Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

WIF AWS: add create functionality to SearchSelectWithModal for identity_token_key #27794

Closed
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
99 commits
Select commit Hold shift + click to select a range
b0ee637
UI: Fix ACME Account Safety Buffer not able to be turned off (#27742)
hashishaw Jul 10, 2024
f102434
Update CHANGELOG.md for 1.17.2 1.16.6 and 1.15.12 (#27753)
ldilalla-HC Jul 10, 2024
2d7a3fb
PKI: Refactor common role path policy code into common area (#27759)
stevendpclark Jul 11, 2024
a2a1318
Add custom tags section to sync overview, denote normalized values (#…
robmonte Jul 11, 2024
979cf90
don't regenerate mirage data if the date range has already been queri…
hashishaw Jul 11, 2024
56b3208
add a retry-command script (#27754)
raskchanky Jul 12, 2024
815a075
Update go.mod and sdk/go.mod to Go 1.22 (#27771)
Jul 15, 2024
1392536
Docs: PGP & gpg version requirements with ECDH & Vault 1.13.x or high…
aphorise Jul 15, 2024
3d4f00a
Docs: autosnapshots notes around AWS EKS & S3 configuration requirmen…
aphorise Jul 15, 2024
d211602
UI: Move useOpenApi and getHelpUrl methods to util (#27764)
hashishaw Jul 15, 2024
d9cd3a0
[VAULT-28666] Retry staticcheck download on failure in GitHub Actions…
kubawi Jul 15, 2024
d35a915
UI: Refactor auth controller so it does less (#27710)
hellobontempo Jul 15, 2024
b7d9008
[VAULT-28666] Retry tool download from GitHub releases on failure in …
kubawi Jul 16, 2024
bf569c3
remove redundant call to set token in tests (#27723)
fairclothjm Jul 16, 2024
3d827a9
modal implementation
Monkeychip Jul 16, 2024
ce90410
Update docs around dead_server_last_contact_threshold (#27793)
VioletHynes Jul 16, 2024
e88b6b1
UI: update overview card action handling (#27785)
hellobontempo Jul 16, 2024
d444a32
docs: add missing rotation_statements to mssql api docs (#27800)
fairclothjm Jul 17, 2024
050a90b
UI: Update date-picker UX in Client Counts (#27796)
hashishaw Jul 17, 2024
a844800
test coverage
Monkeychip Jul 17, 2024
4a2586b
not necessary
Monkeychip Jul 17, 2024
3f90e9a
docs: add missing rotation_statements to oracle docs (#27802)
fairclothjm Jul 17, 2024
5685ba0
Update ui/app/components/modal-form/oidc-key-template.js
Monkeychip Jul 18, 2024
77b94aa
Update ui/app/components/mount-backend-form.hbs
Monkeychip Jul 18, 2024
7c4b650
Update ui/app/components/oidc/key-form.js
Monkeychip Jul 18, 2024
deed1c5
Update ui/tests/acceptance/settings/mount-secret-backend-test.js
Monkeychip Jul 18, 2024
c11a8fc
review comments
Monkeychip Jul 18, 2024
f959f46
name audit logger for standardUnsealStrategy's unseal (#27806)
Jul 18, 2024
6cdeaaf
blah for accepting via gh code editor, prettier problems
Monkeychip Jul 18, 2024
0650058
Update ui/app/components/mount-backend-form.ts
Monkeychip Jul 18, 2024
710f0f0
acceptance test 🫠
Monkeychip Jul 19, 2024
39b99b2
Audit: log 'warnings' from eventlogger even if audit is deemed a succ…
Jul 19, 2024
d6a588b
db: refactor postgres test helpers (#27811)
fairclothjm Jul 19, 2024
b904f3a
gosh prettier strikes again from gh fix
Monkeychip Jul 19, 2024
951d122
extra test coverage and if issue with pressing back button
Monkeychip Jul 19, 2024
7d6986c
Docs: Add a Priority matching policy example using Namespaces (#27792)
Altabay-HashiCorp Jul 19, 2024
d5e836b
Title case all static breadcrumbs (#27808)
Monkeychip Jul 19, 2024
7ca1662
Fixing typo "auth_auth" should be "auto_auth" (#27758)
johnnyf-hcp Jul 19, 2024
f1aa3bd
[Docs] Add a warning about namespace info for HVD (#27812)
yhyakuna Jul 19, 2024
6d4cb5e
Docs update for vault helm v0.28.1 release (#27766)
tvoran Jul 20, 2024
4b8ecf5
VAULT-28329: Fix `months` activity log counts when querying for a nam…
miagilepner Jul 22, 2024
7235c26
docs/vso: instant updates (#27668)
tvoran Jul 22, 2024
fb5000c
Update VSO docs for auto CRD upgrade behaviour (#27763)
benashz Jul 22, 2024
137bba2
VSO: update docs for VaultAuthGlobals (#27797)
benashz Jul 22, 2024
c37985b
Bump google.golang.org/grpc from 1.64.0 to 1.64.1 (#27737)
dependabot[bot] Jul 22, 2024
f248262
CE no-op CensusManager (#27827)
mpalmi Jul 22, 2024
dbecbce
VAULT-27384 Fix faulty assignments and unchecked errors (#27810)
VioletHynes Jul 22, 2024
6a6a35a
Bump VSO versions to 0.8.0 (#27835)
benashz Jul 22, 2024
575a632
UI: upgrade HDS to 4.6.0 (#27843)
hellobontempo Jul 23, 2024
74d15e3
[VAULT-28666] Remove the errexit option from the retry script and add…
kubawi Jul 23, 2024
b32231a
Deprecate distinct_entities and nont_entity_tokens (#27830)
divyaac Jul 23, 2024
08b5d87
UI: Move OIDC key header out of form component (#27848)
hellobontempo Jul 23, 2024
920c089
[VAULT-28666] Enable the --clobber flag on GitHub CLI release downloa…
kubawi Jul 24, 2024
ec399e6
VAULT-27563 CE changes (#27847)
VioletHynes Jul 24, 2024
a28464b
Add non-root access with filtering support to activity export API (#2…
ccapurso Jul 24, 2024
ecc0260
address pr comments
Monkeychip Jul 24, 2024
10d15c7
UI: Fix ACME Account Safety Buffer not able to be turned off (#27742)
hashishaw Jul 10, 2024
4a3e1d7
Update CHANGELOG.md for 1.17.2 1.16.6 and 1.15.12 (#27753)
ldilalla-HC Jul 10, 2024
082234b
PKI: Refactor common role path policy code into common area (#27759)
stevendpclark Jul 11, 2024
86f7123
Add custom tags section to sync overview, denote normalized values (#…
robmonte Jul 11, 2024
b92c0d3
don't regenerate mirage data if the date range has already been queri…
hashishaw Jul 11, 2024
74316bb
add a retry-command script (#27754)
raskchanky Jul 12, 2024
0204c02
Update go.mod and sdk/go.mod to Go 1.22 (#27771)
Jul 15, 2024
2669a7c
Docs: PGP & gpg version requirements with ECDH & Vault 1.13.x or high…
aphorise Jul 15, 2024
1bdd648
Docs: autosnapshots notes around AWS EKS & S3 configuration requirmen…
aphorise Jul 15, 2024
79b37c9
UI: Move useOpenApi and getHelpUrl methods to util (#27764)
hashishaw Jul 15, 2024
c590bde
[VAULT-28666] Retry staticcheck download on failure in GitHub Actions…
kubawi Jul 15, 2024
d9fcc5c
UI: Refactor auth controller so it does less (#27710)
hellobontempo Jul 15, 2024
2e9b6db
[VAULT-28666] Retry tool download from GitHub releases on failure in …
kubawi Jul 16, 2024
c1c7f0c
remove redundant call to set token in tests (#27723)
fairclothjm Jul 16, 2024
38daf66
Update docs around dead_server_last_contact_threshold (#27793)
VioletHynes Jul 16, 2024
e32033d
UI: update overview card action handling (#27785)
hellobontempo Jul 16, 2024
f9c3636
docs: add missing rotation_statements to mssql api docs (#27800)
fairclothjm Jul 17, 2024
718e9ab
UI: Update date-picker UX in Client Counts (#27796)
hashishaw Jul 17, 2024
d400702
docs: add missing rotation_statements to oracle docs (#27802)
fairclothjm Jul 17, 2024
572d07b
name audit logger for standardUnsealStrategy's unseal (#27806)
Jul 18, 2024
f14bb05
Audit: log 'warnings' from eventlogger even if audit is deemed a succ…
Jul 19, 2024
a4ae97c
db: refactor postgres test helpers (#27811)
fairclothjm Jul 19, 2024
60d802c
Docs: Add a Priority matching policy example using Namespaces (#27792)
Altabay-HashiCorp Jul 19, 2024
499e806
Title case all static breadcrumbs (#27808)
Monkeychip Jul 19, 2024
f8ce9d7
Fixing typo "auth_auth" should be "auto_auth" (#27758)
johnnyf-hcp Jul 19, 2024
a664fc5
[Docs] Add a warning about namespace info for HVD (#27812)
yhyakuna Jul 19, 2024
3933323
Docs update for vault helm v0.28.1 release (#27766)
tvoran Jul 20, 2024
81e9e25
VAULT-28329: Fix `months` activity log counts when querying for a nam…
miagilepner Jul 22, 2024
b404411
docs/vso: instant updates (#27668)
tvoran Jul 22, 2024
92917a2
Update VSO docs for auto CRD upgrade behaviour (#27763)
benashz Jul 22, 2024
54b75bd
VSO: update docs for VaultAuthGlobals (#27797)
benashz Jul 22, 2024
bdd15e3
Bump google.golang.org/grpc from 1.64.0 to 1.64.1 (#27737)
dependabot[bot] Jul 22, 2024
e28feae
CE no-op CensusManager (#27827)
mpalmi Jul 22, 2024
572ccb6
VAULT-27384 Fix faulty assignments and unchecked errors (#27810)
VioletHynes Jul 22, 2024
c316ce7
Bump VSO versions to 0.8.0 (#27835)
benashz Jul 22, 2024
d43cb60
UI: upgrade HDS to 4.6.0 (#27843)
hellobontempo Jul 23, 2024
0e48c0b
[VAULT-28666] Remove the errexit option from the retry script and add…
kubawi Jul 23, 2024
aed577e
Deprecate distinct_entities and nont_entity_tokens (#27830)
divyaac Jul 23, 2024
fc20264
UI: Move OIDC key header out of form component (#27848)
hellobontempo Jul 23, 2024
5dbd1d1
[VAULT-28666] Enable the --clobber flag on GitHub CLI release downloa…
kubawi Jul 24, 2024
a5a578e
VAULT-27563 CE changes (#27847)
VioletHynes Jul 24, 2024
28f5827
Add non-root access with filtering support to activity export API (#2…
ccapurso Jul 24, 2024
1aae5d7
Merge branch 'main' into ui/VAULT-28459/add-modal
Monkeychip Jul 24, 2024
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
12 changes: 6 additions & 6 deletions .github/actions/install-external-tools/action.yml
Original file line number Diff line number Diff line change
Expand Up @@ -21,15 +21,15 @@ runs:
- uses: ./.github/actions/set-up-staticcheck
# We assume that the Go toolchain will be managed by the caller workflow so we don't set one
# up here.
- run: go install google.golang.org/protobuf/cmd/protoc-gen-go@latest
- run: ./.github/scripts/retry-command.sh go install google.golang.org/protobuf/cmd/protoc-gen-go@latest
shell: bash
- run: go install google.golang.org/grpc/cmd/protoc-gen-go-grpc@latest
- run: ./.github/scripts/retry-command.sh go install google.golang.org/grpc/cmd/protoc-gen-go-grpc@latest
shell: bash
- run: go install github.com/favadi/protoc-go-inject-tag@latest
- run: ./.github/scripts/retry-command.sh go install github.com/favadi/protoc-go-inject-tag@latest
shell: bash
- run: go install golang.org/x/tools/cmd/goimports@latest
- run: ./.github/scripts/retry-command.sh go install golang.org/x/tools/cmd/goimports@latest
shell: bash
- run: go install github.com/golangci/revgrep/cmd/revgrep@latest
- run: ./.github/scripts/retry-command.sh go install github.com/golangci/revgrep/cmd/revgrep@latest
shell: bash
- run: go install github.com/loggerhead/enumer@latest
- run: ./.github/scripts/retry-command.sh go install github.com/loggerhead/enumer@latest
shell: bash
2 changes: 1 addition & 1 deletion .github/actions/set-up-buf/action.yml
Original file line number Diff line number Diff line change
Expand Up @@ -60,7 +60,7 @@ runs:
fi

mkdir -p tmp
gh release download "$VERSION" -p "buf-${OS}-${ARCH}.tar.gz" -O tmp/buf.tgz -R bufbuild/buf
./.github/scripts/retry-command.sh gh release download "$VERSION" --clobber -p "buf-${OS}-${ARCH}.tar.gz" -O tmp/buf.tgz -R bufbuild/buf
pushd tmp && tar -xvf buf.tgz && popd
mv tmp/buf/bin/buf "$DESTINATION"
rm -rf tmp
2 changes: 1 addition & 1 deletion .github/actions/set-up-gofumpt/action.yml
Original file line number Diff line number Diff line change
Expand Up @@ -56,6 +56,6 @@ runs:
export OS="darwin"
fi

gh release download "$VERSION" -p "gofumpt_*_${OS}_${ARCH}" -O gofumpt -R mvdan/gofumpt
./.github/scripts/retry-command.sh gh release download "$VERSION" --clobber -p "gofumpt_*_${OS}_${ARCH}" -O gofumpt -R mvdan/gofumpt
chmod +x gofumpt
mv gofumpt "$DESTINATION"
2 changes: 1 addition & 1 deletion .github/actions/set-up-gosimports/action.yml
Original file line number Diff line number Diff line change
Expand Up @@ -57,7 +57,7 @@ runs:
fi

mkdir -p tmp
gh release download "$VERSION" -p "gosimports_*_${OS}_${ARCH}.tar.gz" -O tmp/gosimports.tgz -R rinchsan/gosimports
./.github/scripts/retry-command.sh gh release download "$VERSION" --clobber -p "gosimports_*_${OS}_${ARCH}.tar.gz" -O tmp/gosimports.tgz -R rinchsan/gosimports
pushd tmp && tar -xvf gosimports.tgz && popd
mv tmp/gosimports "$DESTINATION"
rm -rf tmp
2 changes: 1 addition & 1 deletion .github/actions/set-up-gotestsum/action.yml
Original file line number Diff line number Diff line change
Expand Up @@ -54,7 +54,7 @@ runs:
fi

mkdir -p tmp
gh release download "$VERSION" -p "*${OS}_${ARCH}.tar.gz" -O tmp/gotestsum.tgz -R gotestyourself/gotestsum
./.github/scripts/retry-command.sh gh release download "$VERSION" --clobber -p "*${OS}_${ARCH}.tar.gz" -O tmp/gotestsum.tgz -R gotestyourself/gotestsum
pushd tmp && tar -xvf gotestsum.tgz && popd
mv tmp/gotestsum "$DESTINATION"
rm -rf tmp
2 changes: 1 addition & 1 deletion .github/actions/set-up-misspell/action.yml
Original file line number Diff line number Diff line change
Expand Up @@ -57,7 +57,7 @@ runs:
fi

mkdir -p tmp
gh release download "$VERSION" -p "misspell_*_${OS}_${ARCH}.tar.gz" -O tmp/misspell.tgz -R golangci/misspell
./.github/scripts/retry-command.sh gh release download "$VERSION" --clobber -p "misspell_*_${OS}_${ARCH}.tar.gz" -O tmp/misspell.tgz -R golangci/misspell
pushd tmp && tar -xvf misspell.tgz && popd
mv tmp/misspell_"$(echo "$VERSION" | tr -d v)"_${OS}_${ARCH}/misspell "$DESTINATION"
rm -rf tmp
2 changes: 1 addition & 1 deletion .github/actions/set-up-staticcheck/action.yml
Original file line number Diff line number Diff line change
Expand Up @@ -57,7 +57,7 @@ runs:
fi

mkdir -p tmp
gh release download "$VERSION" -p "staticcheck_${OS}_${ARCH}.tar.gz" -O tmp/staticcheck.tgz -R dominikh/go-tools
./.github/scripts/retry-command.sh gh release download "$VERSION" --clobber -p "staticcheck_${OS}_${ARCH}.tar.gz" -O tmp/staticcheck.tgz -R dominikh/go-tools
pushd tmp && tar -xvf staticcheck.tgz && popd
mv tmp/staticcheck/staticcheck "$DESTINATION"
rm -rf tmp
18 changes: 18 additions & 0 deletions .github/scripts/retry-command.sh
Original file line number Diff line number Diff line change
@@ -0,0 +1,18 @@
#!/usr/bin/env bash
# Copyright (c) HashiCorp, Inc.
# SPDX-License-Identifier: BUSL-1.1
set -uo pipefail

tries=5
count=0

until "$@"
do
if [ $count -eq $tries ]; then
echo "tried $count times, exiting"
exit 1
fi
((count++))
echo "trying again, attempt $count"
sleep $count
done
61 changes: 61 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,31 @@
- [v1.0.0 - v1.9.10](CHANGELOG-pre-v1.10.md)
- [v0.11.6 and earlier](CHANGELOG-v0.md)

## 1.17.2
### July 10, 2024

CHANGES:

* core: Bump Go version to 1.22.5
* secrets/azure: Update plugin to v0.19.2 [[GH-27652](https://github.com/hashicorp/vault/pull/27652)]

FEATURES:

* **AWS secrets engine STS session tags support**: Adds support for setting STS
session tags when generating temporary credentials using the AWS secrets
engine. [[GH-27620](https://github.com/hashicorp/vault/pull/27620)]

BUG FIXES:

* cli: Fixed issue with `vault hcp connect` where HCP resources with uppercase letters were inaccessible when entering the correct project name. [[GH-27694](https://github.com/hashicorp/vault/pull/27694)]
* core (enterprise): Fix HTTP redirects in namespaces to use the correct path and (in the case of event subscriptions) the correct URI scheme. [[GH-27660](https://github.com/hashicorp/vault/pull/27660)]
* core/config: fix issue when using `proxy_protocol_behavior` with `deny_unauthorized`,
which causes the Vault TCP listener to close after receiving an untrusted upstream proxy connection. [[GH-27589](https://github.com/hashicorp/vault/pull/27589)]
* core: Fixed an issue with performance standbys not being able to handle rotate root requests. [[GH-27631](https://github.com/hashicorp/vault/pull/27631)]
* secrets/transit (enterprise): Fix an issue that caused input data be returned as part of generated CMAC values.
* ui: Display an error and force a timeout when TOTP passcode is incorrect [[GH-27574](https://github.com/hashicorp/vault/pull/27574)]
* ui: Ensure token expired banner displays when batch token expires [[GH-27479](https://github.com/hashicorp/vault/pull/27479)]

## 1.17.1
### June 26, 2024

Expand Down Expand Up @@ -227,6 +252,25 @@ autopilot to fail to discover new server versions and so not trigger an upgrade.
* ui: fixed a bug where the replication pages did not update display when navigating between DR and performance [[GH-26325](https://github.com/hashicorp/vault/pull/26325)]
* ui: fixes undefined start time in filename for downloaded client count attribution csv [[GH-26485](https://github.com/hashicorp/vault/pull/26485)]

## 1.16.6 Enterprise
### July 10, 2024
**Enterprise LTS:** Vault Enterprise 1.16 is a [Long-Term Support (LTS)](https://developer.hashicorp.com/vault/docs/enterprise/lts) release.

CHANGES:

* core: Bump Go version to 1.22.5.
* auth/jwt: Revert [GH-295](https://github.com/hashicorp/vault-plugin-auth-jwt/pull/295) which changed the way JWT `aud` claims were validated.

BUG FIXES:

* agent: Correctly constructs kv-v2 secret paths in nested namespaces. [[GH-26863](https://github.com/hashicorp/vault/pull/26863)]
* core (enterprise): Fix HTTP redirects in namespaces to use the correct path and (in the case of event subscriptions) the correct URI scheme. [[GH-27660](https://github.com/hashicorp/vault/pull/27660)]
* core/config: fix issue when using `proxy_protocol_behavior` with `deny_unauthorized`,
which causes the Vault TCP listener to close after receiving an untrusted upstream proxy connection. [[GH-27589](https://github.com/hashicorp/vault/pull/27589)]
* core: Fixed an issue with performance standbys not being able to handle rotate root requests. [[GH-27631](https://github.com/hashicorp/vault/pull/27631)]
* ui: Display an error and force a timeout when TOTP passcode is incorrect [[GH-27574](https://github.com/hashicorp/vault/pull/27574)]
* ui: Ensure token expired banner displays when batch token expires [[GH-27479](https://github.com/hashicorp/vault/pull/27479)]

## 1.16.5 Enterprise
### June 26, 2024

Expand Down Expand Up @@ -728,6 +772,23 @@ leading to failure to complete merkle sync without a full re-index. [[GH-23013](
* ui: remove user_lockout_config settings for unsupported methods [[GH-25867](https://github.com/hashicorp/vault/pull/25867)]
* ui: show error from API when seal fails [[GH-23921](https://github.com/hashicorp/vault/pull/23921)]

## 1.15.12 Enterprise
### July 10, 2024

CHANGES:

* core: Bump Go version to 1.22.5.
* auth/jwt: Revert [GH-295](https://github.com/hashicorp/vault-plugin-auth-jwt/pull/295) which changed the way JWT `aud` claims were validated.

BUG FIXES:

* core (enterprise): Fix HTTP redirects in namespaces to use the correct path and (in the case of event subscriptions) the correct URI scheme. [[GH-27660](https://github.com/hashicorp/vault/pull/27660)]
* core/config: fix issue when using `proxy_protocol_behavior` with `deny_unauthorized`,
which causes the Vault TCP listener to close after receiving an untrusted upstream proxy connection. [[GH-27589](https://github.com/hashicorp/vault/pull/27589)]
* core: Fixed an issue with performance standbys not being able to handle rotate root requests. [[GH-27631](https://github.com/hashicorp/vault/pull/27631)]
* ui: Display an error and force a timeout when TOTP passcode is incorrect [[GH-27574](https://github.com/hashicorp/vault/pull/27574)]
* ui: Ensure token expired banner displays when batch token expires [[GH-27479](https://github.com/hashicorp/vault/pull/27479)]

## 1.15.11 Enterprise
### June 26, 2024

Expand Down
1 change: 1 addition & 0 deletions api/sudo_paths.go
Original file line number Diff line number Diff line change
Expand Up @@ -28,6 +28,7 @@ var sudoPaths = map[string]*regexp.Regexp{
"/sys/config/ui/headers": regexp.MustCompile(`^/sys/config/ui/headers/?$`),
"/sys/config/ui/headers/{header}": regexp.MustCompile(`^/sys/config/ui/headers/.+$`),
"/sys/internal/inspect/router/{tag}": regexp.MustCompile(`^/sys/internal/inspect/router/.+$`),
"/sys/internal/counters/activity/export": regexp.MustCompile(`^/sys/internal/counters/activity/export$`),
"/sys/leases": regexp.MustCompile(`^/sys/leases$`),
// This entry is a bit wrong... sys/leases/lookup does NOT require sudo. But sys/leases/lookup/ with a trailing
// slash DOES require sudo. But the part of the Vault CLI that uses this logic doesn't pass operation-appropriate
Expand Down
12 changes: 12 additions & 0 deletions audit/broker.go
Original file line number Diff line number Diff line change
Expand Up @@ -315,6 +315,12 @@ func (b *Broker) LogRequest(ctx context.Context, in *logical.LogInput) (ret erro

// Audit event ended up in at least 1 sink.
if len(status.CompleteSinks()) > 0 {
// We should log warnings to the operational logs regardless of whether
// we consider the overall auditing attempt to be successful.
if len(status.Warnings) > 0 {
b.logger.Error("log request underlying pipeline error(s)", "error", &multierror.Error{Errors: status.Warnings})
}

return retErr.ErrorOrNil()
}

Expand Down Expand Up @@ -397,6 +403,12 @@ func (b *Broker) LogResponse(ctx context.Context, in *logical.LogInput) (ret err

// Audit event ended up in at least 1 sink.
if len(status.CompleteSinks()) > 0 {
// We should log warnings to the operational logs regardless of whether
// we consider the overall auditing attempt to be successful.
if len(status.Warnings) > 0 {
b.logger.Error("log response underlying pipeline error(s)", "error", &multierror.Error{Errors: status.Warnings})
}

return retErr.ErrorOrNil()
}

Expand Down
12 changes: 6 additions & 6 deletions builtin/logical/database/backend_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -359,7 +359,7 @@ func TestBackend_BadConnectionString(t *testing.T) {
}
defer b.Cleanup(context.Background())

cleanup, _ := postgreshelper.PrepareTestContainer(t, "13.4-buster")
cleanup, _ := postgreshelper.PrepareTestContainer(t)
defer cleanup()

respCheck := func(req *logical.Request) {
Expand Down Expand Up @@ -410,7 +410,7 @@ func TestBackend_basic(t *testing.T) {
}
defer b.Cleanup(context.Background())

cleanup, connURL := postgreshelper.PrepareTestContainer(t, "13.4-buster")
cleanup, connURL := postgreshelper.PrepareTestContainer(t)
defer cleanup()

// Configure a connection
Expand Down Expand Up @@ -665,7 +665,7 @@ func TestBackend_connectionCrud(t *testing.T) {
dbFactory.sys = sys
client := cluster.Cores[0].Client.Logical()

cleanup, connURL := postgreshelper.PrepareTestContainer(t, "13.4-buster")
cleanup, connURL := postgreshelper.PrepareTestContainer(t)
defer cleanup()

// Mount the database plugin.
Expand Down Expand Up @@ -872,7 +872,7 @@ func TestBackend_roleCrud(t *testing.T) {
}
defer b.Cleanup(context.Background())

cleanup, connURL := postgreshelper.PrepareTestContainer(t, "13.4-buster")
cleanup, connURL := postgreshelper.PrepareTestContainer(t)
defer cleanup()

// Configure a connection
Expand Down Expand Up @@ -1121,7 +1121,7 @@ func TestBackend_allowedRoles(t *testing.T) {
}
defer b.Cleanup(context.Background())

cleanup, connURL := postgreshelper.PrepareTestContainer(t, "13.4-buster")
cleanup, connURL := postgreshelper.PrepareTestContainer(t)
defer cleanup()

// Configure a connection
Expand Down Expand Up @@ -1318,7 +1318,7 @@ func TestBackend_RotateRootCredentials(t *testing.T) {
}
defer b.Cleanup(context.Background())

cleanup, connURL := postgreshelper.PrepareTestContainer(t, "13.4-buster")
cleanup, connURL := postgreshelper.PrepareTestContainer(t)
defer cleanup()

connURL = strings.ReplaceAll(connURL, "postgres:secret", "{{username}}:{{password}}")
Expand Down
8 changes: 4 additions & 4 deletions builtin/logical/database/path_roles_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -222,7 +222,7 @@ func TestBackend_StaticRole_Config(t *testing.T) {
}
defer b.Cleanup(context.Background())

cleanup, connURL := postgreshelper.PrepareTestContainer(t, "")
cleanup, connURL := postgreshelper.PrepareTestContainer(t)
defer cleanup()

// create the database user
Expand Down Expand Up @@ -487,7 +487,7 @@ func TestBackend_StaticRole_ReadCreds(t *testing.T) {
}
defer b.Cleanup(context.Background())

cleanup, connURL := postgreshelper.PrepareTestContainer(t, "")
cleanup, connURL := postgreshelper.PrepareTestContainer(t)
defer cleanup()

// create the database user
Expand Down Expand Up @@ -667,7 +667,7 @@ func TestBackend_StaticRole_Updates(t *testing.T) {
}
defer b.Cleanup(context.Background())

cleanup, connURL := postgreshelper.PrepareTestContainer(t, "")
cleanup, connURL := postgreshelper.PrepareTestContainer(t)
defer cleanup()

// create the database user
Expand Down Expand Up @@ -966,7 +966,7 @@ func TestBackend_StaticRole_Role_name_check(t *testing.T) {
}
defer b.Cleanup(context.Background())

cleanup, connURL := postgreshelper.PrepareTestContainer(t, "")
cleanup, connURL := postgreshelper.PrepareTestContainer(t)
defer cleanup()

// create the database user
Expand Down
6 changes: 3 additions & 3 deletions builtin/logical/database/rollback_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -44,7 +44,7 @@ func TestBackend_RotateRootCredentials_WAL_rollback(t *testing.T) {
}
defer lb.Cleanup(context.Background())

cleanup, connURL := postgreshelper.PrepareTestContainer(t, "")
cleanup, connURL := postgreshelper.PrepareTestContainer(t)
defer cleanup()

connURL = strings.ReplaceAll(connURL, "postgres:secret", "{{username}}:{{password}}")
Expand Down Expand Up @@ -183,7 +183,7 @@ func TestBackend_RotateRootCredentials_WAL_no_rollback_1(t *testing.T) {
}
defer lb.Cleanup(context.Background())

cleanup, connURL := postgreshelper.PrepareTestContainer(t, "")
cleanup, connURL := postgreshelper.PrepareTestContainer(t)
defer cleanup()

connURL = strings.ReplaceAll(connURL, "postgres:secret", "{{username}}:{{password}}")
Expand Down Expand Up @@ -291,7 +291,7 @@ func TestBackend_RotateRootCredentials_WAL_no_rollback_2(t *testing.T) {
}
defer lb.Cleanup(context.Background())

cleanup, connURL := postgreshelper.PrepareTestContainer(t, "")
cleanup, connURL := postgreshelper.PrepareTestContainer(t)
defer cleanup()

connURL = strings.ReplaceAll(connURL, "postgres:secret", "{{username}}:{{password}}")
Expand Down
16 changes: 8 additions & 8 deletions builtin/logical/database/rotation_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -63,7 +63,7 @@ func TestBackend_StaticRole_Rotation_basic(t *testing.T) {

b.schedule = &TestSchedule{}

cleanup, connURL := postgreshelper.PrepareTestContainer(t, "")
cleanup, connURL := postgreshelper.PrepareTestContainer(t)
defer cleanup()

// create the database user
Expand Down Expand Up @@ -274,7 +274,7 @@ func TestBackend_StaticRole_Rotation_Schedule_ErrorRecover(t *testing.T) {

b.schedule = &TestSchedule{}

cleanup, connURL := postgreshelper.PrepareTestContainer(t, "")
cleanup, connURL := postgreshelper.PrepareTestContainer(t)
t.Cleanup(cleanup)

// create the database user
Expand Down Expand Up @@ -458,7 +458,7 @@ func TestBackend_StaticRole_Rotation_NonStaticError(t *testing.T) {
}
defer b.Cleanup(context.Background())

cleanup, connURL := postgreshelper.PrepareTestContainer(t, "")
cleanup, connURL := postgreshelper.PrepareTestContainer(t)
defer cleanup()

// create the database user
Expand Down Expand Up @@ -562,7 +562,7 @@ func TestBackend_StaticRole_Rotation_Revoke_user(t *testing.T) {
}
defer b.Cleanup(context.Background())

cleanup, connURL := postgreshelper.PrepareTestContainer(t, "")
cleanup, connURL := postgreshelper.PrepareTestContainer(t)
defer cleanup()

// create the database user
Expand Down Expand Up @@ -783,7 +783,7 @@ func TestBackend_StaticRole_Rotation_QueueWAL_discard_role_newer_rotation_date(t
t.Fatal("could not convert to db backend")
}

cleanup, connURL := postgreshelper.PrepareTestContainer(t, "")
cleanup, connURL := postgreshelper.PrepareTestContainer(t)
defer cleanup()

// create the database user
Expand Down Expand Up @@ -952,7 +952,7 @@ func assertWALCount(t *testing.T, s logical.Storage, expected int, key string) {
type userCreator func(t *testing.T, username, password string)

func TestBackend_StaticRole_Rotation_PostgreSQL(t *testing.T) {
cleanup, connURL := postgreshelper.PrepareTestContainer(t, "13.4-buster")
cleanup, connURL := postgreshelper.PrepareTestContainer(t)
defer cleanup()
uc := userCreator(func(t *testing.T, username, password string) {
createTestPGUser(t, connURL, username, password, testRoleStaticCreate)
Expand Down Expand Up @@ -1246,7 +1246,7 @@ func TestBackend_StaticRole_Rotation_LockRegression(t *testing.T) {
}
defer b.Cleanup(context.Background())

cleanup, connURL := postgreshelper.PrepareTestContainer(t, "")
cleanup, connURL := postgreshelper.PrepareTestContainer(t)
defer cleanup()

// Configure a connection
Expand Down Expand Up @@ -1325,7 +1325,7 @@ func TestBackend_StaticRole_Rotation_Invalid_Role(t *testing.T) {
}
defer b.Cleanup(context.Background())

cleanup, connURL := postgreshelper.PrepareTestContainer(t, "")
cleanup, connURL := postgreshelper.PrepareTestContainer(t)
defer cleanup()

// create the database user
Expand Down
Loading