Jordan Reimer
f86b12c68d
updates kubernetes host form field description ( #19113 )
2023-02-09 16:16:24 -07:00
Austin Gebauer
98b8f5e126
upgrade vault-plugin-database-redis to v0.2.0 ( #19112 )
2023-02-09 14:39:15 -08:00
John-Michael Faircloth
3d79a13976
fix: upgrade vault-plugin-secrets-mongodbatlas to v0.9.1 ( #19111 )
...
* fix: upgrade vault-plugin-secrets-mongodbatlas to v0.9.1
* add changelog
* Update changelog/19111.txt
Co-authored-by: Max Coulombe <109547106+maxcoulombe@users.noreply.github.com>
* use correct plugin type in changelog
---------
Co-authored-by: Max Coulombe <109547106+maxcoulombe@users.noreply.github.com>
2023-02-09 15:55:42 -06:00
Christopher Swenson
7d3d404ee2
events: Add websockets and command ( #19057 )
...
Also updates the event receieved to include a timestamp.
Websockets support both JSON and protobuf binary formats.
This can be used by either `wscat` or the new
`vault events subscribe`:
e.g.,
```sh
$ wscat -H "X-Vault-Token: $(vault print token)" --connect ws://127.0.0.1:8200/v1/sys/events/subscribe/abc?json=true
{"event":{"id":"5c5c8c83-bf43-7da5-fe88-fc3cac814b2e", "note":"testing"}, "eventType":"abc", "timestamp":"2023-02-07T18:40:50.598408Z"}
...
```
and
```sh
$ vault events subscribe abc
{"event":{"id":"5c5c8c83-bf43-7da5-fe88-fc3cac814b2e", "note":"testing"}, "eventType":"abc", "timestamp":"2023-02-07T18:40:50.598408Z"}
...
```
Co-authored-by: Tom Proctor <tomhjp@users.noreply.github.com>
2023-02-09 13:18:58 -08:00
Tom Proctor
78d83c9136
Make experiments API authenticated ( #18966 )
2023-02-09 20:18:14 +00:00
Angel Garbarino
219d77ace8
fix ( #19110 )
2023-02-09 20:08:37 +00:00
Christopher Swenson
7949d10177
fix: upgrade vault-plugin-auth-centrify to v0.14.0 ( #19107 )
2023-02-09 11:15:00 -08:00
Austin Gebauer
84c4c12dd9
upgrade vault-plugin-secrets-openldap to v0.10.0 ( #19108 )
2023-02-09 10:37:58 -08:00
Angel Garbarino
39123773c6
Glimmerize alert-banner ( #19105 )
...
* glimmerize alert-banner
* remove conditional commented out
* add assert to require type
* add assert for if message type not included
* amend alert-inline test
2023-02-09 18:25:16 +00:00
Scott Miller
78522ed923
Update specific wrappers to v2.0.7 ( #19101 )
...
* Update go-kms-wrapping to v2.0.7
* Update specific wrappers to v2.0.7
* Attempt to fix aead
2023-02-09 12:19:50 -06:00
Michael Dempsey
1582b743aa
Add default to allowed values for algorithm_signer ( #17894 )
...
* Add default to allowed values for algorithm_signer
* Add possible values for algorithm signer in ui
2023-02-09 13:03:53 -05:00
Tom Proctor
b24e3cc6b0
Bump go-plugin version 1.4.5->1.4.8 ( #19100 )
2023-02-09 17:24:55 +00:00
Kianna
fcf4b0092a
UI: VAULT-13419 Remove flash message for form errors and use MessageError instead ( #19095 )
...
* Remove flash message for form errors and use MessageError instead
* Add tests
* Use errorMessage instead
2023-02-09 09:07:52 -08:00
mickael-hc
67f7c470ec
update diagnose command to no longer use docker ( #19102 )
...
docker dependency should no longer be included in the binary
2023-02-09 11:59:46 -05:00
Theron Voran
892ad3ebf0
auth/cf: update plugin to v0.14.0 ( #19098 )
2023-02-09 08:40:51 -08:00
Steven Clark
5329b92793
Stop using title capitalization for PKI help ( #19104 )
...
- Match the existing vault kv capitalization scheme for Synopsis help of each sub-command.
- A few small tweaks as well to the messages text in a few cases
2023-02-09 16:40:26 +00:00
Jordan Reimer
73e0a9fc4a
adds validation to kubernetes config form ( #19097 )
2023-02-09 09:38:39 -07:00
Jordan Reimer
bc5a598d70
Kubernetes config state updates ( #19074 )
...
* hides roles toolbar actions when k8s is not configured
* adds error page component to core addon
* moves fetch-config to decorator
* updates kubernetes prompt config logic
* adds kubernetes error route
* fixes tests
* adds error handling for kubernetes roles list view
* removes unneeded arg to withConfig decorator
2023-02-09 09:18:02 -07:00
Michael Anthony
074312dde2
Move env var declaration to called workflow ( #19085 )
2023-02-09 09:17:33 -07:00
John-Michael Faircloth
34fd57ac08
test/plugin: test external plugin workflows ( #19090 )
...
* test/plugin: test external plugin workflows
* update secrets engine test
2023-02-09 10:16:16 -06:00
Steven Clark
720ab09feb
Add a comment around why we are grabbing a lock to update an atomic boolean ( #19087 )
2023-02-09 09:12:37 -05:00
Milena Zlaticanin
b6c5d07c5e
Azure Auth - rotate-root documentation ( #18780 )
...
* add documentation for rotate root
* commit suggestions
* move api permissions section
2023-02-08 18:14:28 -07:00
Austin Gebauer
40063640fe
upgrade vault-plugin-secrets-azure to v0.15.0 ( #19096 )
...
* upgrade vault-plugin-secrets-azure to v0.15.0
* adds changelog
2023-02-08 23:54:02 +00:00
Christopher Swenson
8e24415a51
fix: upgrade vault-plugin-auth-oci to v0.13.1 ( #19088 )
2023-02-08 15:36:42 -08:00
Jaymala
af957e7c9c
Add Vault log level support ( #19083 )
...
Signed-off-by: Jaymala Sinha <jaymala@hashicorp.com>
2023-02-08 17:41:16 -05:00
claire bontempo
e634b295eb
small copy changes, add comment ( #19078 )
2023-02-08 15:29:27 -07:00
vinay-gopalan
8927ab0911
upgrade vault-plugin-auth-azure to v0.13.0 ( #19077 )
2023-02-08 14:15:48 -08:00
Chelsea Shaw
1ec10bccd3
UI: Fix OIDC login in fullscreen ( #19071 )
2023-02-08 14:32:57 -06:00
Austin Gebauer
e04a3d21a1
upgrade vault-plugin-auth-jwt to v0.15.0 ( #19076 )
...
* upgrade vault-plugin-auth-jwt to v0.15.0
* adds changelog
2023-02-08 12:29:48 -08:00
Jordan Reimer
c49fb420f1
fixes mount backend success message ( #19072 )
2023-02-08 18:39:53 +00:00
Kianna
c1a337269f
UI: VAULT-13135 Add copyable issuer id row to issuer details ( #19054 )
...
* VAULT-13135 Add copyable issuer id row to issuer details
* Fix failing test
2023-02-08 09:38:30 -08:00
Nick Cabatoff
ec2af04ec6
Remove the last vestiges of sdk/version. ( #19068 )
2023-02-08 12:30:27 -05:00
Chelsea Shaw
e4eb9e5376
UI: PKI Clean up dirty model on leave ( #19058 )
2023-02-08 16:42:02 +00:00
Kianna
432e2d5c3d
UI: VAULT-13128 Add inline error to generate cert form ( #19035 )
...
* Add inline error to generate cert form
* Add tests
* Address feedback!
2023-02-08 08:37:54 -08:00
Steven Clark
a4aee2fc95
Revert URL encoding OCSP GET fix #18938 ( #19037 )
...
- This fix was incorrect as now the tests and program are double
URL encoding the OCSP GET requests, so the base64 + characters
when using Vault proper are becoming space characters.
2023-02-08 11:24:26 -05:00
Steven Clark
e599068323
Add OCSP GET known issue ( #19066 )
2023-02-08 15:06:44 +00:00
Max Coulombe
d9a2f33b69
update vault-plugin-secrets-kv to v0.14.0 ( #19056 )
...
* update vault-plugin-secrets-kv to v0.14.0
* + added changelog
2023-02-08 09:48:46 -05:00
Tom Crayford
532f4ab60a
Docs: Remove duplicated, outdated raft information ( #11620 )
...
Co-authored-by: Mehdi Ahmadi <aphorise@gmail.com>
2023-02-08 13:37:54 +00:00
Theron Voran
79d87b415b
secrets/gcpkms: upgrade to v0.14.0 ( #19063 )
2023-02-07 18:30:53 -08:00
Robert
d52149ed60
secrets/ad: update plugin version ( #19061 )
...
* Update ad secrets plugin version
2023-02-07 20:06:53 -06:00
Robert
a595dbd072
secrets/terraform: update plugin version ( #19059 )
2023-02-07 20:04:03 -06:00
Jordan Reimer
65c0f39282
updates k8s changelog entry to feature format ( #19062 )
2023-02-07 23:38:39 +00:00
John-Michael Faircloth
85438435c4
fix: upgrade vault-plugin-auth-kerberos to v0.9.0 ( #19060 )
2023-02-07 17:07:09 -06:00
Meggie
e286654a84
changelog++
...
The 1.13 preview
2023-02-07 17:40:39 -05:00
Max Coulombe
f28e973a7d
fix: upgrade vault-plugin-database-elasticsearch to v0.13.0 ( #19050 )
2023-02-07 17:11:44 -05:00
Jordan Reimer
4371face65
Wrapped token login bug ( #19036 )
...
* fixes issue logging in with wrapped_token via logout route when not logged in
* adds changelog entry
* fixes cluster route mixin test
2023-02-07 14:22:22 -07:00
Max Coulombe
788c4aff67
fix: upgrade vault-plugin-auth-gcp to v0.15.0 ( #19049 )
2023-02-07 16:12:32 -05:00
Max Coulombe
3bce13e5fc
upgrade vault-plugin-database-redis-elasticache to v0.2.0 ( #19044 )
...
* fix: upgrade vault-plugin-database-redis-elasticache to v0.2.0
* + added cahngelog
2023-02-07 16:11:52 -05:00
Alexander Scheel
06e950b40e
Fix documentation on CRL fixed version ( #19046 )
...
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-02-07 20:51:03 +00:00
claire bontempo
aef0296472
UI: add error-handling and validation to pki cross-signing ( #19022 )
...
* return signed ca_chain if request fails, check for existing issuer name
* update docs
* add error border class to input
2023-02-07 12:09:17 -08:00