forked from hashicorp/vault
-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Upstream tag v1.17.3 (revision c91c854421) #72
Closed
Closed
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
* remove deprecated centrify auth method * changelog
* Update vault-plugin-auth-alicloud to v0.18.0 * Add changelog --------- Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
* Update vault-plugin-database-snowflake to v0.11.0 * Add changelog --------- Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
* Update vault-plugin-secrets-alicloud to v0.17.0 * Add changelog --------- Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
* Update vault-plugin-secrets-openldap to v0.13.0 * Add changelog --------- Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
…7139) * Update vault-plugin-database-redis-elasticache to v0.4.0 * Add changelog --------- Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com> Co-authored-by: Milena Zlaticanin <60530402+Zlaticanin@users.noreply.github.com>
* Update vault-plugin-secrets-azure to v0.19.0 * Add changelog --------- Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com> Co-authored-by: Milena Zlaticanin <60530402+Zlaticanin@users.noreply.github.com>
* Update vault-plugin-auth-gcp to v0.18.0 * Add changelog --------- Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com> Co-authored-by: vinay-gopalan <86625824+vinay-gopalan@users.noreply.github.com> Co-authored-by: Vinay Gopalan <vinay@hashicorp.com>
* Update vault-plugin-auth-azure to v0.18.0 * Add changelog --------- Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
* Update vault-plugin-secrets-terraform to v0.8.0 * Add changelog --------- Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
* Update vault-plugin-secrets-mongodbatlas to v0.12.0 * Add changelog --------- Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
* title case all Secrets to route secret breadcrumbs * fix kv navigation test * welp missed some kv tests
… links (hashicorp#27131) * add backendConfigurationLink and amend Secret Engine List view * add test coverage that can be backported * changelog * clean up extra space
* Update vault-plugin-database-couchbase to v0.11.0 --------- Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com> Co-authored-by: kpcraig <3031348+kpcraig@users.noreply.github.com> Co-authored-by: Kay Craig <kay.craig@hashicorp.com>
…p#27156) * Do not generate HMAC keys for CMAC keys on calls to Upgrade - Missed during the initial development of the Transit CMAC feature, on initial key creation we did not generate HMAC keys when the key type was CMAC. The call to the policy's Upgrade function though would treat this key as requiring an upgrade and add one back. - Fix this by adding an HMACSupported argument and verifying on upgrade for HMAC creation that the key type supports HMAC - Add generic test that verifies we aren't changing a key type iota value, string it defined and the proper operation of HMACSupported and CMACSupported functions * Add warning to test variable
* Update vault-plugin-secrets-kv to v0.19.0 * Add changelog --------- Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com> Co-authored-by: Milena Zlaticanin <60530402+Zlaticanin@users.noreply.github.com>
* Update vault-plugin-database-mongodbatlas to v0.12.0 * Add changelog --------- Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com> Co-authored-by: Leland Ursu <leland.ursu@gmail.com>
* Update vault-plugin-auth-oci to v0.16.0 --------- Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com> Co-authored-by: Kay Craig <kay.craig@hashicorp.com>
* Update vault-plugin-auth-cf to v0.17.0 --------- Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
* delete wizard files * uninstall xstate * delete codemods log * remve features-selection css
--------- Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
* Update vault-plugin-secrets-gcp to v0.19.0 * Add changelog --------- Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com> Co-authored-by: vinay-gopalan <86625824+vinay-gopalan@users.noreply.github.com>
…orp#26822) * add new SyncActivationModal component * secrets overview: use SyncActivationModal * tests: add SyncActivationModal tests * int/sync/secrets/overview-test: remove redundant tests now handled by modal tests * cleanup: reorganize sync selectors * chore: will i ever remember copyright headers? nah
--------- Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
* fix ed25519 key type * add changelog * fix other case and add tests * add other test * add headers
* Update vault-plugin-auth-kerberos to v0.12.0 * Add changelog --------- Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
Co-authored-by: Ben Ash <32777270+benashz@users.noreply.github.com>
Co-authored-by: Scott Miller <smiller@hashicorp.com>
Co-authored-by: Thy Ton <maithytonn@gmail.com>
Co-authored-by: Peter Wilson <peter.wilson@hashicorp.com>
Co-authored-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Peter Wilson <peter.wilson@hashicorp.com>
Co-authored-by: Ellie <ellie.sterner@hashicorp.com>
Co-authored-by: Ellie <ellie.sterner@hashicorp.com>
Co-authored-by: Peter Wilson <peter.wilson@hashicorp.com>
Co-authored-by: John-Michael Faircloth <fairclothjm@users.noreply.github.com>
Co-authored-by: Scott Miller <smiller@hashicorp.com>
Co-authored-by: miagilepner <mia.epner@hashicorp.com>
…rp#27952) (hashicorp#27954) * rewrite audit entry formatting to improve performance Co-authored-by: Peter Wilson <peter.wilson@hashicorp.com>
Co-authored-by: Peter Wilson <peter.wilson@hashicorp.com>
Co-authored-by: aphorise <aphorise@gmail.com>
…enarios into release/1.17.x (hashicorp#27958) * backport of commit 720e942 * enos: support ancient systemd in `vault_upgrade` (hashicorp#27960) Amazon Linux 2 uses an ancient version of Systemd/systemctl so instead of using -P when determining the unit file we use the less convenient -p. Signed-off-by: Ryan Cragun <me@ryan.ec> Co-authored-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
Co-authored-by: Peter Wilson <peter.wilson@hashicorp.com>
Co-authored-by: VBouiller <31282661+vbouiller@users.noreply.github.com>
Co-authored-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Jonathan Frappier <92055993+jonathanfrappier@users.noreply.github.com>
Co-authored-by: Adam Rowan <92474478+bear359@users.noreply.github.com>
Co-authored-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Paul Banks <pbanks@hashicorp.com>
…rp#27997) Signed-off-by: Ryan Cragun <me@ryan.ec> Co-authored-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Chelsea Shaw <82459713+hashishaw@users.noreply.github.com>
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Integrating latest changes from hashicorp/vault tag v1.17.3
Commit summary omitted as it exceeds maximum message size.