Commit graph

883 commits

Author SHA1 Message Date
Vault Automation
67fb5f3eda
Backport VAULT-41675: Transit observations, key management into ce/main (#12380)
* VAULT-41675: Transit observations, key management (#12100)

* start transit implementation

* all observations and tests

* add comments

* cleanup

* Fix broken build (#12384)

---------

Co-authored-by: miagilepner <mia.epner@hashicorp.com>
Co-authored-by: Nick Cabatoff <ncabatoff@hashicorp.com>
2026-02-18 15:19:18 +01:00
Vault Automation
65597dd37c
Backport Renaming to generalize pki certificate counts into ce/main (#12327)
* no-op commit

* Renaming to generalize pki certificate counts (#12304)

* renaming to generalize pki certificate counts

# Conflicts:
#	vault/replication_rpc_ent.go
#	vault/testing_util.go

* Update vault/testing_util.go

Co-authored-by: Victor Rodriguez Rizo <vrizo@hashicorp.com>

* Remove "PKI" from a few more names related to certificate count code.

---------

Co-authored-by: Victor Rodriguez Rizo <vrizo@hashicorp.com>
# Conflicts:
#	builtin/logical/pki/backend_cmpv2_ent_test.go
#	vault/activity_log_product_usage_util_ent.go
#	vault/activity_log_util_ent.go
#	vault/cert_count/cert_count_manager.go
#	vault/cert_count/cert_count_manager_test.go
#	vault/external_tests/activity_testonly/activity_testonly_ent_test.go
#	vault/logical_system_helpers_ent.go
#	vault/logical_system_pki_certificate_count_ent.go
#	vault/logical_system_pki_certificate_count_ent_test.go
#	vault/replication_paths_ent.go
#	vault/replication_rpc_ent.go
#	vault/testing_util.go

* add ce changes

---------

Co-authored-by: Rachel Culpepper <84159930+rculpepper@users.noreply.github.com>
Co-authored-by: Victor Rodriguez Rizo <vrizo@hashicorp.com>
Co-authored-by: rculpepper <rculpepper@hashicorp.com>
2026-02-13 11:00:48 -05:00
Vault Automation
9cfcfec78a
Count duration adjusted certificate counts for billing (#12286) (#12310)
* Change PkiCertificateCountManager.GetCounts() to return a CertCount.

* Add PkiDurationAdjustedCerts field to CertCount.

Add a new field to CertCount to keep track of "duration adjusted" issued
certificates.

Add an x509.Certificate argument to CertCountIncrementer.AddIssuedCertificate.
In the implementation, use the certificate's NotBefore and NotAfter fields to
calculate the validity duration for the certificate, and use that to compute the
duration adjusted units.

* Add the issued certificate to calls to AddIssuedCertificate.

* Add PkiDurationAdjustedCerts when forwarding counts.

Add pki_duration_adjusted_certificate_count to IncrementPkiCount proto.

Update replicationServiceHandler.IncrementPkiCertCountRequest to take into
account the new field.

* Run make proto.

* Update testingPkiCertificateCounter to make assertions on time adjusted counts.

* PR review: Don't use NotAfter.Sub(NotBefore), since time.Duration is max 290 years.

* PR review: Move DurationAdjustedCertificateCount to logical.pki/test_helpers.

Add Bob generated unit tests for logical.durationAdjustedCertificateCount.

* Run make fmt.

Co-authored-by: Victor Rodriguez Rizo <vrizo@hashicorp.com>
2026-02-13 09:41:37 -05:00
Vault Automation
9839d40b10
Backport rotationMgr: enable RM to send rotation information to plugins on registration/rotation operations into ce/main (#12308)
* rotation-manager: enable RM to send rotation information to plugins on registration/rotation operations (#11810)

* initial commit for sending NVR to plugins

* add changelog

* add NVR to plugin fields, add RotationInfo to GRPC request handler

* fix tests

* ensure consistent formats on times and ttls

* add translation to allow grpc data transfer

* fix tests and rename fields

* fix missed field renames in tests

* make all methods net-new for backwards compatibility

* update mock plugin and add oss stub back

* remove method with no usages

* Address wrapper comments

* Rebuild proto

* Nil check around SetRotationInfo, return n/a for no last_vault_rotation

* Fix error to match other instances

* Update fields.go

* Return nil if unset for next/last vault rotation times

---------

Co-authored-by: robmonte <17119716+robmonte@users.noreply.github.com>

* Fix return type in stub method

---------

Co-authored-by: vinay-gopalan <86625824+vinay-gopalan@users.noreply.github.com>
Co-authored-by: robmonte <17119716+robmonte@users.noreply.github.com>
2026-02-12 18:25:47 -06:00
Vault Automation
15fca8246d
Copy fix(transit): prevent panic on restore with missing policy into main (#12206) (#12305)
* Copy https://github.com/hashicorp/vault/pull/31733 into main




* fix(transit): prevent panic on restore with missing policy

* test: add unit test for RestorePolicy nil policy validation

* changelog: add entry for transit restore panic fix

* Update changelog/31733.txt



---------

Co-authored-by: Abhishek Dadwal <dadwalabhishek10@gmail.com>
Co-authored-by: Abhishek Dadwal <73817744+Abhishek00810@users.noreply.github.com>
Co-authored-by: Steven Clark <steven@sclark.me>
2026-02-11 15:58:00 -05:00
Vault Automation
d5b3c8839c
Currently, if you choose a cluster name that's too long you get a confusing error message: Error response from daemon: crun: sethostname: Invalid argument: OCI runtime error. Make the error clearer and catch it sooner, before we spend time building an image. (#12282) (#12283)
Co-authored-by: Nick Cabatoff <ncabatoff@hashicorp.com>
2026-02-10 20:12:11 +00:00
Vault Automation
7b433e64ba
Refactor CertificateCounter.IncrementeCount to use a param object. (#12172) (#12271)
* Refactor CertificateCounter.IncrementeCount to use a param object.

In preparation to start collecting more information, refactor the
CertificateCounter to take a parameter object which can be later gain more
fields.

* Rework CertificateCounter to use a fluent interface.

Rename method IncrementCount to AddCount.

Remove method AddIssuedCertificate.

Add method Incrementer, which returns an implementation of the new
CertCountIncrementer.

* Add method CertCountIncrement.Add.

* Refactor PkiCertificateCountConsumer to take a CertCountIncrement.

* Fix TestPkiCertificateCountManager_IncrementAndConsume.

* Rename type CertCountIncrement to CertCount.

* Refactor ReadStoredCounts to return a CertCount value.

Co-authored-by: Victor Rodriguez Rizo <vrizo@hashicorp.com>
2026-02-10 11:55:10 -05:00
Vault Automation
521997a16f
add observations for totp secrets engine (#11839) (#12272)
Co-authored-by: Chris-Paris-HashiCorp <chris.paris@hashicorp.com>
2026-02-10 08:50:28 -08:00
Vault Automation
bb106f1bef
Add blackbox testing SDK (#11210) (#12245)
* rough draft

* add some stuff for dynamic secrets

* add some more helpers and sample tests

* new helpers, new tests, refactoring

* Add Basic Smoke SDK Scenario (#11678)

* Add simple test for stepdown election

* Add a smoke_sdk scenario

* add script to run tests locally

* fix up a few things

* VAULT-39746 - Add Tests to Smoke SDK and Cloud Scenarios (#11795)

* Add some go verification steps in enos sdk test run script

* formatting

* Add a smoke_sdk scenario userpass secret engine create test (#11808)

* Add a smoke_sdk scenario userpass secret engine create test

* Add the some additional tests

* Add Smoke tests to Cloud Scenario (#11876)

* Add a smoke_sdk scenario userpass secret engine create test

* Add the some additional tests

* Add smoke testing to cloud

* Add test results to output and test filtering

* comment

* fix test

* fix the smoke scenario

* Address some various feedback

* missed cleanup

* remove node count dependency in the tests

* Fix test perms

* Adjust the testing and clean them up a bit

* formatting

* fmt

* fmt2

* more fmt

* formatting

* tryagain

* remove the docker/hcp divide

* use the SHA as ID

* adjust perms

* Add transit test

* skip blackbox testing in test-go

* copywrite

* Apply suggestion from @brewgator

* Add godoc

* grep cleanup

---------

Co-authored-by: Josh Black <raskchanky@gmail.com>
Co-authored-by: Luis (LT) Carbonell <lt.carbonell@hashicorp.com>
2026-02-06 21:36:29 +00:00
Vault Automation
d5b1b8c5a6
Prevent panic when a storage reply doesn't contain a walindex. (#12202) (#12204) 2026-02-05 18:58:02 +00:00
Vault Automation
c6170d36a8
Add the ability for a plugin to specify extra fields for auditing purposes (#11018) (#12167)
* Add the ability to specify extra audit only fields from a plugin

* Add extra auditing fields within the PKI OCSP handler

* Add missing copywrite headers

* Format OCSP dates when non-zero, otherwise specify not set to be clear

* Feedback 2: Only set time fields if not zero instead of non-parsable string

* Serialize JSON fields in SDK response struct

* Perform renames based on RFC feedback

* Resolve OpenAPI test failure

* add cl

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2026-02-04 15:41:54 +00:00
Vault Automation
caf642b7d2
Backport Vault 42177 Add Backend Field into ce/main (#12152)
* Vault 42177 Add Backend Field (#12092)

* add a new struct for the total number of successful requests for transit and transform

* implement tracking for encrypt path

* implement tracking in encrypt path

* add tracking in rewrap

* add tracking to datakey path

* add tracking to  hmac path

* add tracking to sign  path

* add tracking to verify path

* unit tests for verify path

* add tracking to cmac path

* reset the global counter in each unit test

* add tracking to hmac verify

* add methods to retrieve and flush transit count

* modify the methods that store and update data protection call counts

* update the methods

* add a helper method to combine replicated and local data call counts

* add tracking to the endpoint

* fix some formatting errors

* add unit tests to path encrypt for tracking

* add unit tests to decrypt path

* fix linter error

* add unit tests to test update and store methods for data protection calls

* stub fix: do not create separate files

* fix the tracking by coordinating replicated and local data, add unit tests

* update all reference to the new data struct

* revert to previous design with just one global counter for all calls for each cluster

* complete external test

* no need to check if current count is greater than 0, remove it

* feedback: remove unnacassary comments about atomic addition, standardize comments

* leave jira id on todo comment, remove unused method

* rename mathods by removing HWM and max in names, update jira id in todo comment, update response field key name

* feedback: remove explicit counter in cmac tests, instead put in the expected number

* feedback: remove explicit tracking in the rest of the tests

* feedback: separate transit testing into its own external test

* Update vault/consumption_billing_util_test.go

Co-authored-by: divyaac <divya.chandrasekaran@hashicorp.com>

* update comment after test name change

* fix comments

* fix comments in test

* another comment fix

* feedback: remove incorrect comment

* fix a CE test

* fix the update method: instead of storing max, increment by the current count value

* update the unit test, remove local prefix as argument to the methods since we store only to non-replicated paths

* update the external test

* Adds a field to backend to track billing data

removed file

* Changed implementation to use a map instead

* Some more comments

* Add more implementation

* Edited grpc server backend

* Refactored a bit

* Fix one more test

* Modified map:

* Revert "Modified map:"

This reverts commit 1730fe1f358b210e6abae43fbdca09e585aaaaa8.

* Removed some other things

* Edited consumption billing files a bit

* Testing function

* Fix transit stuff and make sure tests pass

* Changes

* More changes

* More changes

* Edited external test

* Edited some more tests

* Edited and fixed tests

* One more fix

* Fix some more tests

* Moved some testing structures around and added error checking

* Fixed some nits

* Update builtin/logical/transit/path_sign_verify.go

Co-authored-by: Nick Cabatoff <ncabatoff@hashicorp.com>

* Edited some errors

* Fixed error logs

* Edited one more thing

* Decorate the error

* Update vault/consumption_billing.go

Co-authored-by: Nick Cabatoff <ncabatoff@hashicorp.com>

---------

Co-authored-by: Amir Aslamov <amir.aslamov@hashicorp.com>
Co-authored-by: Nick Cabatoff <ncabatoff@hashicorp.com>

* Edited stub function

---------

Co-authored-by: divyaac <divya.chandrasekaran@hashicorp.com>
Co-authored-by: Amir Aslamov <amir.aslamov@hashicorp.com>
Co-authored-by: Nick Cabatoff <ncabatoff@hashicorp.com>
Co-authored-by: divyaac <divyaac@berkeley.edu>
2026-02-03 22:48:12 +00:00
Vault Automation
375a59c4cd
Fix client-controlled-consistency for external plugins (#12117) (#12134)
* Allow requests to external plugins that modify storage to populate the X-Vault-Index response header.
2026-02-03 18:01:09 +00:00
Vault Automation
38bb6eae78
Add PasswordModify to new LDAP Connection interface wrapper (#12094) (#12113)
* Add method to ldap connection interface

* Move to interface wrapper

Co-authored-by: Robert <17119716+robmonte@users.noreply.github.com>
2026-01-30 23:45:35 +00:00
Vault Automation
d7d140a3a3
Backport Add kmip cluster tests. Also fix a bug in EnableDRSecondaryNoWait. into ce/main (#12059)
* no-op commit

* Apply CE changes from #12052

---------

Co-authored-by: ncabatoff <ncabatoff@hashicorp.com>
2026-01-29 10:38:19 -05:00
Vault Automation
744024c83e
VAULT-41729 Refactor PKI Cert Counting Code (#11657) (#11881)
* Basic refactoring to reuse PKI certs for SSH

* Refactored so that files are moved to CE

* Modified comment

* Renamed CertCountSystemView

* Moved forwarding function and redefined consume function

* Renamed cert view file

* Moved forwarding function and redefined consume function

Small edit

Renamed cert view file

* Fix issues with commit

* Fix consume job

* Removed error

* Update vault/logical_system_helpers.go



---------

Co-authored-by: divyaac <divya.chandrasekaran@hashicorp.com>
Co-authored-by: Victor Rodriguez <vrizo@hashicorp.com>
2026-01-26 08:28:41 -05:00
Vault Automation
cab60d761b
Backport rotationManager: add configurable limit to rotation retries with orphaning into ce/main (#11782)
Co-authored-by: vinay-gopalan <86625824+vinay-gopalan@users.noreply.github.com>
2026-01-15 09:31:40 -06:00
Vault Automation
d978f9720c
VAULT-41600: SSH OTP observations (#11704) (#11783)
* ssh observations and tests

* remove unnecessary comments

* add metadata in comments

* limit to only otp paths

* remove unnecessary change

Co-authored-by: miagilepner <mia.epner@hashicorp.com>
2026-01-15 15:22:11 +00:00
Vault Automation
3fde566dd2
Put alias_metadata tokenutil field into public SDK (#11468) (#11717) 2026-01-13 09:43:33 -06:00
Vault Automation
c98c3d6d35
Allow setting extrahosts (#11679) (#11703)
Co-authored-by: Nick Cabatoff <ncabatoff@hashicorp.com>
2026-01-12 14:38:05 +00:00
Vault Automation
62be8c0fe6
Put fairshare and dnstest helper in sdk (#11583) (#11663) 2026-01-09 10:32:31 -05:00
Vault Automation
e7965c8bdf
[VAULT-41294] docker: build OCI container images (#11545) (#11549)
This change does a few things that might not be obvious:

- We stop requesting the previous runner image. This will result in us
  using Docker 29 instead of 28. With this comes changes in our
  container build system, most notably that container images are now
  exported as OCI images. Every container runtime that we support also
  supports OCI images so this ought to have no meaningful impact to
  downstream users. One noticeable change is that the image layers are
  now compressed so the final image size on disk will be considerably
  smaller than before.

- Upgrade `hashicorp/action-setup-enos` to the latest version. This is not
  strictly required for this change but as we just released a new version of
  the CLI it makes sense to update it here. We should also note that recently
  we released a new version of `terraform-provider-enos` which contains
  necessary for this change as our docker and kind resources needed to be
  updated handle OCI and Docker exported images. Previously they relied on
  files that existed only in Docker images.

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-12-29 10:58:02 -08:00
Vault Automation
ce23f4f2de
VAULT-41425: AWS secrets engine observations (#11395) (#11514)
* add observations for the aws secrets engine

* add mock recorder

* add tests to verify observations are created

* fix comment

* update godoc and switch to require

* fix type assertion, add test

Co-authored-by: miagilepner <mia.epner@hashicorp.com>
2025-12-19 10:57:08 -08:00
Vault Automation
6c52175b8d
events: send events from primary to secondary clusters (#8214) (#11451)
Collect event subscriber filters on the active node of a cluster as
"cluster wide" filters, and send them from the secondary active to the
primary active node (`SendSecondaryFilters rpc`). The primary active
node forwards events downstream to the secondary active node if the
events match the secondary cluster's subscriber filters
(`RecvPrimaryEvents rpc`). Then the events are further distributed
around the secondary cluster via the existing `RecvActiveNodeEvents`
and `SendStandbyFilters` rpc's.

Events are forwarded downstream to the secondary cluster if the mount
exists on the secondary cluster, i.e. events from mounts with
`local=true` aren't forwarded, and events from mounts that are not
replicated via paths-filter aren't forwarded.

(This is the CE portion of the above^^)

Co-authored-by: Theron Voran <tvoran@users.noreply.github.com>
2025-12-18 10:56:55 -08:00
Vault Automation
f9bb8aa7d4
Enforce Checks on Chain in Common Criteria Mode (#10915) (#11251)
* Add Disable-Time-Check flag, and also respect common criteria when doing so.

* Switch to EnableTimeChecks to not change default behavior.

* Check Common Criteria Flag Before Disabling Verification.

* Add Changelog.

* Update builtin/logical/pki/issuing/cert_verify_ent.go



* Update changelog/_10915.txt



* PR feedback.

* Merge-fix

* Test case requested by PR review.

---------

Co-authored-by: Kit Haines <khaines@mit.edu>
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2025-12-15 14:08:43 -05:00
Vault Automation
e78aea2ec1
Correctly set signature bits. (#10700) (#10977)
* Correctly set signature bits.

* All the other places that accidentally conflate issuer and issued key.

* Update builtin/logical/pki/path_roles.go



* PR Feedback.

* Add changelog.

* Test and validate keybits in a single call

* License header.

* Add/combine validate and get default hashbits calls.

* Actually set keyBits on the role.

* Fix storage test, switch to defaultOrValue.

* fix storage test.

* Update error return for linter.

* Look at underlaying key type not type which might include "managedKeyType" for ca-issuer.

* Update expected role values, and convert between PublicAlgorithm and KeyType internally.

* Move the ec to ecdsa transformation to helper functions.  More consistant usage.

* Speed improvement to testing - pregenerate CA bundles and CSR.

* Add go test doc.

* Fix issue with web-merge.

* Error wrapping error now warnings aren't errors.

* PR feedback - move ecdsa support to subfunctions.

---------

Co-authored-by: Kit Haines <khaines@mit.edu>
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2025-12-15 14:08:17 -05:00
Vault Automation
41bc535dc9
sdk/rotation: Prevent rotation attempts on read-only storage (#10762) (#11156)
* sdk/rotation: Prevent rotation attempts on read-only storage

Rotation is a write operation that mutates both Vault's storage
and an external resource. Attempting this on a read-only node
(like in a performance secondary cluster) will fail.

This check preempts the rotation to prevent a split-brain scenario
where the external credential is changed but Vault's storage
cannot be updated.

* changelog

* fix failing test

Co-authored-by: John-Michael Faircloth <fairclothjm@users.noreply.github.com>
2025-12-15 10:47:28 -06:00
Vault Automation
6c2f2a84ee
VAULT-40506: Disable custom JSON limit parsing on ClusterListener (#10848) (#11075)
* add test for issue

* add bool to disable json limit parsing

* clean up tests

* fix godoc

* restore previous clustering setup

* add nil check for VaultNodeConfig

* add changelog

* move docker test to appropriate directory to allow testing in CI

---------

Co-authored-by: davidadeleon <56207066+davidadeleon@users.noreply.github.com>
Co-authored-by: davidadeleon <ddeleon@hashicorp.com>
2025-12-12 17:23:36 -05:00
Vault Automation
0a52566ccc
Correct misleading godoc re DisplayAttrs.Value. (#11189) (#11227) 2025-12-12 21:00:07 +00:00
Vault Automation
be2cb06f8c
Backport refactor dependencies and removes disallowed vault imports from builtin Okta auth into ce/main (#11295)
* refactor dependencies and removes disallowed vault imports from builtin Okta auth (#10965)

* move SkipUnlessEnvVarsSet from vault/helper/testhelpers/ to vault/sdk/helper/testhelpers

* use unittest framework from vault-testing-stepwise module in place of sdk/logical

* refactor SkipUnlessEnvVarsSet() and NewAssertAuthPoliciesFunc() to sdk

* bump docker API version to 1.44 matching 2f33549

---------

Co-authored-by: Thy Ton <maithytonn@gmail.com>
2025-12-12 13:20:57 -06:00
Vault Automation
50c9fd55e5
Workaround backport for docker 29 ce main (#11177)
Co-authored-by: LT Carbonell <lt.carbonell@hashicorp.com>
2025-12-12 19:13:57 +00:00
Vault Automation
8cce47281e
[VAULT-41179] go: bump golang.org/x/crypto to v0.45.0 (#11056) (#11065)
* [VAULT-41179] go: bump golang.org/x/crypto to v0.45.0

Bump the golang.org/x/crypto module to v0.45.0 to resolve several CVE's
with the prior version:
  - https://github.com/advisories/GHSA-f6x5-jh6r-wrfv
  - https://github.com/advisories/GHSA-j5w8-q4qc-rx2x
  - https://pkg.go.dev/vuln/GO-2025-4134
  - https://pkg.go.dev/vuln/GO-2025-4135

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-12-02 21:00:06 +00:00
Vault Automation
4e2f3ba489
Support external plugins in NewTestDockerCluster (#11023) (#11035) 2025-11-28 21:37:26 +00:00
Vault Automation
b612e02fe9
Backport Enforce the minimum set of key usages for each ExtKeyUsage set in a PKI role (#10900)
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2025-11-20 20:37:22 +00:00
Vault Automation
399a10f22d
Force NotBefore=now when common_criteria_mode feature flag is enabled (#10739) (#10849) 2025-11-20 19:38:39 +00:00
Vault Automation
21935979ec
Backport Define common criteria flag which forbids certain TLS cipher suite options into ce/main (#10806) 2025-11-19 19:07:18 +00:00
Vault Automation
77f1980d29
go: bump golang.org/x/crypto => v0.44.0 to resolve GO-2025-4116 (#10871) (#10891)
* go: bump golang.org/x/crypto => v0.44.0 to resolve GO-2025-4116

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-11-18 17:57:11 +00:00
Vault Automation
0699b2150e
Disallow logins with empty passwords in LDAP Auth (#10752) (#10777)
Co-authored-by: vinay-gopalan <86625824+vinay-gopalan@users.noreply.github.com>
2025-11-13 18:43:28 +00:00
Vault Automation
ab7d41d465
Use RotationSchedule string instead of cron.SpecSchedule (#10376) (#10773)
Co-authored-by: kpcraig <3031348+kpcraig@users.noreply.github.com>
2025-11-13 12:31:08 -05:00
Vault Automation
e67da36b58
Allow sign-verbatim to handle CSRs with basic constraints extension where isCA=false (#10466) (#10474) 2025-10-29 15:09:28 +00:00
Vault Automation
d8f870d125
Refactor Identity.ActivationFunc to make room for SCIM activation (#10317) (#10349)
Co-authored-by: Bianca <48203644+biazmoreira@users.noreply.github.com>
2025-10-23 15:41:36 +00:00
Vault Automation
0c6c13dd38
license: update headers to IBM Corp. (#10229) (#10233)
* license: update headers to IBM Corp.
* `make proto`
* update offset because source file changed

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-10-21 15:20:20 -06:00
Vault Automation
68d559dd6e
SDK rotation changes (#9942) (#10025)
Co-authored-by: kpcraig <3031348+kpcraig@users.noreply.github.com>
2025-10-10 12:23:51 -04:00
Vault Automation
7efe8aa99b
Fix seal rewrap running unnecessarily (#9466) (#9895)
Co-authored-by: Nick Cabatoff <ncabatoff@hashicorp.com>
2025-10-07 07:24:17 -04:00
Vault Automation
732c1e590d
Backport secrets/database: escape usernames/passwords in self-managed static roles, unless disable_escaping is set into ce/main (#9732)
Co-authored-by: kpcraig <3031348+kpcraig@users.noreply.github.com>
Co-authored-by: Kay Craig <kay.craig@hashicorp.com>
2025-10-02 12:52:49 -04:00
Vault Automation
eadd2bde15
bump cap/ldap dependency to fix data race (#9760) (#9783)
Co-authored-by: John-Michael Faircloth <fairclothjm@users.noreply.github.com>
2025-10-02 11:35:43 -05:00
Vault Automation
0adb749a82
Check rate limits before doing json limits checking (#9688) (#9775)
* update the order of the requests handlers

* switch back to maxrequestsize, prevent the error by restricting the buffer size

* add test

Co-authored-by: miagilepner <mia.epner@hashicorp.com>
2025-10-02 09:30:31 +00:00
Vault Automation
a24046a0b4
Increment certificate counts in all PKI backends (#9693) (#9721)
Increment certificate counts in all PKI backends.

Ensure that the PkiCertificateCounter is invoked every time we store and
issue a certificate by any of the PKI backends.

Co-authored-by: Victor Rodriguez <vrizo@hashicorp.com>
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2025-09-29 15:33:00 -04:00
Vault Automation
a48469ef13
Fix flaky test TestSpiffeWebPemWithStandbys, do not send seal commands to standby nodes (#9615) (#9716)
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2025-09-29 14:02:34 +00:00
Vault Automation
44ced707f9
Add PkiCertificateCountSystemView to the PKI backend's SystemView (#9573) (#9617)
Add PkiCertificateCountSystemView to the PKI backend's SystemView.

Co-authored-by: Victor Rodriguez <vrizo@hashicorp.com>
2025-09-24 18:23:22 +00:00