit e63dc30507cbd65cd7bcd59c317edd663e035af7 (#20946)
Co-authored-by: Kit Haines <khaines@mit.edu>
2023-06-01 18:42:16 -04:00
hc-github-team-secure-vault-core 722f523a1c
backport of commit 8dde8ae29e2edc663f6c02a87d8a6c1376cc2b52 (#20936)
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2023-06-01 19:57:41 +00:00
hc-github-team-secure-vault-core d6292c97b2
backport of commit b1c936d4532e2a740e975b45f66818f1560e5584 (#20931)
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2023-06-01 18:01:18 +00:00
hc-github-team-secure-vault-core 52835311b2
Backport of Fix transit import/export of hmac-only keys into release/1.14.x (#20902)
* backport of commit daf72aa42790144c3a0ca9c17bb19b1c5bce66c6

* Fix formatting

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

---------

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-05-31 18:42:44 +00:00
hc-github-team-secure-vault-core e5f1ff2548
backport of commit 657ee3107a10b85b5e72cf1992a4410f8107e8e9 (#20893)
Co-authored-by: Tom Proctor <tomhjp@users.noreply.github.com>
2023-05-31 16:02:51 +00:00
hc-github-team-secure-vault-core e3e947b386
backport of commit 4b60ffd5ef87e5f6535dcf578ed6c36b24b75174 (#20892)
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-05-31 14:19:49 +00:00
hc-github-team-secure-vault-core 9f9ca7cede
backport of commit 10c16ccbcb13fbb0dab56fd7b11b4fdb41609436 (#20875)
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2023-05-31 13:16:25 +00:00
hc-github-team-secure-vault-core a486b13957
backport of commit 63ccb60b9a6dadf717e6813f9789c7194a2375de (#20877)
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-05-30 23:49:24 +00:00
hc-github-team-secure-vault-core 3e6bc17036
backport of commit bd4d7269dd987395426275901afa06b17dc54220 (#20849)
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-05-30 21:30:35 +00:00
hc-github-team-secure-vault-core 1bad8f2f78
backport of commit 08ee474850e090cf9100878f02e0bdefc7d959f7 (#20871)
Co-authored-by: Milena Zlaticanin <60530402+Zlaticanin@users.noreply.github.com>
2023-05-30 20:44:21 +00:00
hc-github-team-secure-vault-core da127db836
backport of commit 000d754c40b5daaae21e97dd548d3c308c7c6475 (#20870)
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2023-05-30 19:34:01 +00:00
hc-github-team-secure-vault-core a1d3c88f56
backport of commit 12d851de3755aaeba6531c87db5c488a5782b9cb (#20853)
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2023-05-30 19:01:44 +00:00
hc-github-team-secure-vault-core 765427257e
backport of commit 7cf3ba33b5bf46954bdc872f9a3b72352fcd7a64 (#20852)
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2023-05-30 18:15:53 +00:00
hc-github-team-secure-vault-core 0f66ddb8f8
backport of commit 34571d4d230537126ba4fa879fc161beada742ae (#20850)
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2023-05-30 17:42:15 +00:00
hc-github-team-secure-vault-core 127cef66a2
backport of commit 7490a2ebb7f5950321ec7930ee5f911c86febb04 (#20856)
Co-authored-by: Milena Zlaticanin <60530402+Zlaticanin@users.noreply.github.com>
2023-05-30 17:13:11 +00:00
Alexander Scheel 34804c6817
Increase retry limit on dnstest/server.go (#20810)
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-05-26 14:33:21 +00:00
Alexander Scheel 30488bc374
sdk/helper/nonce -> go-secure-stdlib/nonceutil (#20737)
Depends on https://github.com/hashicorp/go-secure-stdlib/pull/73

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-05-25 20:57:08 +00:00
Anton Averchenkov 5b510ffeca
openapi: Fix response schema for pki list roles (#20782) 2023-05-25 13:34:34 -04:00
Steven Clark d2f74c3901
Address various issues related to ACME EAB (#20755)
* Fix various EAB related issues

 - List API wasn't plumbed through properly so it did not work as expected
 - Use random 32 bytes instead of an EC key for EAB key values
 - Update OpenAPI definitions

* Clean up unused EAB keys within tidy

* Move Vault EAB creation path to pki/acme/new-eab

* Update eab vault responses to match up with docs
2023-05-24 21:17:33 +00:00
Alexander Scheel f156a57325
Validate no_store=false on role configuration (#20757)
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-05-24 21:13:28 +00:00
kpcraig 628c51516a
VAULT-12226: Add Static Roles to the AWS plugin (#20536)
Add static roles to the aws secrets engine

---------

Co-authored-by: maxcoulombe <max.coulombe@hashicorp.com>
Co-authored-by: vinay-gopalan <86625824+vinay-gopalan@users.noreply.github.com>
Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
2023-05-24 14:55:13 -04:00
Steven Clark f29fabe7c1
Enforce valid ACME accounts in challenge APIS (#20744)
- Make sure we have an ACME account in a valid state and
   enforce EAB policies on that account for the challenge
   and revocation by account ACME apis.
2023-05-24 17:28:56 +00:00
Alexander Scheel c67546511d
Move activityType to a constant, set precedence (#20738)
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-05-24 12:29:47 -04:00
Alexander Scheel 04bb7eef15
Update transit public keys for Ed25519 support (#20727)
* Refine documentation for public_key

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Support additional key types in importing version

This originally left off the custom support for Ed25519 and RSA-PSS
formatted keys that we've added manually.

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add support for Ed25519 keys

Here, we prevent importing public-key only keys with derived Ed25519
keys. Notably, we still allow import of derived Ed25519 keys via private
key method, though this is a touch weird: this private key must have
been packaged in an Ed25519 format (and parseable through Go as such),
even though it is (strictly) an HKDF key and isn't ever used for Ed25519.

Outside of this, importing non-derived Ed25519 keys works as expected.

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add public-key only export method to Transit

This allows the existing endpoints to retain private-key only, including
empty strings for versions which lack private keys. On the public-key
endpoint, all versions will have key material returned.

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Update tests for exporting via public-key interface

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add public-key export option to docs

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

---------

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-05-24 11:26:35 -04:00
Alexander Scheel 83d32240c7
Add nonce service to sdk/helpers, use in PKI (#20688)
* Build a better nonce service

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add internal nonce service for testing

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add benchmarks for nonce service

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add statistics around how long tidy took

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Replace ACME nonces with shared nonce service

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add an initialize method to nonce services

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Use the new initialize helper on nonce service in PKI

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add additional tests for nonces

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Format sdk/helper/nonce

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Use default 90s nonce expiry in PKI

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Remove parallel test case as covered by benchmark

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add additional commentary to encrypted nonce implementation

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add nonce to test_packages

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

---------

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-05-23 19:44:05 +00:00
Ethan Lowman 3f4dc700bd
Correct signing terminology in comments and error messages (#20714) 2023-05-23 12:44:06 +00:00
Márk Sági-Kazár 258b2ef740
Upgrade go-jose library to v3 (#20559)
* upgrade go-jose library to v3

Signed-off-by: Mark Sagi-Kazar <mark.sagikazar@gmail.com>

* chore: fix unnecessary import alias

Signed-off-by: Mark Sagi-Kazar <mark.sagikazar@gmail.com>

* upgrade go-jose library to v2 in vault

Signed-off-by: Mark Sagi-Kazar <mark.sagikazar@gmail.com>

---------

Signed-off-by: Mark Sagi-Kazar <mark.sagikazar@gmail.com>
2023-05-23 12:25:58 +00:00
Alexander Scheel 1f21afba21
Fix race in PKI's runUnifiedTransfer (#20701)
* Fix race in PKI's runUnifiedTransfer

During this race, we'll sometimes start (or fail to start) an additional
unified transfer if the updated last run timestamp was written at the
same time as another thread was reading it.

Instead, delay this check until we're holding the CAS guard; this will
occasionally result in more messages saying that an existing process is
already running, but otherwise shouldn't impact the functionality at
all.

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add changelog entry

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

---------

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-05-22 18:31:19 +00:00
Mike Palmiotto a40341d176
Add client_type field to EntityRecord protobuf (#20626)
* Add client_type field to EntityRecord protobuf

* changelog

* Add ACME clientType verification
2023-05-19 20:30:12 +00:00
Alexander Scheel e552c06173
Properly validate int ca lifetime error, add warning on leaf cert with basic constraints (#20654)
* Ensure proper error message from CA validity period

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add warning to issuance of leaf cert with basic constraints

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add changelog entry

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

---------

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-05-19 19:52:16 +00:00