Commit graph

21948 commits

Author SHA1 Message Date
Vault Automation
79b7f07175
build: stamp version into build info ldflags (#10509) (#10601)
Stamp the vault version into the debug info ldflags

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: mickael-hc <86245626+mickael-hc@users.noreply.github.com>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-11-05 17:54:47 +00:00
Vault Automation
6c4e6a567e
UI: fix LIST request for metadata endpoint (#10371) (#10584)
* fix LIST request for metadata endpoint

* add test coverage

* update kv suggestion input compoent

* update comment, add another test for kv suggestion input

* fix typo in web REPL for metadata flag, add test

* update from curly to angle bracket syntax

* sanitize url in api service VAULT-40414

* add fallback return for no url to removeDuplicateSlashes method

* move sanitization directly to middleware

* remove sanitization for kv list requests

* strip requests of trailing slash

* revert changes to api pre request middleware

* update vault-client-typescript

* add changelog

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>
2025-11-04 23:57:54 +00:00
Vault Automation
da6122ce5f
Backport actions(setup-enos): update action-setup-enos to pull in enos 0.0.34 into ce/main (#10572)
* actions(setup-enos): update action-setup-enos to pull in enos 0.0.34 (#10561)

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-11-04 15:22:59 -07:00
Vault Automation
091633203a
[VAULT-39917] UI: bugfix to support hierarchical ldap libraries (#10180) (#10569)
* [VAULT-39917] UI: bugfix to support hierarchical ldap libraries

* add loading state instead of staying on secret engine list page

* support deeply nested hierarchical libraries using recursion

* show library count as soon as we have it available

* fix breadcrumbs by supporting subdirectory routes

* code cleanup

* remove unnecessary loading text

* additional code cleanup

* more code cleanup / updating comments

* add changelog

* update tests

* fix build issues

* fix test failure

* address pr comments: update comment, use ember-concurrency for loading states

* address pr comment: changelog updates

* address PR comment: use await .last instead of .then()

* address pr comment: cleanup - remove unused args

* address PR comment: remove dup request for root libraries, add inline error

* remove unnecessary, dup logic

* update failing tests

* update failing tests

* Update comment

* bug fix: update record should support hierarchical paths; added test coverage

Co-authored-by: Shannon Roberts (Beagin) <beagins@users.noreply.github.com>
2025-11-04 13:52:38 -08:00
Vault Automation
9f0c9fc4b7
VAULT-40618 Update PKI observation timestamps to use RFC-3339 format (#10560) (#10568)
Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
2025-11-04 16:18:26 -05:00
Vault Automation
2cc9e9a3ba
VAULT-40398: remove 1.18.x for the active versions config (#10550) (#10555)
Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-11-04 18:45:29 +00:00
Vault Automation
41845edc3b
Bumping go version from 1.25.2 to 1.25.31 for enterprise main (#10246) (#10275)
Co-authored-by: ericjones <eric.jones@hashicorp.com>
Co-authored-by: Tony Wittinger <anwittin@users.noreply.github.com>
2025-11-04 10:01:15 -07:00
Vault Automation
9fbc0f46c3
pin @messageformat/runtime dep resolution (#10521) (#10542)
Co-authored-by: lane-wetmore <lane.wetmore@hashicorp.com>
2025-11-04 10:59:56 -06:00
Vault Automation
89347f9705
install sqlc before building vcm (#10232) (#10531)
* install sqlc before building vcm

* make a meaningless change to trigger CI

* turn off the go.work file

* remove test comment

Co-authored-by: Josh Black <raskchanky@gmail.com>
2025-11-03 23:04:35 +00:00
Vault Automation
dbe3e0e5b5
Update perf replication checking script (#10134) (#10500)
* change what performance replication checker script is checking

* fix lint errors

* enable consul backends for ent build samples

* fix up samples

* fix linting

* update release samples

* fix linting again

* output to stderr

Co-authored-by: Josh Black <raskchanky@gmail.com>
2025-11-03 10:49:34 -08:00
Vault Automation
a0189364f8
fix csp header for posthog on hvd (#10519) (#10524)
Co-authored-by: Dan Rivera <dan.rivera@hashicorp.com>
2025-11-03 18:37:59 +00:00
Vault Automation
f96bd6ac26
UI: Replacing ember dropdown user menu with hds dropdown (#10366) (#10495)
* replacing with hds dropdown

* update and comment

* update confirm model to launch from interactive

* remove test line

* updates to hbs

* update tests

* styling and structure updates

* add settled line before click

Co-authored-by: Dan Rivera <dan.rivera@hashicorp.com>
2025-10-29 22:55:49 +00:00
Vault Automation
66dad8d0fa
actions(slack): quote yaml strings that start with ':' (#10477) (#10485)
Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-10-29 14:47:33 -07:00
Vault Automation
1fd1cb4536
VAULT-40297 log warning when using allowed/denied params (#10444) (#10483)
* log warning when using allowed/denied params

* add changelog

Co-authored-by: Bruno Oliveira de Souza <bruno.souza@hashicorp.com>
2025-10-29 16:46:28 -03:00
Vault Automation
0e6dc73772
UI: fix PKI certificate key_usage parsing and add extended key flags to role form (#10416) (#10479)
* fix parsing of key_usage VAULT-40303

* VAULT-40220 add extended key usage flags and test coverage

* add test coverage

* add changelog

* fix mislabeled role parameter

* update tests

* VAULT-40219 link jira

* update changelog text

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>
2025-10-29 18:47:57 +00:00
Vault Automation
e67da36b58
Allow sign-verbatim to handle CSRs with basic constraints extension where isCA=false (#10466) (#10474) 2025-10-29 15:09:28 +00:00
Vault Automation
9e979eafe7
enos: remove us-east-1 from config due to instance stuck in pending issues (#10448) (#10449)
Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-10-28 13:27:28 -06:00
Vault Automation
2c95f73ca7
[VAULT-40166] go: check go.mod drift on changes to ce/branches
When a pull request is created against a CE branch and it has changed any files in the `gotoolchain` group we'll automatically trigger the diff for every Go module file in the repo against the equivalent in the corresponding enterprise branch. If there's a delta in like configuration it will automatically fail the `build/ce-checks` job. It will also write a complete explanation of the diff to the step output and also to the `build/ce-checks` job step summary.

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-10-28 13:26:46 -06:00
Vault Automation
544476d2ae
go: update version on main to 1.22.0-beta1 (#10427) (#10439)
Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-10-28 10:28:50 -06:00
Vault Automation
e6c710aef4
actions: pin to latest actions (#10407) (#10417)
Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-10-27 17:46:04 -06:00
Vault Automation
80d8b45fb3
update changelog (#10408) (#10415)
Co-authored-by: Angel Garbarino <Monkeychip@users.noreply.github.com>
2025-10-27 14:40:24 -07:00
Vault Automation
2d2b237505
update help text url to avoid appearance of real secret usage (#10398) (#10404)
Co-authored-by: lane-wetmore <lane.wetmore@hashicorp.com>
2025-10-27 15:34:21 -05:00
Vault Automation
0a163f449e
[VAULT-40165] pipeline(github): add check go-mod-diff command (#10369) (#10377)
* [VAULT-40165] pipeline(github): add `check go-mod-diff` command

Add `pipeline github check go-mod-diff` command that is capable of
creating a Go module diff between one-or-more go.mod files in two
different Github branches. There are flags for the owner, repo, and
branch for both the A and B sides of the diff, as well as the `--path`
or `-p` flag that can be specified any number of times with relative
paths in the repository of go.mod files to compare. We assume that the
path is the same in both repositories.

This work will be followed up with another PR that removes the
enterprise only go.mod file and enables Go module diff checking on pull
requests to CE branches that change the go toolchain.

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-10-27 20:03:36 +00:00
Vault Automation
8346f0638c
UI: update aws generate credential form inputs to rely on credentialType (#10045) (#10351)
* update aws generate credential form inputs to rely on credentialType

* update tests

* show credential type + style updates

* Update ui/app/components/generate-credentials.ts



* update test, naming and help text

* add changelog

* rename changelog

---------

Co-authored-by: lane-wetmore <lane.wetmore@hashicorp.com>
Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>
2025-10-27 11:41:57 -05:00
Vault Automation
117beded49
UI: Clean up remaining ember-modal-dialog tooltip code (#10325) (#10368)
* remove ember-modal-dialog dep + unused calendar-widget component

* remove waitUntil

* lint fix

Co-authored-by: lane-wetmore <lane.wetmore@hashicorp.com>
2025-10-24 13:50:15 -05:00
Vault Automation
bfac07958a
UI: Pull nested interactives out of labels (#10231) (#10367)
* pull nested interactives out of labels

* move label styles into new class

* update tooltip testd

* fix test

* update missed css classes + update css variable usage

* update font size

Co-authored-by: lane-wetmore <lane.wetmore@hashicorp.com>
2025-10-24 13:01:19 -05:00
Vault Automation
22f221129e
Update CHANGELOG for version 1.21.0 (#10357) (#10364)
Updated CHANGELOG for version 1.21.0, including security fixes, changes, improvements, deprecations, and bug fixes.

Co-authored-by: Tony Wittinger <anwittin@users.noreply.github.com>
2025-10-23 14:42:55 -07:00
Vault Automation
e53661ce92
license: update headers to IBM Corp. on main (#10333) (#10361)
Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-10-23 20:54:04 +00:00
Vault Automation
796c5fb294
[HDS-5060] UI: Align typography styles to HDS tokens (#10193) (#10360)
Co-authored-by: Dylan Hyun <dylan.hyun@hashicorp.com>
2025-10-23 16:37:36 -04:00
Vault Automation
009874e7f1
[HDS-5541] UI: Align color and border-radius styles to HDS tokens (#10182) (#10359) 2025-10-23 15:31:12 -04:00
Vault Automation
1131e79ed8
VAULT-40037 Updates to PKI observations (#10200) (#10358)
* WIP

* VAULT-40037 Updates to PKI observations

* review feedback

* public key size

* make fmt

* issuerId for sign self issued

* remove confusing issuer_name

* remove unused var

* whoops common name

* role -> role_name

* role name

Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
2025-10-23 18:56:41 +00:00
Vault Automation
3a4d34f241
[UI] Set up core page header component and update secret engine header (#10274) (#10330)
* Set up dynamic page header component and update secret engine header

* Add copyright headers

* Remvoe unsused tab for now

* Add page header test

* Remove component test since we deleted component

* Address feedback..

* Add deprecation comment

Co-authored-by: Kianna <30884335+kiannaquach@users.noreply.github.com>
2025-10-23 09:48:02 -07:00
Vault Automation
d8f870d125
Refactor Identity.ActivationFunc to make room for SCIM activation (#10317) (#10349)
Co-authored-by: Bianca <48203644+biazmoreira@users.noreply.github.com>
2025-10-23 15:41:36 +00:00
Vault Automation
6a9329d8a6
VAULT-39876 Add sys/reporting/scan to Vault, allowing an output of files with paths and names of Vault secrets (#10068) (#10323)
* VAULT-39876 sys/reporting/scan for KV secrets

* make fmt

* changelog

* stray t.log

* typo

* fix race probably

* Bug fix, add local mount

* remove comment

* bolster external tests

Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
2025-10-22 21:02:07 +00:00
Vault Automation
42d01ee5fe
Upgrade jsondiffpatch dependency version (#9651) (#10282)
* update jsondiffpatch dep + use webpack to convert into UMD format

* do not lint vendor files

* update test

* lint fix

* fix merge conflict error

Co-authored-by: lane-wetmore <lane.wetmore@hashicorp.com>
2025-10-22 15:02:47 -05:00
Vault Automation
0845606fe3
UI: Adopt HDS tooltip (#9967) (#10326)
* replace instances of ToolTip component with HDS tooltip

* Replace InfoTooltip component instances with HDS tooltip

* update tests

* remove remaining custom tooltip code

* remove rich tooltip with copy

* update test and update toolbar link with styling to remove extra link

* Apply suggestions from code review



* update test and remove setRunOptions now that tooltip violations are addressed

* Revert "Apply suggestions from code review"

This reverts commit 90f01c653be68f23b6dbd75f252d227e38dbe53f.

* Remove unused disabled tooltip code

* add comment and TODO explaining conditional modifier pattern

---------

Co-authored-by: lane-wetmore <lane.wetmore@hashicorp.com>
Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>
2025-10-22 18:24:50 +00:00
Vault Automation
d5e3cd6865
Expose core's redirectAddr so that plugins can do OIDC discovery like identity (#10321) (#10324) 2025-10-22 17:19:24 +00:00
Vault Automation
da1203b3b2
UI: add redirect for legacy secrets path (#10227) (#10230)
* add redirect for legacy secrets path

* adding changelog

Co-authored-by: Dan Rivera <dan.rivera@hashicorp.com>
2025-10-22 11:41:31 -04:00
Vault Automation
3457992a63
[UI] - disable scarf for this package (#10265) (#10276)
* disable scarf for this package

* add changelog

* use correct changelog format

Co-authored-by: Evan Moncuso <46458931+emoncuso@users.noreply.github.com>
2025-10-21 16:29:30 -07:00
Vault Automation
7a4d71f95a
[VAULT-40043]: pipeline: add go diff mod command (#10188) (#10292)
* [VAULT-40043]: pipeline: add `go diff mod` command

Add a `pipeline go diff mod` command that is capable of comparing two
go.mod files at a directive level. We also support strict or lax
comparisons of several directives to flexible diff comparisons. This is
especially useful when you want to compare two go.mod files that have
some different dependencies (CE vs. Ent) but still want to compare
versions of like dependencies.

This command is not currently used in the pipeline but was useful in
developing the diff library that is used. Subsequent work will use the
library and be integrated into CI.



* review feedback



* one more comment fix



---------

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-10-21 22:08:05 +00:00
Vault Automation
0c6c13dd38
license: update headers to IBM Corp. (#10229) (#10233)
* license: update headers to IBM Corp.
* `make proto`
* update offset because source file changed

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-10-21 15:20:20 -06:00
Vault Automation
8d07273d14
fix: cache aws auth client by account id (#9981) (#10107)
* fix aws auth client cache to use accound ID

* return error if no sts config found

* cache ec2 clients by account ID, region, and role

* add changelog

* fix log syntax

Co-authored-by: John-Michael Faircloth <fairclothjm@users.noreply.github.com>
2025-10-21 12:24:59 -07:00
Vault Automation
169d045481
pipeline(changed-files): one more small false positive fix (#10247) (#10258)
Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-10-21 13:05:23 -06:00
Vault Automation
62156d1698
Backport pipeline(changed-files): fix false positives for some files into ce/main (#10240)
* pipeline(changed-files): fix false positives for some files (#10239)

Signed-off-by: Ryan Cragun <me@ryan.ec>

* make fmt

Signed-off-by: Ryan Cragun <me@ryan.ec>

---------

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-10-20 17:14:39 -07:00
Vault Automation
4ccdc69cad
[VAULT-40033] Migrate Slack notifications to ibm-hashicorp workspace (#10205) (#10207)
Migrate all slack notifications to the `ibm-hashicorp` workspace. This
required creating three new `incoming-webhook` configurations which are
capable of posting into three different Slack channels, depending on the
workflow.

As they all use the `incoming-webhook` event, many of our integrations
had to be migrated from `chat.postMessage` and those changes are
reflected here.

Of note, there are lots of changes to the `release-procedure-ent`
workflow as it has by far the most uses of the Slack integrations. In
some cases it was to appease `actionlint` issues, in others I made small
idiomatic tweaks. I translated all of the payload messages to YAML
instead of JSON, which fits better into our existing workflows and also
because most of the payload messages were invalid JSON all together.

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-10-20 09:48:01 -06:00
Vault Automation
048c2b3f5a
UI: Updating secrets engines routing structure (#10163) (#10206)
* updating routes from mounts/ to enable and updates to breadcrumbs

* updating all relevant tests

* leftover tests

Co-authored-by: Dan Rivera <dan.rivera@hashicorp.com>
2025-10-17 16:36:29 -04:00
Vault Automation
5091c88bb9
release: update notification slack channel (#10213) (#10214)
Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-10-17 14:31:39 -06:00
Vault Automation
378e96f010
Change tokenutil alias_metadata to populate alias custom metadata. (#10199) (#10202)
Co-authored-by: Nick Cabatoff <ncabatoff@hashicorp.com>
2025-10-17 18:06:51 +00:00
Vault Automation
78dda112b9
Vault-39164/Handle log_requests_level empty-string or off with SIGHUP (#9056) (#10197)
* handle log_requests_level empty string or off with SIGHUP

* Update vault/core.go



* add unit test and update comment on ReloadLogRequest to indicate different than first config read

* test coverage for FinalizeInFlightReqData changes

* changelog

---------

Co-authored-by: Angel Garbarino <Monkeychip@users.noreply.github.com>
Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
2025-10-17 11:51:48 -06:00
Ryan Cragun
93e1879749
go: synchronize module deps with enterprise (#10192)
Synchronize all common Go module versions with enterprise.

Signed-off-by: Ryan Cragun <me@ryan.ec>
2025-10-17 11:13:53 -06:00