Austin Gebauer
d75db00dcb
Adds documentation for GCP Cloud KMS support in key management secrets engine ( #13153 )
2021-11-16 11:27:08 -08:00
Chelsea Shaw
c105c58bce
Hide verify-connection attribute on connection config show page ( #13152 )
...
* Hide verify-connection attribute on connection config show page
* Add changelog
2021-11-16 12:56:42 -06:00
Yoko Hyakuna
5864e0a523
Remove old guides folder and its contents ( #13156 )
...
* Remove old guides folder and its contents
* Remove the guide-nav file
* Remove the guides page
2021-11-16 08:15:42 -08:00
Loann Le
764c10ded7
[Doc Assembly Branch] Vault 1.9 release ( #12944 )
...
* new document for feature deprecation notice
* fixed errors
* Update website/content/docs/feature-deprecation-notice.mdx
Co-authored-by: Meggie <meggie@hashicorp.com>
* Update website/content/docs/feature-deprecation-notice.mdx
Co-authored-by: Meggie <meggie@hashicorp.com>
* Update website/content/docs/feature-deprecation-notice.mdx
Co-authored-by: Rosemary Wang <915624+joatmon08@users.noreply.github.com>
* Update website/content/docs/feature-deprecation-notice.mdx
Co-authored-by: Rosemary Wang <915624+joatmon08@users.noreply.github.com>
* Update feature-deprecation-notice.mdx
* added new faq page
* added content for faq
* updated faq page based on aarti's feedback
* added client count faq
* fixed a broken link
* added links
* fixed spacing issue
* added new release notes page
* edited the client count faq
* edited the feature deprecation faq
* edited the featue deprecation notice and plans
* edited the release notes
* added new oidc provider doc
* Update website/content/docs/concepts/oidc-provider.mdx
Co-authored-by: John-Michael Faircloth <fairclothjm@users.noreply.github.com>
* Update website/content/docs/concepts/oidc-provider.mdx
Co-authored-by: John-Michael Faircloth <fairclothjm@users.noreply.github.com>
* Update website/content/docs/concepts/oidc-provider.mdx
Co-authored-by: John-Michael Faircloth <fairclothjm@users.noreply.github.com>
* Update website/content/docs/concepts/oidc-provider.mdx
Co-authored-by: John-Michael Faircloth <fairclothjm@users.noreply.github.com>
* Update website/content/docs/concepts/oidc-provider.mdx
Co-authored-by: John-Michael Faircloth <fairclothjm@users.noreply.github.com>
* Update website/content/docs/concepts/oidc-provider.mdx
Co-authored-by: John-Michael Faircloth <fairclothjm@users.noreply.github.com>
* Update website/content/docs/concepts/oidc-provider.mdx
Co-authored-by: John-Michael Faircloth <fairclothjm@users.noreply.github.com>
* Update website/content/docs/concepts/oidc-provider.mdx
Co-authored-by: John-Michael Faircloth <fairclothjm@users.noreply.github.com>
* Update website/content/docs/concepts/oidc-provider.mdx
Co-authored-by: John-Michael Faircloth <fairclothjm@users.noreply.github.com>
* incorporated feedback
* Update website/content/docs/concepts/oidc-provider.mdx
Co-authored-by: John-Michael Faircloth <fairclothjm@users.noreply.github.com>
* Update website/content/docs/concepts/oidc-provider.mdx
Co-authored-by: John-Michael Faircloth <fairclothjm@users.noreply.github.com>
* Update website/content/docs/concepts/oidc-provider.mdx
Co-authored-by: John-Michael Faircloth <fairclothjm@users.noreply.github.com>
* Update website/content/docs/concepts/oidc-provider.mdx
Co-authored-by: John-Michael Faircloth <fairclothjm@users.noreply.github.com>
* changed mnt_acc to mount_accessor
* rewritting content
* added doc link
* fixed link error
* fixed spacing error
* incorporate additional feedback
* more feedback
* incorporated more feedback
* fixed headings
* fixed a heading
* incorproate changes
* incorporate feedback
* modified RN based on feedback
* Update website/content/docs/concepts/oidc-provider.mdx
Co-authored-by: Austin Gebauer <34121980+austingebauer@users.noreply.github.com>
* updated final release notes
* updated image
* fixed link
* added a new hyperlink to the etcd document
* add and modify notes; update scope template
* break identity docs into separate pages
* fix nav for identity token
* fix nav links; add links on overview
* use real example IDs
* fix typos
* incorporated additional feedback
Co-authored-by: Meggie <meggie@hashicorp.com>
Co-authored-by: Rosemary Wang <915624+joatmon08@users.noreply.github.com>
Co-authored-by: John-Michael Faircloth <fairclothjm@users.noreply.github.com>
Co-authored-by: Austin Gebauer <34121980+austingebauer@users.noreply.github.com>
Co-authored-by: JM Faircloth <jmfaircloth@hashicorp.com>
2021-11-15 18:02:36 -08:00
Matt Schultz
0abd248c9f
Return non-retryable errors on transit encrypt and decrypt failures ( #13111 )
...
* Return HTTP 400s on transit decrypt requests where decryption fails. (#10842 )
* Don't abort transit batch encryption when a single batch item fails.
* Add unit tests for updated transit batch decryption behavior.
* Add changelog entry for transit encrypt/decrypt batch abort fix.
* Simplify transit batch error message generation when ciphertext is empty.
* Return error HTTP status codes in transit on partial batch decrypt failure.
* Return error HTTP status codes in transit on partial batch encrypt failure.
* Properly account for non-batch transit decryption failure return. Simplify transit batch decryption test data. Ensure HTTP status codes are expected values on batch transit batch decryption partial failure.
* Properly account for non-batch transit encryption failure return. Actually return error HTTP status code on transit batch encryption failure (partial or full).
2021-11-15 15:53:22 -06:00
Chelsea Shaw
3d46021d4e
Prevent constant-refresh UI bug ( #12896 )
2021-11-15 15:45:55 -06:00
Rémi Lapeyre
677e2a1ca5
Fix some typos ( #12289 )
2021-11-15 14:52:04 -05:00
Yoko Hyakuna
ff145d3a4f
Fix out-dated hyperlink ( #13145 )
2021-11-15 09:53:49 -08:00
Steven Clark
2d21c00476
Add extra debugging to help identify failures within mssql test ( #13142 )
...
* Add extra debugging to help identify failures within mssql test
* Switch up the AssertInitialized method for mssql tests by marking the test as failed instead of
immediately failing, this will also allow us to see what happens even if this assertion fails to the rest
of the test.
2021-11-15 12:51:16 -05:00
Jordan Reimer
a3862bcf97
OIDC Auth Bug ( #13133 )
...
* fixes issue with oidc auth method when MetaMask chrome extenstion is used
* adds changelog entry
* updates auth-jwt integration tests
* fixes race condition in runCommands ui-panel helper method where running multiple commands would not always result in the same output order
2021-11-15 08:48:11 -07:00
Steven Clark
8b869dde70
Revert "OSS parts to support new kms_library configuration stanza. ( #13132 )" ( #13138 )
...
This reverts commit 82d6662787c181b16bfdec315f96e4a81d123178.
2021-11-15 09:58:50 -05:00
Scott Miller
a5e55f6b05
Fix a data race in the new autoseal health check ( #13136 )
...
* Move the ctx capture outside the goroutine to avoid a race
* refactor the toggleable wrapper to avoid races
* Move the capture back outside the goroutine
* defer
2021-11-12 15:58:46 -06:00
Hridoy Roy
1279413ea2
Docs Updates for Client Counting non-entity tokens ( #13134 )
...
* some client count docs updates
* Update website/content/docs/concepts/client-count.mdx
Co-authored-by: swayne275 <swayne275@gmail.com>
* remove full link path
* more path shortening for urls
Co-authored-by: swayne275 <swayne275@gmail.com>
2021-11-12 13:12:23 -08:00
Steven Clark
ae04eda675
OSS parts to support new kms_library configuration stanza. ( #13132 )
...
- Add a new top level configuration stanza named kms_library with
Vault's SharedConfig struct
2021-11-12 13:39:22 -05:00
Hridoy Roy
1fc0a699d9
Docs for counting non-entity tokens in the Activity Log ( #13007 )
...
* docs for counting tokens without entities
* Update website/content/docs/concepts/client-count.mdx
Co-authored-by: swayne275 <swayne275@gmail.com>
* remove parens in docs
* Update website/content/docs/concepts/client-count.mdx
Co-authored-by: Nick Cabatoff <ncabatoff@hashicorp.com>
* Update website/content/docs/concepts/client-count.mdx
Co-authored-by: Nick Cabatoff <ncabatoff@hashicorp.com>
* update documentation to be consistent with the non-entity token terminology
* Update website/content/docs/concepts/client-count.mdx
Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>
* Update website/content/docs/concepts/client-count.mdx
Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>
* add line about client ids to the api docs
* syntax and grammar
Co-authored-by: swayne275 <swayne275@gmail.com>
Co-authored-by: Nick Cabatoff <ncabatoff@hashicorp.com>
Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>
2021-11-12 09:59:50 -08:00
VAL
e18f180609
GCP and Azure Login methods for Go client library ( #13022 )
...
* Add native Login method for GCP auth backend
* Add native Login method for Azure auth backend
* Add changelog entry
* Use official azure library Environment struct rather than passing string, add timeouts
* Use v1.3.0 which now has interface definition
* Don't throw away error and close resp body
* Back to WithResource so we can support non-Azure URLs for aud
2021-11-12 09:32:05 -08:00
Alexander Scheel
cd213f5fca
Restrict ECDSA/NIST P-Curve hash function sizes for cert signing ( #12872 )
...
* Restrict ECDSA signatures with NIST P-Curve hashes
When using an ECDSA signature with a NIST P-Curve, we should follow
recommendations from BIS (Section 4.2) and Mozilla's root store policy
(section 5.1.2) to ensure that arbitrary selection of signature_bits
does not exceed what the curve is capable of signing.
Related: #11245
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Switch to certutil.ValidateKeyTypeSignatureLength(...)
Replaces previous calls to certutil.ValidateKeyTypeLength(...) and
certutil.ValidateSignatureLength(...) with a single call, allowing for
curve<->hash validation.
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Switch to autodetection of signature_bits
This enables detection of whether the caller manually specified a value
for signature_bits or not; when not manually specified, we can provision
a value that complies with new NIST P-Curve policy.
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Select hash function length automatically
Due to our change in behavior (to default to -1 as the value to
signature_bits to allow for automatic hash selection), switch
ValidateKeyTypeSignatureLength(...) to accept a pointer to hashBits and
provision it with valid default values.
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Prevent invalid Curve size lookups
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Switch from -1 to 0 as default SignatureBits
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Add changelog entry
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2021-11-12 12:18:38 -05:00
claire bontempo
7f67aa28bf
UI/Custom empty state messages for transit and transform ( #13090 )
...
* customizes empty state messages for transit and transform
* adds changelog
* clarifies key name
2021-11-11 16:53:53 -08:00
swayne275
12faa5227b
define batch token interaction with lease count quota ( #13127 )
2021-11-11 16:09:44 -07:00
Yoko Hyakuna
9ae3e5cdd6
Add troubleshooting guide ( #13124 )
...
* Redirect /guies to https://learn.hashicorp.com
* Add link to Troubleshooting guide
2021-11-11 13:38:10 -08:00
vinay-gopalan
762133a101
update changelog/12621.txt ( #13117 )
2021-11-10 16:39:27 -08:00
skhilar
7adacfaf03
Added notAfter and support Y10K expiry for IEEE 802.1AR-2018 ( #12795 )
2021-11-10 19:09:06 -05:00
vinay-gopalan
396f25e42c
Update CHANGELOG.md
entry for #12621 ( #13114 )
2021-11-10 14:52:31 -08:00
Arnav Palnitkar
45058952b2
Add message while adding Oracle db connection ( #13087 )
...
* Add message while adding Oracle db connection
- Since UI currently doesn't have support for custom plugin names,
inform user to use the default plugin name for oracle
* Updated warning message
* Updated message
2021-11-10 14:20:36 -08:00
Chelsea Shaw
843afedf45
UI/OIDC authz flow tests ( #13106 )
2021-11-10 15:19:40 -06:00
Scott Miller
10270b6985
Add a periodic test of the autoseal to detect loss of connectivity. ( #13078 )
...
* Add a periodic test of the autoseal to detect loss of connectivity
* Keep the logic adjacent to autoseal
* imports
* typo, plus unnecessary constant time compare
* changelog
* pr feedback
* More feedback
* Add locking and a unit test
* unnecessary
* Add timeouts to encrypt/decrypt operations, capture activeContext before starting loop
* Add a block scope for the timeout
* copy/paste ftl
* Refactor to use two timeouts, and cleanup the repetitive failure code
* Readd 0ing gauge
* use millis
* Invert the unit test logic
2021-11-10 14:46:07 -06:00
John-Michael Faircloth
e6ffaaf835
OIDC: return full issuer uri on read provider ( #13058 )
...
* return full issuer uri on read provider
* remove err check
* simplify full issuer logic
2021-11-10 12:35:31 -06:00
Loann Le
6a5fc75ff5
fixed link error ( #13103 )
2021-11-10 09:38:02 -08:00
Jonas-Taha El Sesiy
811c7a8133
Add PutAutoPilotRaftConfiguration to api ( #12428 )
2021-11-10 12:10:15 -05:00
VAL
558672797e
Remove reference to local api module, use v1.3.0 ( #13105 )
2021-11-09 14:49:46 -08:00
swayne275
0604c12f27
Namespace API Lock docs ( #13064 )
...
* add api lock doc
* add docs nav data
* Update website/content/api-docs/system/namespaces.mdx
Co-authored-by: Chris Capurso <christopher.capurso@gmail.com>
* update command doc
* clarify locked http status code
* add example exempt path
* further exempt clarification
* link api locked response
* add x-vault-namespace api example
* Update website/content/docs/concepts/namespace-api-lock.mdx
Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>
* review suggestions
* few other small tweaks
Co-authored-by: Chris Capurso <christopher.capurso@gmail.com>
Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>
2021-11-09 15:43:17 -07:00
Jordan Reimer
7c7d626420
Raft peer removal bug ( #13098 )
...
* fixes issue removing raft peer via cli not reflected in UI until refresh
* adds changelog entry
2021-11-09 15:05:25 -07:00
Chelsea Shaw
b4129a1591
UI: Show detailed error response on failed secret-engine list call ( #13035 )
2021-11-09 14:42:46 -06:00
swayne275
e137045050
Vault 936: use core.activeContext in ActivityLog ( #13083 )
...
* update activity log to use core's activeContext for cleaner worker termination
* update tests to use core activeContext instead of generic context
* pass context around instead
* revert context change
* undo test context changes
* change worker context
* accidentally undid context for fcn signature changes
2021-11-09 11:47:39 -07:00
Steven Clark
3bfa4fa267
Add missing changelog for pr #13093 ( #13095 )
2021-11-09 11:03:59 -05:00
Steven Clark
8c50afc07c
Address a data race issue within identity_store_util::processLocalAlias ( #13093 )
...
- When loading an existing alias within processLocalAlias we aren't
cloning the object from the memory store. There seems to be a data
race within the function when calling entity.UpsertAlias and
a concurrent invalidation routine.
==================
WARNING: DATA RACE
Read at 0x00c00bd03d08 by goroutine 94:
google.golang.org/protobuf/internal/impl.pointer.Elem()
/go/pkg/mod/google.golang.org/protobuf@v1.27.1/internal/impl/pointer_unsafe.go:118 +0x2b3
google.golang.org/protobuf/internal/impl.(*MessageInfo).sizePointerSlow()
/go/pkg/mod/google.golang.org/protobuf@v1.27.1/internal/impl/encode.go:76 +0x265
google.golang.org/protobuf/internal/impl.(*MessageInfo).sizePointer()
/go/pkg/mod/google.golang.org/protobuf@v1.27.1/internal/impl/encode.go:56 +0x12a
google.golang.org/protobuf/internal/impl.(*MessageInfo).size()
/go/pkg/mod/google.golang.org/protobuf@v1.27.1/internal/impl/encode.go:40 +0x95
google.golang.org/protobuf/internal/impl.(*MessageInfo).size-fm()
/go/pkg/mod/google.golang.org/protobuf@v1.27.1/internal/impl/encode.go:33 +0x6c
google.golang.org/protobuf/proto.MarshalOptions.marshal()
/go/pkg/mod/google.golang.org/protobuf@v1.27.1/proto/encode.go:153 +0x1f3
google.golang.org/protobuf/proto.MarshalOptions.MarshalAppend()
/go/pkg/mod/google.golang.org/protobuf@v1.27.1/proto/encode.go:122 +0xa5
github.com/golang/protobuf/proto.marshalAppend()
/go/pkg/mod/github.com/golang/protobuf@v1.5.2/proto/wire.go:40 +0xe4
github.com/golang/protobuf/proto.Marshal()
/go/pkg/mod/github.com/golang/protobuf@v1.5.2/proto/wire.go:23 +0x64
github.com/hashicorp/vault/helper/identity.(*Entity).Clone()
/go/src/github.com/hashicorp/vault/helper/identity/identity.go:34 +0x150
github.com/hashicorp/vault/vault.(*IdentityStore).MemDBEntitiesByBucketKeyInTxn()
/go/src/github.com/hashicorp/vault/vault/identity_store_util.go:1214 +0x306
github.com/hashicorp/vault/vault.(*IdentityStore).Invalidate()
/go/src/github.com/hashicorp/vault/vault/identity_store.go:216 +0xd6c
github.com/hashicorp/vault/vault.(*IdentityStore).Invalidate-fm()
/go/src/github.com/hashicorp/vault/vault/identity_store.go:160 +0x6d
github.com/hashicorp/vault/sdk/framework.(*Backend).InvalidateKey()
/go/src/github.com/hashicorp/vault/sdk/framework/backend.go:347 +0x8a
github.com/hashicorp/vault/vault.(*IdentityStore).InvalidateKey()
<autogenerated>:1 +0x7d
github.com/hashicorp/vault/vault.(*Core).asyncInvalidateKey()
/go/src/github.com/hashicorp/vault/vault/replication_invalidation_ent.go:58 +0x390
github.com/hashicorp/vault/vault.(*Core).asyncInvalidateHandler()
/go/src/github.com/hashicorp/vault/vault/replication_invalidation_ent.go:71 +0x9b
github.com/hashicorp/vault/vault.startReplicationEnt·dwrap·453()
/go/src/github.com/hashicorp/vault/vault/replication_util_ent.go:331 +0x71
Previous write at 0x00c00bd03d08 by goroutine 52:
github.com/hashicorp/vault/helper/identity.(*Entity).UpsertAlias()
/go/src/github.com/hashicorp/vault/helper/identity/identity.go:55 +0x271
github.com/hashicorp/vault/vault.(*IdentityStore).processLocalAlias()
/go/src/github.com/hashicorp/vault/vault/identity_store_util.go:720 +0x672
github.com/hashicorp/vault/vault.possiblyForwardEntityCreation()
/go/src/github.com/hashicorp/vault/vault/request_handling_util_ent.go:230 +0x286
github.com/hashicorp/vault/vault.(*Core).handleLoginRequest()
/go/src/github.com/hashicorp/vault/vault/request_handling.go:1345 +0x234a
github.com/hashicorp/vault/vault.(*Core).handleCancelableRequest()
/go/src/github.com/hashicorp/vault/vault/request_handling.go:607 +0x1a11
github.com/hashicorp/vault/vault.(*Core).switchedLockHandleRequest()
/go/src/github.com/hashicorp/vault/vault/request_handling.go:442 +0x5b5
github.com/hashicorp/vault/vault.(*Core).HandleRequest()
/go/src/github.com/hashicorp/vault/vault/request_handling.go:408 +0xf2
github.com/hashicorp/vault/http.request()
/go/src/github.com/hashicorp/vault/http/handler.go:953 +0xb1
github.com/hashicorp/vault/http.handleLogicalInternal.func1()
/go/src/github.com/hashicorp/vault/http/logical.go:341 +0xca
net/http.HandlerFunc.ServeHTTP()
/usr/local/go/src/net/http/server.go:2046 +0x4d
github.com/hashicorp/vault/http.handleRequestForwarding.func1()
/go/src/github.com/hashicorp/vault/http/handler.go:887 +0x4eb
net/http.HandlerFunc.ServeHTTP()
/usr/local/go/src/net/http/server.go:2046 +0x4d
net/http.(*ServeMux).ServeHTTP()
/usr/local/go/src/net/http/server.go:2424 +0xc5
github.com/hashicorp/vault/http.wrapHelpHandler.func1()
/go/src/github.com/hashicorp/vault/http/help.go:23 +0x281
net/http.HandlerFunc.ServeHTTP()
/usr/local/go/src/net/http/server.go:2046 +0x4d
github.com/hashicorp/vault/http.wrapCORSHandler.func1()
/go/src/github.com/hashicorp/vault/http/cors.go:29 +0xb0e
net/http.HandlerFunc.ServeHTTP()
/usr/local/go/src/net/http/server.go:2046 +0x4d
github.com/hashicorp/vault/http.rateLimitQuotaWrapping.func1()
/go/src/github.com/hashicorp/vault/http/util.go:97 +0xf28
net/http.HandlerFunc.ServeHTTP()
/usr/local/go/src/net/http/server.go:2046 +0x4d
github.com/hashicorp/vault/http.wrapDRSecondaryHandler.func1()
/go/src/github.com/hashicorp/vault/http/util_ent.go:81 +0x7e3
net/http.HandlerFunc.ServeHTTP()
/usr/local/go/src/net/http/server.go:2046 +0x4d
github.com/hashicorp/vault/http.wrapGenericHandler.func1()
/go/src/github.com/hashicorp/vault/http/handler.go:465 +0x1843
net/http.HandlerFunc.ServeHTTP()
/usr/local/go/src/net/http/server.go:2046 +0x4d
github.com/hashicorp/go-cleanhttp.PrintablePathCheckHandler.func1()
/go/pkg/mod/github.com/hashicorp/go-cleanhttp@v0.5.2/handlers.go:42 +0xc1
net/http.HandlerFunc.ServeHTTP()
/usr/local/go/src/net/http/server.go:2046 +0x4d
net/http.serverHandler.ServeHTTP()
/usr/local/go/src/net/http/server.go:2878 +0x89a
net/http.initALPNRequest.ServeHTTP()
/usr/local/go/src/net/http/server.go:3479 +0x34d
net/http.(*initALPNRequest).ServeHTTP()
<autogenerated>:1 +0x8f
net/http.Handler.ServeHTTP-fm()
/usr/local/go/src/net/http/server.go:87 +0x75
net/http.(*http2serverConn).runHandler()
/usr/local/go/src/net/http/h2_bundle.go:5832 +0xdd
net/http.(*http2serverConn).processHeaders·dwrap·31()
/usr/local/go/src/net/http/h2_bundle.go:5562 +0x64
2021-11-09 10:00:26 -05:00
Jim Kalafut
b6f1f1de64
Update CODEOWNERS ( #13091 )
2021-11-09 06:02:54 -08:00
Hridoy Roy
e7e881c559
Port: Allow Routing to Partial Monthly Client Count From Namespaces ( #13086 )
...
* add function for routing activity log client counts to ent namespaces
* changelog
2021-11-08 15:38:35 -08:00
Jordan Reimer
e733c78ff6
Secrets header version badge ( #13015 )
...
* updates secret list header to display badge for all versions
* adds changelog entry
* updates secret list header to only show badge for kv and generic engine types
* adds secret-engine mirage factory
* adds test helper for pushing serialized mirage data into store and returning ember data models
* adds secret engine type version badge display test
* updates mirage application serializer to return singular type key
2021-11-08 14:29:00 -07:00
Matt Schultz
6fadf30a79
Remove TLS prefer server cipher suites configuration option due to deprecation in go 1.17. ( #13084 )
2021-11-08 14:31:59 -06:00
Nick Cabatoff
d89c7b3d7e
Add a little test helper for polling ( #13082 )
2021-11-08 15:24:06 -05:00
Rémi Lapeyre
ae0b5e41e0
Add read support to sys/mounts/:path ( #12792 )
...
* Add read support to sys/mounts/:path
Closes https://github.com/hashicorp/vault/issues/12349
* Add changelog entry
* Empty commit to trigger CI
* Empty commit to trigger CI
2021-11-08 10:32:01 -08:00
Daniel Nathan Gray
26711ab017
Documentation consistency GPG keys are PGP keys. ( #13073 )
...
* Consistency: GPG keys are PGP keys
* Consistency: GPG keys are PGP keys
* Consistency: GPG keys are PGP keys
* Consistency: GPG keys are PGP keys
* Consistency: GPG keys are PGP keys
* Consistency: s/GPG/PGP keys, use GPG's proper name
* Use GPG's proper name GnuPG
* Use GPG's proper name GnuPG
* Consistency: GPG keys are PGP keys
* Fix typo
2021-11-08 10:04:59 -08:00
Meggie
bb6ba32f65
Add note that monitor command may truncate logs ( #13079 )
...
* Add note that monitor command may truncate logs
* Apply suggestions from code review
Co-authored-by: Nick Cabatoff <ncabatoff@hashicorp.com>
Co-authored-by: Nick Cabatoff <ncabatoff@hashicorp.com>
2021-11-08 12:52:42 -05:00
Nick Cabatoff
40640ef43f
Fix errors logged on standbys when we try to write versions to storage ( #13042 )
2021-11-08 10:04:17 -05:00
Jim Kalafut
1b49591b53
Update changelog for 1.9.0-rc1 ( #13067 )
2021-11-05 13:25:54 -07:00
Steven Clark
687701d9a3
Attempt to fix the flaky TestDeleteUser/TestUpdateUser mssql tests ( #13071 )
...
- Add a 'Connect Timeout' query parameter to the test helper to set
a timeout value of 30 seconds in an attempt to address the following
failure we see at times in TestDeleteUser and TestUpdateUser
mssql_test.go:253: Failed to initialize: error verifying connection: TLS Handshake failed: cannot read handshake packet: EOF
2021-11-05 14:53:37 -04:00
Kevin Wang
3a882fad3a
chore: bump react-subnav
( #13039 )
2021-11-05 13:20:50 -04:00
Jason O'Donnell
16bc065c48
secrets/azure: add doc for rotate-root and AAD migration ( #13066 )
...
* secrets/azure: add doc for rotate-root and AAD migration
* Formatting
* Fix bad link, update warnings
2021-11-05 13:04:25 -04:00
Nick Cabatoff
734b46d150
Fix regression preventing non-docker tests from running. ( #13063 )
2021-11-05 10:41:29 -04:00