This project is mirrored from https://gitee.com/NQL886/vault.git.
Pull mirroring failed .
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer.
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer.
- 22 Feb, 2022 8 commits
-
-
Victor Rodriguez authored
* Check that all required fields in Transit API are present. * Check for missing plaintext/ciphertext in batched Transit operations.
-
mickael-hc authored
-
Steven Clark authored
* Add checks for other error types within the PKI plugin - The PKI plugin assumes the code it is calling always returns an error of type errutil.UserError or errutil.InternalError. While I believe so far this is still true, it would be easy to add a code path that just returns a generic error and we would completely ignore it. - This was found within some managed key testing where I forgot to wrap an error within one of the expected types * Add changelog
-
claire bontempo authored
* adds changelog for client counts work * capitalizes feature * delete old client count files * remove import from core.scss
-
Pratyoy Mukhopadhyay authored
* Update autoauth docs * Update website/content/docs/agent/autoauth/index.mdx Co-authored-by:
akshya96 <87045294+akshya96@users.noreply.github.com> Co-authored-by:
akshya96 <87045294+akshya96@users.noreply.github.com>
-
Austin Gebauer authored
-
Ben Ash authored
- ensure valid entity alias names created for projected volume tokens.
-
Wazery authored
-
- 21 Feb, 2022 1 commit
-
-
Victor Rodriguez authored
Add the hook needed to implement this functionality in vault-enterprise.
-
- 19 Feb, 2022 2 commits
-
-
Theron Voran authored
-
Jason O'Donnell authored
* secrets/openldap: fix panic from nil logger * changelog
-
- 18 Feb, 2022 18 commits
-
-
Alexander Scheel authored
* Allow OpenSSH-style key type identifiers To bring better parity with the changes of #14008, wherein we allowed OpenSSH-style key identifiers during generation. When specifying a list of allowed keys, validate against both OpenSSH-style key identifiers and the usual simplified names as well ("rsa" or "ecdsa"). Notably, the PKI secrets engine prefers "ec" over "ecdsa", so we permit both as well. Signed-off-by:
Alexander Scheel <alex.scheel@hashicorp.com> * Fix missing quote in docs
-
Pratyoy Mukhopadhyay authored
-
mickael-hc authored
The use of the `--privileged` [flag](https://docs.docker.com/engine/reference/commandline/run/#options) is not recommended, as it does not adhere to the principle of least privilege.
-
Vishal Nayak authored
-
Chris Capurso authored
-
Vishal Nayak authored
* Activity log breakdowns * s/path/namespace_path * Remove ent specific tests
-
Austin Gebauer authored
-
Chris Capurso authored
* go get plugin-secrets-kv@v0.11.0; go mod tidy * add HTTP-level tests for KV subkeys endpoint * check status in TestKV_Subkeys_CurrentVersion * some test cleanup
-
Pratyoy Mukhopadhyay authored
-
Pratyoy Mukhopadhyay authored
* Update plugin-portal.mdx (#13229) Add a Vault plugin to allow authentication via SSH certificates and public keys * oss changes Co-authored-by:
Wim <wim@42.be>
-
Alexander Scheel authored
* Explicitly call out SSH algorithm_signer default Related: #11608 Signed-off-by:
Alexander Scheel <alex.scheel@hashicorp.com> * Use rsa-sha2-256 as the default SSH CA hash algo As mentioned in the OpenSSH 8.2 release notes, OpenSSH will no longer be accepting ssh-rsa signatures by default as these use the insecure SHA-1 algorithm. For roles in which an explicit signature type wasn't specified, we should change the default from SHA-1 to SHA-256 for security and compatibility with modern OpenSSH releases. See also: https://www.openssh.com/txt/release-8.2 Signed-off-by:
Alexander Scheel <alex.scheel@hashicorp.com> * Update docs mentioning new algorithm change Signed-off-by:
Alexander Scheel <alex.scheel@hashicorp.com> * Add changelog entry Signed-off-by:
Alexander Scheel <alex.scheel@hashicorp.com> * Fix missing parenthesis, clarify new default value * Add to side bar Signed-off-by:
Alexander Scheel <alex.scheel@hashicorp.com>
-
Jordan Reimer authored
-
Jason O'Donnell authored
* auth/azure: update to v0.9.3 * changelog * Rollback go-testing-interface * go mod tidy
-
swayne275 authored
* validate cipher length before decrypting * also protect decrypt from short cipher
-
swayne275 authored
* clean up == true cases * cleanup == false where it didn't seem to hurt readability
-
Calvin Leung Huang authored
* plugin/catalog: support plugin registration whe type is explicitly provided * don't use database type on plugin backend test; mock doesn't satisfy the DB interface * check multiplexing support from plugin directly on newPluginClient * do not return mutiplexed bool on catalog helper funcs
-
Calvin Leung Huang authored
* auth/ldap: add resp warning if userfilter doesn't consider userattr * add changelog entry
-
Rémi Lapeyre authored
This patch adds a new /agent/v1/metrics that will return metrics on the running Vault agent. Configuration is done using the same telemetry stanza as the Vault server. For now default runtime metrics are returned with a few additional ones specific to the agent: - `vault.agent.auth.failure` and `vault.agent.auth.success` to monitor the correct behavior of the auto auth mechanism - `vault.agent.proxy.success`, `vault.agent.proxy.client_error` and `vault.agent.proxy.error` to check the connection with the Vault server - `vault.agent.cache.hit` and `vault.agent.cache.miss` to monitor the cache Closes https://github.com/hashicorp/vault/issues/8649 Co-authored-by:
Theron Voran <tvoran@users.noreply.github.com>
-
- 17 Feb, 2022 11 commits
-
-
Angel Garbarino authored
* setup component test * fix * fixes * make more clear
-
Lars Lehtonen authored
-
Jordan Reimer authored
* adds development workflow to mirage config * adds mirage handler and factory for mfa workflow * adds mfa handling to auth service and cluster adapter * moves auth success logic from form to controller * adds mfa form component * shows delayed auth message for all methods * adds new code delay to mfa form * adds error views * fixes merge conflict * adds integration tests for mfa-form component * fixes auth tests * updates mfa response handling to align with backend * updates mfa-form to handle multiple methods and constraints * adds noDefault arg to Select component * updates mirage mfa handler to align with backend and adds generator for various mfa scenarios * adds tests * flaky test fix attempt * reverts test fix attempt * adds changelog entry * updates comments for todo items * removes faker from mfa mirage factory and handler * adds number to word helper * fixes tests
-
Jordan Reimer authored
* adds development workflow to mirage config * adds mirage handler and factory for mfa workflow * adds mfa handling to auth service and cluster adapter * moves auth success logic from form to controller * adds mfa form component * shows delayed auth message for all methods * adds new code delay to mfa form * adds error views * fixes merge conflict * adds integration tests for mfa-form component * fixes auth tests * updates mfa response handling to align with backend * updates mfa-form to handle multiple methods and constraints * adds noDefault arg to Select component * updates mirage mfa handler to align with backend and adds generator for various mfa scenarios * adds tests * flaky test fix attempt * reverts test fix attempt * adds changelog entry * updates comments for todo items * removes faker from mfa mirage factory and handler * adds number to word helper * fixes tests * format-ttl helper fix from main * adds back missing parenthesis to auth-form.md * changes localStorage to sessionStorage in auth page login method
-
Josh Black authored
* Login MFA * ENT OSS segragation (#14088) * Delete method id if not used in an MFA enforcement config (#14063) * Delete an MFA methodID only if it is not used by an MFA enforcement config * Fixing a bug: mfa/validate is an unauthenticated path, and goes through the handleLoginRequest path * adding use_passcode field to DUO config (#14059) * add changelog * preventing replay attack on MFA passcodes (#14056) * preventing replay attack on MFA passcodes * using %w instead of %s for error * Improve CLI command for login mfa (#14106) CLI prints a warning message indicating the login request needs to get validated * adding the validity period of a passcode to error messages (#14115) * PR feedback * duo to handle preventing passcode reuse Co-authored-by:
hghaf099 <83242695+hghaf099@users.noreply.github.com> Co-authored-by:
hamid ghaf <hamid@hashicorp.com>
-
Alexander Scheel authored
* Allow specifying multiple allowed SSH key lengths In the ssh secrets engine, only a single allowed key length was allowed for each algorithm type. However, many algorithms have multiple safe values (such as RSA and ECDSA); allowing a single role to have multiple values for a single algorithm is thus helpful. On creation or update, roles can now specify multiple types using a list or comma separated string of allowed values: allowed_user_key_lengths: map[string][]int{"rsa": []int{2048, 4096}} Signed-off-by:
Alexander Scheel <alex.scheel@hashicorp.com> * Add changelog entry Signed-off-by:
Alexander Scheel <alex.scheel@hashicorp.com> * Break out ssh upgrade logic into separate function Signed-off-by:
Alexander Scheel <alex.scheel@hashicorp.com> * Update parseutil for optional lists of integers go get -u github.com/hashicorp/go-secure-stdlib/parseutil go mod tidy Signed-off-by:
Alexander Scheel <alex.scheel@hashicorp.com> * Simplify parse logic using new parseutil The newly introduced parseutil.ParseIntSlice handles the more complicated optional int-like slice logic for us. Signed-off-by:
Alexander Scheel <alex.scheel@hashicorp.com>
-
John-Michael Faircloth authored
* feat: DB plugin multiplexing (#13734) * WIP: start from main and get a plugin runner from core * move MultiplexedClient map to plugin catalog - call sys.NewPluginClient from PluginFactory - updates to getPluginClient - thread through isMetadataMode * use go-plugin ClientProtocol interface - call sys.NewPluginClient from dbplugin.NewPluginClient * move PluginSets to dbplugin package - export dbplugin HandshakeConfig - small refactor of PluginCatalog.getPluginClient * add removeMultiplexedClient; clean up on Close() - call client.Kill from plugin catalog - set rpcClient when muxed client exists * add ID to dbplugin.DatabasePluginClient struct * only create one plugin process per plugin type * update NewPluginClient to return connection ID to sdk - wrap grpc.ClientConn so we can inject the ID into context - get ID from context on grpc server * add v6 multiplexing protocol version * WIP: backwards compat for db plugins * Ensure locking on plugin catalog access - Create public GetPluginClient method for plugin catalog - rename postgres db plugin * use the New constructor for db plugins * grpc server: use write lock for Close and rlock for CRUD * cleanup MultiplexedClients on Close * remove TODO * fix multiplexing regression with grpc server connection * cleanup grpc server instances on close * embed ClientProtocol in Multiplexer interface * use PluginClientConfig arg to make NewPluginClient plugin type agnostic * create a new plugin process for non-muxed plugins * feat: plugin multiplexing: handle plugin client cleanup (#13896) * use closure for plugin client cleanup * log and return errors; add comments * move rpcClient wrapping to core for ID injection * refactor core plugin client and sdk * remove unused ID method * refactor and only wrap clientConn on multiplexed plugins * rename structs and do not export types * Slight refactor of system view interface * Revert "Slight refactor of system view interface" This reverts commit 73d420e5 . * Revert "Revert "Slight refactor of system view interface"" This reverts commit f75527008a1db06d04a23e04c3059674be8adb5f. * only provide pluginRunner arg to the internal newPluginClient method * embed ClientProtocol in pluginClient and name logger * Add back MLock support * remove enableMlock arg from setupPluginCatalog * rename plugin util interface to PluginClient Co-authored-by:
Brian Kassouf <bkassouf@hashicorp.com> * feature: multiplexing: fix unit tests (#14007) * fix grpc_server tests and add coverage * update run_config tests * add happy path test case for grpc_server ID from context * update test helpers * feat: multiplexing: handle v5 plugin compiled with new sdk * add mux supported flag and increase test coverage * set multiplexingSupport field in plugin server * remove multiplexingSupport field in sdk * revert postgres to non-multiplexed * add comments on grpc server fields * use pointer receiver on grpc server methods * add changelog * use pointer for grpcserver instance * Use a gRPC server to determine if a plugin should be multiplexed * Apply suggestions from code review Co-authored-by:
Brian Kassouf <briankassouf@users.noreply.github.com> * add lock to removePluginClient * add multiplexingSupport field to externalPlugin struct * do not send nil to grpc MultiplexingSupport * check err before logging * handle locking scenario for cleanupFunc * allow ServeConfigMultiplex to dispense v5 plugin * reposition structs, add err check and comments * add comment on locking for cleanupExternalPlugin * feature: multiplexing: handle error plugin shutdown Co-authored-by:
Brian Kassouf <bkassouf@hashicorp.com> Co-authored-by:
Brian Kassouf <briankassouf@users.noreply.github.com>
-
Jordan Reimer authored
This reverts commit 5f17953b.
-
Austin Gebauer authored
-
Hridoy Roy authored
* port SSCT OSS * port header hmac key to ent and generate token proto without make command * remove extra nil check in request handling * add changelog * add comment to router.go * change test var to use length constants * remove local index is 0 check and extra defer which can be removed after use of ExternalID
-
Alexander Scheel authored
* Update repository links to point to main Signed-off-by:
Alexander Scheel <alex.scheel@hashicorp.com> * Fix broken link in relatedtools.mdx Co-authored-by:
Steven Clark <steven.clark@hashicorp.com> Co-authored-by:
Steven Clark <steven.clark@hashicorp.com>
-