This project is mirrored from https://gitee.com/mirrors/nomad.git.
Pull mirroring failed .
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer.
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer.
- 14 Jun, 2022 31 commits
-
-
Charlie Voiselle authored
This PR splits SecureVariable into SecureVariableDecrypted and SecureVariableEncrypted in order to use the type system to help verify that cleartext secret material is not committed to file. * Make Encrypt function return KeyID * Split SecureVariable Co-authored-by:
Tim Gross <tgross@hashicorp.com>
-
Tim Gross authored
Split the flag options for the `secure-variables keyring` into their own subcommands. The gossip keyring CLI will be similarly refactored and the old version will be deprecated.
-
Phil Renaud authored
* Validation tests for secure variables form: duplicate path error * Validation for dot in key name * Defensive pattern on copy keyValues
-
Phil Renaud authored
* variable index header and deletion hook * Some visual improvements to edit header and back button * Mirage fixtures for variables * Deletion flow test * Account for disabled state of add-more button * Transition destination changes after design chat * Simplified parent folder path by adding to variable model * Lint cleanup * test update to reflect path redirect on delete * No longer have to re-traverse to a deleted var folder after deletion, tests updated
-
Tim Gross authored
In order to support implicit ACL policies for tasks to get their own secrets, each task would need to have its own ACL token. This would add extra raft overhead as well as new garbage collection jobs for cleaning up task-specific ACL tokens. Instead, Nomad will create a workload Identity Claim for each task. An Identity Claim is a JSON Web Token (JWT) signed by the server’s private key and attached to an Allocation at the time a plan is applied. The encoded JWT can be submitted as the X-Nomad-Token header to replace ACL token secret IDs for the RPCs that support identity claims. Whenever a key is is added to a server’s keyring, it will use the key as the seed for a Ed25519 public-private private keypair. That keypair will be used for signing the JWT and for verifying the JWT. This implementation is a ruthlessly minimal approach to support the secure variables feature. When a JWT is verified, the allocation ID will be checked against the Nomad state store, and non-existent or terminal allocation IDs will cause the validation to be rejected. This is sufficient to support the secure variables feature at launch without requiring implementation of a background process to renew soon-to-expire tokens.
-
Phil Renaud authored
* Notify a user if they try to make a variable with an existing path * Stylize error fade * Bugfix: if you click the dupe link to a variable you havent previously loaded, you lack its keyvalues * rename and typefix for duplicate path warning
-
Phil Renaud authored
* Disable path input when model is not new * isDisabled tests for secure variables path
-
Tim Gross authored
Co-authored-by:
Charlie Voiselle <464492+angrycub@users.noreply.github.com>
-
Charlie Voiselle authored
-
Tim Gross authored
Replication for the secure variables keyring. Because only key metadata is stored in raft, we need to distribute key material out-of-band from raft replication. A goroutine runs on each server and watches for changes to the `RootKeyMeta`. When a new key is received, attempt to fetch the key from the leader. If the leader doesn't have the key (which may happen if a key is rotated right before a leader transition), try to get the key from any peer.
-
Phil Renaud authored
* Recursive trie-building with variable paths * tree structure applied to new path routes and a new util class * Breadcrumbs for SV paths and prompt when nothing exists at a path * Lint and test cleanup * Pre-review cleanup * lintfix * Abstracted pathtree each-ins into a new component class * Path tree component styles * Types added and PR feedback addressed * Path tree to variable paths * Slightly simpler path QP mods * More pr feedback handling * Trim moved into a function on variable model * Traversal and compaction tests for PathTree * Trim Path tests * Variable-paths component tests * Lint fixup for tests
-
Tim Gross authored
Inactive and unused keys older than a threshold will be periodically garbage collected.
-
Tim Gross authored
After internal design review, we decided to remove exposing algorithm choice to the end-user for the initial release. We'll solve nonce rotation by forcing rotations automatically on key GC (in a core job, not included in this changeset). Default to AES-256 GCM for the following criteria: * faster implementation when hardware acceleration is available * FIPS compliant * implementation in pure go * post-quantum resistance Also fixed a bug in the decoding from keystore and switched to a harder-to-misuse encoding method.
-
Tim Gross authored
The core jobs to garbage collect unused keys and perform full key rotations will need to be able to query secure variables by key ID for efficiency. Add an index to the state store and associated query function and test.
-
Tim Gross authored
When a server becomes leader, it will check if there are any keys in the state store, and create one if there is not. The key metadata will be replicated via raft to all followers, who will then get the key material via key replication (not implemented in this changeset).
-
Phil Renaud authored
* variables.new initialized * Hacky but savey * Variable wildcard route and multiple creatable at a time * multiple KVs per variable * PR Prep cleanup and lintfix * Delog * Data mocking in mirage for variables * Linting fixes * Re-implement absent params * Adapter and model tests * Moves the path-as-id logic to a serializer instead of adapter * Classic to serializer and lint cleanup * Pluralized save button (#13140) * Autofocus modifier and better Add More button UX (#13145) * Secure Variables: show/hide functionality when adding new values (#13137) * Flight Icons added and show hide functionality * PR cleanup * Linting cleanup * Position of icon moved to the right of input * PR feedback addressed * Delete button and stylistic changes to show hide * Hmm, eslint doesnt like jsdoc-usage as only reason for import * More closely match the button styles and delete test * Simplified new.js model * Secure Variables: /variables/*path/edit route and functionality (#13170) * Variable edit page init * Significant change to where we house model methods * Lintfix * Edit a variable tests * Remove redundant tests * Asserts expected * Mirage factory updated to reflect model state
-
Charlie Voiselle authored
* Secure Variables: State Store * Secure Variables: FSM * Secure Variables: RPC * Secure Variables: HTTP API Co-authored-by:
Tim Gross <tgross@hashicorp.com>
-
Tim Gross authored
This changeset implements the keystore serialization/deserialization: * Adds a JSON serialization extension for the `RootKey` struct, along with a metadata stub. When we serialize RootKey to the on-disk keystore, we want to base64 encode the key material but also exclude any frequently-changing fields which are stored in raft. * Implements methods for loading/saving keys to the keystore. * Implements methods for restoring the whole keystore from disk. * Wires it all up with the `Keyring` RPC handlers and fixes up any fallout on tests.
-
Tim Gross authored
-
Tim Gross authored
Implement the upsert, list, delete, and rotate RPC handlers for the secure variables keyring. Operations on the keyring itself are still stubbed out.
-
Tim Gross authored
Implement the basic upsert, list, and delete operations for `RootKeyMeta` needed by the Keyring RPCs. This changeset also implements two convenience methods `RootKeyMetaByID` and `GetActiveRootKeyMeta` which are useful for testing but also will be needed to implement the rest of the RPCs.
-
Phil Renaud authored
* Route init * Bones of a mirage-mocked secure variables policy * Functinoing policy for list vars * Delog and transition on route * Basic guard test * Page guard tests for secure variables * Cleanup and unit tests for variables ability * Linter cleanup * Set expectations for test assertions * PR feedback addressed * Read label changed to View per suggestion
-
Charlie Voiselle authored
* Add SecureVariable mock * Add SecureVariableStub * Add SecureVariable Copy and Stub funcs
-
Tim Gross authored
Implement the core SecureVariable and RootKey structs in memdb, provide the minimal skeleton for FSM, and a dummy storage and keyring RPC endpoint.
-
Charlie Voiselle authored
-
Tim Gross authored
The changelog entry for #13340 indicated it was an improvement. But on discussion, it was determined that this was a workaround for a regression. Update the changelog to make this clear.
-
Luiz Aoqui authored
In addition to jobs, there are other objects in Nomad that have a specific format and can be provided to commands and API endpoints. This commit creates a new menu section to hold the specification for volumes and update the command pages to point to the new centralized definition. Redirecting the previous entries is not possible with `redirect.js` because they are done server-side and URL fragments are not accessible to detect a match. So we provide hidden anchors with a link to the new page to guide users towards the new documentation. Co-authored-by:
Tim Gross <tgross@hashicorp.com>
-
Luiz Aoqui authored
These flags were not being used because GNUmakefile overwrites them with another value. We also don't want to set `-s -w` since they remove information that is important for production debug. In other projects this variable is used to override the default `-dev` prerelease that is set even if `VersionPrerelease` is empty, but in Nomad this check is never actually done because this conditional in `version/version.go` is always false: ```go func GetVersion() *VersionInfo { // ... rel := VersionPrerelease // ... if GitDescribe == "" && rel == "" && VersionPrerelease != "" { rel = "dev" } // ... } ``` This seems like some leftover from a previous release process, but I decided the leave the code as is.
-
Luiz Aoqui authored
* website: fix redirects with fragments Vercel redirects don't support fragments in relative destination paths, so an absolute URL must be specified instead. * website: fix Vercel redirect documentation link
-
Tim Gross authored
-
Grant Griffiths authored
Signed-off-by:
Grant Griffiths <ggriffiths@purestorage.com>
-
- 13 Jun, 2022 1 commit
-
-
Michael Schurter authored
-
- 10 Jun, 2022 6 commits
-
-
Derek Strickland authored
* template: improve default language for max_stale and wait Co-authored-by:
Michael Schurter <mschurter@hashicorp.com>
-
Daniel Rossbach authored
-
Seth Hoenig authored
build: rearrange go path order on windows
-
Luiz Aoqui authored
-
Seth Hoenig authored
If PATH comes first, an older version of Go is used that cannot install dependencies that use features of newer versions of Go, which we just installed.
-
Raffaele Di Fazio authored
-
- 09 Jun, 2022 2 commits
-
-
Seth Hoenig authored
helpers: provide a few generic helper functions
-
Seth Hoenig authored
This PR deprecates some functions in favor of generic alternatives. The new functions are compatible only with Nomad v1.4+. The old functions (nor their use) should not be removed until Nomad v1.6+.
-