This project is mirrored from https://gitee.com/NQL886/vault.git.
Pull mirroring failed .
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer.
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer.
- 02 Mar, 2022 1 commit
-
-
Chelsea Shaw authored
* update ci.hcl to remove 1.6.x and add in 1.10.x (#14310) * Fix autoseal health check race by passing metrics sink in CoreConfig (#14196) * Add empty state for current tab, config off, no read permissions on config Co-authored-by:
Hridoy Roy <roy@hashicorp.com> Co-authored-by:
Scott Miller <smiller@hashicorp.com>
-
- 01 Mar, 2022 1 commit
-
-
Claire Bontempo authored
-
- 28 Feb, 2022 4 commits
-
-
Claire Bontempo authored
-
Claire Bontempo authored
-
Claire Bontempo authored
-
Claire Bontempo authored
-
- 02 Mar, 2022 2 commits
-
-
hc-github-team-secure-vault-core authored
* backport of commit 250f95c92152276cc1d3519406316362b71e51de * backport of commit bce725ebd161949d69b89777227243162fac4595 * backport of commit 6271bc8eaa9e3b549f83e9707e7b2d4250bb6436 Co-authored-by:
Angel Garbarino <argarbarino@gmail.com>
-
hc-github-team-secure-vault-core authored
* backport of commit b9afbf71ce3649c0c0be7afecac16ea6724848b0 * backport of commit 805f9377a09aba33bb10a9d1163e6da59375f6c7 Co-authored-by:
Josh Black <raskchanky@gmail.com> Co-authored-by:
Josh Black <raskchanky@users.noreply.github.com>
-
- 01 Mar, 2022 1 commit
-
-
Hridoy Roy authored
* update build and ci to point to release branch * backport ssct oss optimizations
-
- 28 Feb, 2022 3 commits
-
-
Hridoy Roy authored
* update build and ci to point to release branch * update version prerelease for 1.10 branch to be rc1 in prep for release
-
Pratyoy Mukhopadhyay authored
-
Hridoy Roy authored
-
- 26 Feb, 2022 1 commit
-
-
Calvin Leung Huang authored
* deps: update plugin versions for Vault 1.10 * update vault-plugin-secrets-alicloud to v0.11.1 * downgrade alibaba-cloud-sdk-go * update auth-jwt and auth-gcp, revert non-plugin deps
-
- 25 Feb, 2022 15 commits
-
-
Robert authored
docs: consul secret engine improvements, database secrets engine disable_escaping parameter (#14260) * Update consul secrets engine docs and api-docs * Update databases secrets engine docs and api-docs
-
Josh Black authored
-
Steven Clark authored
* Address slow CI causing failures in TestRateLimitQuota_Allow_WithBlock - An attempt to fix CI runs that are extremely slow and the for loop runs across two BlockIntervals within the rate limit window of operation. - Increasing BlockInterval was looked at but the normal test times would be increased due to us also validating that we are releasing clients post BlockInterval. * Address TestRateLimitQuota_Allow_WithBlock slowness issue (take 2) - Increase the overall Interval value within the blocking test so that we should always be able to request at least 17 requests within the interval value. - Tested by changing the time.Sleep within the for loop to 20 from 2 and could see that within the response, coming back from the rlq.allow, that we were no longer being rate limited by going over the 1 second interval value per host. * Limit the number of active go routines in TestRateLimitQuota_Allow_WithBlock
-
Hridoy Roy authored
-
Hridoy Roy authored
-
Alexander Scheel authored
As pointed out internally, a lot of the API docs and FrameworkField descriptions of parameters were out of date. This syncs a number of them, updating their descriptions where relevant. Signed-off-by:
Alexander Scheel <alex.scheel@hashicorp.com>
-
Steven Clark authored
-
Jordan Reimer authored
* updates clients mirage handler activity endpoint * fixes issue removing auth method filter after clearing namespace filter
-
Chelsea Shaw authored
* Add UI feature allowing database role credential rotation * Only show the 'rotate credentials' option for static roles * rotate role path uses id for permissions * Add rotate credentials button to show page on static role * Mirage handlers for role for simple testing * Add changelog * lint rules * fix lint Co-authored-by:
Bartek Marczak <bartek.marczak@gmail.com>
-
Angel Garbarino authored
* the fix * add test coverage * add more coverage * spelling
-
Sarah Thompson authored
-
Jim Kalafut authored
-
Jim Kalafut authored
The operations are handled identically, but ~85% of the references were POST, and having a mix of PUT and POST was a source of questions. A subsequent commit will update the internal use of "PUT" such as by the API client and -output-curl-string.
-
Tom Proctor authored
* Add agent/v1/quit endpoint * Closes https://github.com/hashicorp/vault/issues/11089 * Agent quit API behind config setting * Normalise test config whitespace * Document config option Co-authored-by:
Rémi Lapeyre <remi.lapeyre@lenstra.fr> Co-authored-by:
Ben Ash <32777270+benashz@users.noreply.github.com>
-
Hridoy Roy authored
-
- 24 Feb, 2022 11 commits
-
-
Zachary Shilton authored
-
hghaf099 authored
* Login MFA * ENT OSS segragation (#14088) * Delete method id if not used in an MFA enforcement config (#14063) * Delete an MFA methodID only if it is not used by an MFA enforcement config * Fixing a bug: mfa/validate is an unauthenticated path, and goes through the handleLoginRequest path * adding use_passcode field to DUO config (#14059) * add changelog * preventing replay attack on MFA passcodes (#14056) * preventing replay attack on MFA passcodes * using %w instead of %s for error * Improve CLI command for login mfa (#14106) CLI prints a warning message indicating the login request needs to get validated * adding the validity period of a passcode to error messages (#14115) * interactive CLI for mfa login * minor fixes * bail if no input was inserted * change label name * interactive CLI when single methodID is returned from login request * minor fix * adding changelog * addressing feedback * a user wi...
-
Chelsea Shaw authored
-
John-Michael Faircloth authored
-
Hridoy Roy authored
* achieve parity with ent in core.go * add VAULT_DISABLE_LOCAL_AUTH_MOUNT_ENTITIES * parity in build.yml with ent but without adding the +ent * pass base version to ldflags Co-authored-by:
Kyle Penfound <kpenfound11@gmail.com>
-
Angel Garbarino authored
* some styling changes * a few more after design review * chart fix * address important * remove * translate hard copy
-
Dave Rawks authored
* resolves The default schema used in the mysql backend is insufficient for KVv2 storage #14114 * increases column width of vault_key from 512 to 3072 in mysql physical backend * updates changelog
-
Lars Lehtonen authored
-
Chris Capurso authored
If directory is embeded using Go's embed package it should be present in git repository to avoid failures/erros messages in Go commands. Co-authored-by:
Henri Koski <henri.t.koski@gmail.com>
-
Alexander Scheel authored
We note that: - allow_bare_domains, allow_glob_domains, and allow_subdomains are all independent, - enforce_hostnames and allow_wildcard_certificates take precedence over allow_any_name, - We limit to RFC 6125 wildcards. - Clarify that both allow_bare_domains and allow_glob_domains will permit wildcard issuance in certain scenarios. Co-authored-by:
mickael-hc <86245626+mickael-hc@users.noreply.github.com> Co-authored-by:
Kit Haines <kit.haines@hashicorp.com> Signed-off-by:
Alexander Scheel <alex.scheel@hashicorp.com> Co-authored-by:
mickael-hc <86245626+mickael-hc@users.noreply.github.com> Co-authored-by:
Kit Haines <kit.haines@hashicorp.com>
-
Alexander Scheel authored
* Add new AllowWildcardCertificate field to PKI role This field allows the PKI role to control whether or not issuance of wildcard certificates are allowed. We default (both on migration and new role creation) to the less secure true value for backwards compatibility with existing Vault versions. Signed-off-by:
Alexander Scheel <alex.scheel@hashicorp.com> * Refactor sanitizedName to reducedName Per comment, this variable name was confusing during the reproduction and subsequent fix of the earlier vulnerability and associated bug report. Because the common name isn't necessarily _sanitized_ in any way (and indeed must be considered in relation to other parts or the whole), but portions of the entire name are removed, reducedName appears to make the most sense. Signed-off-by:
Alexander Scheel <alex.scheel@hashicorp.com> * Enforce AllowWildcardCertificates during issuance This commit adds the bulk of correctly validating wildcard certificate Common Names during issuance according to RFC 6125 Section 6.4.3 semantics. As part of this, support for RFC 2818-conforming wildcard certificates (wherein there are almost no restrictions on issuance) has been removed. Note that this flag does take precedence over AllowAnyName, giving a little more safety in wildcard issuance in this case. Signed-off-by:
Alexander Scheel <alex.scheel@hashicorp.com> * Update test cases to conform with RFC 6125 Test cases 19, 70+71, and 83+84 didn't conform with the RFC 6125, and so should've been rejected under strict conformance. For 70+71 and 83+84, we previously conditioned around the value of AllowSubdomains (allowing issuance when true), but they likely should've been rejected either way. Additionally, update the notes about globs matching wildcard certificates to notate this is indeed the case. Signed-off-by:
Alexander Scheel <alex.scheel@hashicorp.com> * Check AllowWildcardCertifciates in issuance tests This allows for regression tests to cover the new AllowWildcardCertificate conditional. We add additional test cases ensuring that wildcard issuance is properly forbidden in all relevant scenarios, while allowing the existing test cases to validate that wildcard status doesn't affect non-wildcard certificates. Signed-off-by:
Alexander Scheel <alex.scheel@hashicorp.com> * Add Wildcard allowance during signing operations When using sign-verbatim, sign-intermediate, or getting certificate generation parameters, set AllowWildcardCertificates to mirror existing policies. Signed-off-by:
Alexander Scheel <alex.scheel@hashicorp.com> * Add changelog entry Signed-off-by:
Alexander Scheel <alex.scheel@hashicorp.com>
-
- 23 Feb, 2022 1 commit
-
-
Jordan Reimer authored
-