This project is mirrored from https://gitee.com/NQL886/vault.git.
Pull mirroring failed .
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer.
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer.
- 24 Feb, 2022 5 commits
-
-
Dave Rawks authored
* resolves The default schema used in the mysql backend is insufficient for KVv2 storage #14114 * increases column width of vault_key from 512 to 3072 in mysql physical backend * updates changelog
-
Lars Lehtonen authored
-
Chris Capurso authored
If directory is embeded using Go's embed package it should be present in git repository to avoid failures/erros messages in Go commands. Co-authored-by:
Henri Koski <henri.t.koski@gmail.com>
-
Alexander Scheel authored
We note that: - allow_bare_domains, allow_glob_domains, and allow_subdomains are all independent, - enforce_hostnames and allow_wildcard_certificates take precedence over allow_any_name, - We limit to RFC 6125 wildcards. - Clarify that both allow_bare_domains and allow_glob_domains will permit wildcard issuance in certain scenarios. Co-authored-by:
mickael-hc <86245626+mickael-hc@users.noreply.github.com> Co-authored-by:
Kit Haines <kit.haines@hashicorp.com> Signed-off-by:
Alexander Scheel <alex.scheel@hashicorp.com> Co-authored-by:
mickael-hc <86245626+mickael-hc@users.noreply.github.com> Co-authored-by:
Kit Haines <kit.haines@hashicorp.com>
-
Alexander Scheel authored
* Add new AllowWildcardCertificate field to PKI role This field allows the PKI role to control whether or not issuance of wildcard certificates are allowed. We default (both on migration and new role creation) to the less secure true value for backwards compatibility with existing Vault versions. Signed-off-by:
Alexander Scheel <alex.scheel@hashicorp.com> * Refactor sanitizedName to reducedName Per comment, this variable name was confusing during the reproduction and subsequent fix of the earlier vulnerability and associated bug report. Because the common name isn't necessarily _sanitized_ in any way (and indeed must be considered in relation to other parts or the whole), but portions of the entire name are removed, reducedName appears to make the most sense. Signed-off-by:
Alexander Scheel <alex.scheel@hashicorp.com> * Enforce AllowWildcardCertificates during issuance This commit adds the bulk of correctly validating wildcard certificate Common Names during issuance according to RFC 6125 Section 6.4.3 semantics. As part of this, support for RFC 2818-conforming wildcard certificates (wherein there are almost no restrictions on issuance) has been removed. Note that this flag does take precedence over AllowAnyName, giving a little more safety in wildcard issuance in this case. Signed-off-by:
Alexander Scheel <alex.scheel@hashicorp.com> * Update test cases to conform with RFC 6125 Test cases 19, 70+71, and 83+84 didn't conform with the RFC 6125, and so should've been rejected under strict conformance. For 70+71 and 83+84, we previously conditioned around the value of AllowSubdomains (allowing issuance when true), but they likely should've been rejected either way. Additionally, update the notes about globs matching wildcard certificates to notate this is indeed the case. Signed-off-by:
Alexander Scheel <alex.scheel@hashicorp.com> * Check AllowWildcardCertifciates in issuance tests This allows for regression tests to cover the new AllowWildcardCertificate conditional. We add additional test cases ensuring that wildcard issuance is properly forbidden in all relevant scenarios, while allowing the existing test cases to validate that wildcard status doesn't affect non-wildcard certificates. Signed-off-by:
Alexander Scheel <alex.scheel@hashicorp.com> * Add Wildcard allowance during signing operations When using sign-verbatim, sign-intermediate, or getting certificate generation parameters, set AllowWildcardCertificates to mirror existing policies. Signed-off-by:
Alexander Scheel <alex.scheel@hashicorp.com> * Add changelog entry Signed-off-by:
Alexander Scheel <alex.scheel@hashicorp.com>
-
- 23 Feb, 2022 18 commits
-
-
Jordan Reimer authored
-
Nick Cabatoff authored
Remove use of compressionutil from activitylog segments. We can leave it in for the precomputed queries since they're JSON, not protobuf. (#14239)
-
Joe Andaverde authored
* Set header content type instead of overwriting all headers * Add changelog file
-
Chris Capurso authored
* prevent int64 overflow for default_lease_ttl and max_lease_ttl * add changelog entry * wording change in changelog entry
-
Alexander Scheel authored
* Allow issuance of wildcard via glob match From Vault v1.8.0 onwards, we would incorrectly disallow issuance of a wildcard certificate when allow_glob_domain was enabled with a multi-part glob domain in allowed_domains (such as *.*.foo) when attempting to issue a wildcard for a subdomain (such as *.bar.foo). This fixes that by reverting an errant change in the case insensitivity patch. Here, when validating against a very powerful glob construct, we leave the wildcard prefix (*.) from the raw common_name element, to allow multi-part globs to match wildcard entries. It is important to note that "sanitizedName" is an incorrect variable naming here. Wildcard parsing (per RFC 6125 which supercedes RFC 2818) must be in the left-most segment of the domain, but we lack validation to ensure no internal wildcards exist. Additionally per item 3 of section 6.4.3 of RFC 6125, wildcards MAY be internal to a domain segment, in which case sanitizedName again leaves the wildcard in place. Resolves: #13530 Signed-off-by:
Alexander Scheel <alex.scheel@hashicorp.com> * Remove duplicate email address check As pointed out by Steven Clark (author of the removed conditional in 70012cd8 ), this is duplicate from the now-reintroduced comparison against name (versus the erroneous sanitizedName at the time of his commit). This is a reversion of the changes to builtin/logical/pki/cert_util.go, but keeping the additional valuable test cases. Co-authored-by:
Steven Clark <steven.clark@hashicorp.com> Signed-off-by:
Alexander Scheel <alex.scheel@hashicorp.com> * Add multi-dimensional PKI role issuance tests This commit introduces multi-dimensional testing of PKI secrets engine's role-based certificate issuance with the intent of preventing future regressions. Here, dimensions of testing include: - AllowedDomains to decide which domains are approved for issuance, - AllowBareDomains to decide if raw entries of AllowedDomains are permitted, - AllowGlobDomains to decide if glob patterns in AllowedDomains are parsed, - AllowSubdomains to decide if subdomains of AllowedDomains are permitted, - AllowLocalhost to decide if localhost identifiers are permitted, and - CommonName of the certificate to request. Signed-off-by:
Alexander Scheel <alex.scheel@hashicorp.com> * Add changelog entry Signed-off-by:
Alexander Scheel <alex.scheel@hashicorp.com> Co-authored-by:
Steven Clark <steven.clark@hashicorp.com>
-
Chelsea Shaw authored
* Fix incorrect validity modal on transit secrets engine * Add changelog
-
Nick Cabatoff authored
-
Austin Gebauer authored
* agent/azure: adds ability to use specific user assigned managed identity for auto auth * add changelog * change wording in error and docs * Update website/content/docs/agent/autoauth/methods/azure.mdx Co-authored-by:
Theron Voran <tvoran@users.noreply.github.com> * Update website/content/docs/agent/autoauth/methods/azure.mdx Co-authored-by:
Tom Proctor <tomhjp@users.noreply.github.com> * docs formatting Co-authored-by:
Theron Voran <tvoran@users.noreply.github.com> Co-authored-by:
Tom Proctor <tomhjp@users.noreply.github.com>
-
Chris Capurso authored
* make streamGaugesToSink batch size a const * attempt to fix for timeout failures for TestGauge_MaximumMeasurements
-
Vishal Nayak authored
-
Chelsea Shaw authored
* Format duration for display if editType ttl * Update ttl fields to default_ttl * Fix db tests * Add changelog
-
Nick Cabatoff authored
* Various changes to try to ensure that fewer goroutines survive after a test completes: * add Core.ShutdownWait that doesn't return until shutdown is done * create the usedCodes cache on seal and nil it out on pre-seal so that the finalizer kills the janitor goroutine * stop seal health checks on seal rather than wait for them to discover the active context is done * make sure all lease-loading goroutines are done before returning from restore * make uniquePoliciesGc discover closed quitCh immediately instead of only when the ticker fires * make sure all loading goroutines are done before returning from loadEntities, loadCachedEntitiesOfLocalAliases
-
Jordan Reimer authored
* unsets mirage handler ENV variable after mfa tests * reverts setupMirage in before test hook
-
Robert authored
* Clarify when service_registraion was introduced Resolves https://github.com/hashicorp/vault/issues/8768 Language is modeled after the nomad acl version limits > ~> Version information ACLs are only available on Nomad 0.7.0 and above. https://github.com/hashicorp/vault/blob/1e720054e580096b353d73bb9138f07e1cac2dd1/website/pages/docs/secrets/nomad/index.mdx * Update phrasing to clarify vault isn't rquired * rephrase * Rewording statements Co-authored-by:
Spencer Owen <owenspencer@gmail.com>
-
Tero Saarni authored
* Update github.com/prometheus/client_golang Signed-off-by:
Tero Saarni <tero.saarni@est.tech> * Added changelog entry.
-
Steven Clark authored
* Add documentation for managed key test sign API - Add the documentation for the new managed key api that allows operators to test the managed key configuration by going through a sign/verify workflow with some randomly generated data. * PR feedback
-
Theron Voran authored
State the path where the token can be found when injected with the agent-inject-token annotation.
-
Romain Aviolat authored
-
- 22 Feb, 2022 12 commits
-
-
Hridoy Roy authored
* update sdk in go mod for vault and api * revert sdk update for api as that requires bumping api
-
Hridoy Roy authored
* update prerelease version in sdk to be dev-1 * Update sdk/version/version_base.go Co-authored-by:
Meggie <meggie@hashicorp.com> Co-authored-by:
Meggie <meggie@hashicorp.com>
-
Nick Cabatoff authored
-
Angel Garbarino authored
-
Victor Rodriguez authored
* Check that all required fields in Transit API are present. * Check for missing plaintext/ciphertext in batched Transit operations.
-
mickael-hc authored
-
Steven Clark authored
* Add checks for other error types within the PKI plugin - The PKI plugin assumes the code it is calling always returns an error of type errutil.UserError or errutil.InternalError. While I believe so far this is still true, it would be easy to add a code path that just returns a generic error and we would completely ignore it. - This was found within some managed key testing where I forgot to wrap an error within one of the expected types * Add changelog
-
claire bontempo authored
* adds changelog for client counts work * capitalizes feature * delete old client count files * remove import from core.scss
-
Pratyoy Mukhopadhyay authored
* Update autoauth docs * Update website/content/docs/agent/autoauth/index.mdx Co-authored-by:
akshya96 <87045294+akshya96@users.noreply.github.com> Co-authored-by:
akshya96 <87045294+akshya96@users.noreply.github.com>
-
Austin Gebauer authored
-
Ben Ash authored
- ensure valid entity alias names created for projected volume tokens.
-
Wazery authored
-
- 21 Feb, 2022 1 commit
-
-
Victor Rodriguez authored
Add the hook needed to implement this functionality in vault-enterprise.
-
- 19 Feb, 2022 2 commits
-
-
Theron Voran authored
-
Jason O'Donnell authored
* secrets/openldap: fix panic from nil logger * changelog
-
- 18 Feb, 2022 2 commits
-
-
Alexander Scheel authored
* Allow OpenSSH-style key type identifiers To bring better parity with the changes of #14008, wherein we allowed OpenSSH-style key identifiers during generation. When specifying a list of allowed keys, validate against both OpenSSH-style key identifiers and the usual simplified names as well ("rsa" or "ecdsa"). Notably, the PKI secrets engine prefers "ec" over "ecdsa", so we permit both as well. Signed-off-by:
Alexander Scheel <alex.scheel@hashicorp.com> * Fix missing quote in docs
-
Pratyoy Mukhopadhyay authored
-