Commit graph

1611 commits

Author SHA1 Message Date
Pedro Algarvio
82e4e2b55f
Merge 3006.x into 3007.x 2024-01-16 11:50:44 +00:00
Pedro Algarvio
96d60f3a11 Update changelog to include the Jinja security update
Signed-off-by: Pedro Algarvio <palgarvio@vmware.com>
2024-01-16 09:26:17 +00:00
Pedro Algarvio
6fb35bf88f Bump to gitpython==3.1.41 due to https://github.com/advisories/GHSA-2mqj-m65w-jghx
Signed-off-by: Pedro Algarvio <palgarvio@vmware.com>
2024-01-16 09:23:16 +00:00
Pedro Algarvio
d3fad04d9e Bump to pycryptodome==3.19.1 and pycryptodomex==3.19.1 due to https://github.com/advisories/GHSA-j225-cvw7-qrx7
Signed-off-by: Pedro Algarvio <palgarvio@vmware.com>
2024-01-16 09:23:16 +00:00
Daniel A. Wozniak
32aa7d4b67 Add missing master cluster changelog 2024-01-11 07:51:51 +00:00
Pedro Algarvio
68ecf808e3
Merge 3006.x into 3007.x 2024-01-05 11:29:13 +00:00
Daniel A. Wozniak
d2d34303dd Fix un-closed tranport in tornado netapi 2024-01-04 14:49:19 -07:00
David Murphy
f9d456bf10
Updated use of base64_b64encode and change log 2024-01-03 14:57:41 -07:00
jeanluc
47b8836f94 Add logmod SSH wrapper 2024-01-02 14:17:43 -07:00
jeanluc
d9b25d475d Add defaults SSH wrapper module
This is a 1:1 copy of the execution module, incl. tests...
2024-01-02 14:17:43 -07:00
jeanluc
515d0ff503 Add SSH wrapper for cmd.script 2024-01-02 14:17:43 -07:00
jeanluc
f38d1f7467 Add slsutil SSH wrapper 2024-01-02 14:17:43 -07:00
jeanluc
fd588f754e Sync config SSH wrapper with execution module
The wrapper has diverged significantly from the module.

* `option` did not check grains
* `option` did not have `omit_all` and `wildcard` parameters
* `get` missed several parameters: `delimiter`, `merge` and all `omit_*`
* There was no wrapping function for `items`.
2024-01-02 14:17:43 -07:00
jeanluc
4a35d6f47f Add state.test to SSH wrapper 2024-01-02 14:17:43 -07:00
Lee Clemens
6e1351679b Add changelog 2023-12-28 02:17:50 -07:00
Jonatan Sundeen
c1a0cb45db Added changelog 2023-12-28 02:14:23 -07:00
Lee Clemens
64834d821a Update changelog file syntax 2023-12-28 02:13:25 -07:00
Lee Clemens
a47eeb909c Report failures and error information.
Replace stdout in cases of success with known value for state to evaluate.
Update response handling in states.

Fixes #60500
2023-12-28 02:13:25 -07:00
Lee Clemens
c5ec77d36e Add changelog 2023-12-28 02:11:54 -07:00
Daniel A. Wozniak
abe92390c3 Fix nonsensical in fileclient timeout error message 2023-12-27 21:30:12 -07:00
Daniel A. Wozniak
874698b9fb Merge branch '3006.x' into merge-forward 2023-12-23 00:50:54 -07:00
David Murphy
70c22eff62 Removed PR 65185 changes since incomplete solution 2023-12-22 22:09:16 -07:00
David Murphy
4a8908cd11 Ensure initial _sync_grains only occurs if masterless minion in class SMinion initialization 2023-12-22 22:09:16 -07:00
Daniel A. Wozniak
57d046a7db Add changelog for #65691 2023-12-22 09:47:16 -07:00
Carlos Álvaro
0a88399996 fix: Fix typo in changelog 2023-12-21 21:35:46 -07:00
Carlos Álvaro
3309126c88 changelog: Add changelog for PR #64924 2023-12-21 21:35:46 -07:00
jeanluc
fbb6728179 Make Salt-SSH sync custom utils 2023-12-21 12:05:06 -07:00
Gareth J. Greenaway
9f5a1a7f4b Include changes in the results when schedule.present state is run with test=True. 2023-12-21 12:04:18 -07:00
Hristo Voyvodov
53c7e6be4f fixes saltstack#53120 State firewalld.present disables masquerade when making unrelated changes
This will set masquerade to None by default, thus not making changes
without explicit request from the user.
2023-12-18 20:39:20 -07:00
jeanluc
d6863fd79a Cleanup, add changelog entry for compound issue 2023-12-18 10:16:04 -07:00
jeanluc
808699f343 Make salt-ssh more strict when handling unexpected situations
This commit ensures that output indicating failure is not
passed off as the output of the command when it is called
via `__salt__`, e.g. during template rendering or in wrapper
modules. It does this by raising exceptions when issues
are detected and thus simulates the remote error locally.
See issue #64531 for a detailed description.
2023-12-18 10:16:04 -07:00
jeanluc
56ad1ec942 Fix saltext vault/pushover docs
* the correct organization is `salt-extensions`, not `saltstack`
* the release file is strict GitHub-flavoured Markdown only
2023-12-18 03:42:28 -07:00
Roald Nefs
60b890b800 Fix pre-commit
Signed-off-by: Roald Nefs <info@roaldnefs.com>
2023-12-16 18:26:29 -07:00
Wayne Werner
8dc4160a6a Fix potential bug, add changelog
In the source for redis, the default value for password is None, not "".
If the default is an empty string that may cause some unintended
consequences -- though it's entirely possible that Redis does not
support empty passwords, it's always safer to match the underlying
existing codebase.
2023-12-16 18:26:29 -07:00
vzhestkov
a5599d6c89 Add changelog entry 2023-12-16 14:48:10 -07:00
Michael Calmer
745e5f00f5 add changelog 2023-12-16 04:49:17 -07:00
Daniel A. Wozniak
37d4aa2615 Add changelog for #55687 2023-12-16 04:34:23 -07:00
jeanluc
c8c0633488 Bring code up to current standards 2023-12-16 04:32:10 -07:00
jeanluc
0ff2d2b7a8 Add signature verification to file.managed/archive.extracted 2023-12-16 04:32:10 -07:00
Michael Calmer
8a92dfca61 fixup! add changelog 2023-12-16 04:31:08 -07:00
Michael Calmer
cebe1e6cf4 add changelog 2023-12-16 04:31:08 -07:00
jeanluc
8da445b9f4 Make x509_v2 compound match detection use match runner 2023-12-16 01:27:15 -07:00
nicholasmhughes
a66c4fc174 fixes saltstack/salt#53982 add ability to use file.managed style check_cmd in file.serialize 2023-12-16 01:19:19 -07:00
Gareth J. Greenaway
5707801e8c Adding a changelog. 2023-12-16 01:17:47 -07:00
nicholasmhughes
a05205bb4f use sentence case instead of title case for headings 2023-12-15 21:46:44 -07:00
nicholasmhughes
93e906203d add changelog 2023-12-15 21:46:44 -07:00
jeanluc
f2121e5ade
Rewrite vault core, issue AppRoles to minions (#62684)
* Rewrite vault core, orchestrate AppRoles for minions

This commit represents a fundamental rewrite in how Salt interacts with
Vault. The master should still be compatible with minions running the
old code. There should be no breaking changes to public interfaces and
the old configuration format should still apply.

Core:
- Issue AppRoles to minions
- Manage entities with templatable metadata for minions
- Use inbuilt Salt cache
- Separate config cache from token cache
- Cache: introduce connection-scope vs global scope

Utility module:
- Support being imported (__utils__ deprecation)
- Raise exceptions on queries to simplify response handling
- Add classes to wrap complexity, especially regarding KV v2
- Lay some groundwork for renewing tokens

Execution module:
- Add patch_secret
- Add version support to delete_secret
- Allow returning listed keys only in list_secret
- Add policy_[fetch/write/delete] and policies_list
- Add query for arbitrary API queries

State module:
- Make use of execution module
- Change output format

Docs:
- Update for new configuration format
- Correct examples
- Add configuration examples
- Add required policies

* Fix linting for rewritten vault integration

* Add pytest unit tests for utils.vault, fix found issues

* Fix old vault runner tests

* Rewrite vault sdb tests, migrate to pytests

* Adapt vault ext_pillar tests

* Adapt vault execution module tests, migrate to pytests

* Add more vault execution module unit tests

* Support python <3.7 (vault util), time-independent tests

* Add/migrate vault runner unit tests (pytest)

* Add vault state module pytests

* Fix tests lint

* Refactor Vault container fixture, move to session scope

* Fix for existing vault execution/sdb module integration tests

* Improve existing vault runner integration tests

* Fix vault test support, add list policies

* Add more functional execution module tests, fix deprecated warning

* Refactor vault pytest support

* Add integration tests, improve/fix caching/issue_params

* Improve caching behavior, fix tests

* Always use session cache as well
* Also flush session cache when requested
* Make KV metadata caching behavior configurable
* Update tests to account for changes from prev commit

* Allow to autodiscover platform default CA bundle

* Remove runner approle param overrides

There is no simple way to ensure they are kept.

* Add clear_cache runner function

* Also manage token metadata for issued secret IDs

* Cleanup tests

* Cleanup code, pylint logging suggestions

* Do not always invalidate config when verify=default

* Ensure concatted metadata lists are sorted

* Add changelog (partly)

* Work with legacy peer_run configuration as well

* Consume a token use regardless of status code

* Correct verify semantics

* Refine token uses handling, add changelog/tests for old issues

* Add changelog for main features

* Add test for issue 58580

* Fix vault docs

* Provide all old make_request functionality, add tests

* Allow token use override, add docstrings to query funcs

* Simplify config_location merge

* Cleanup

* Fix make_request warning

* Attempt to fix memory issues during CI test run

* Increase documented version

* Improve lease handling

* Refine lease ttl handling/add token lifecycle management

* Fix docs build

* Adapt formatting

* assert what you get against what you expect
* drop empty parentheses after wrapper
* use `is` to compare against strictly boolean vars

* Fix issue param overrides

* during pillar rendering, they were always reset by the master (for
  AppRoles)
* overrides were only respected for some settings (AppRoles)
* old config syntax was using the old syntax internally (tech debt)

* Introduce session-scoped cache

* Tokens with a single use left are unrenewable

* Allow override of flushing of cached leases during lookup

* Refactor cache classes, save lease data

* Rename session token cache key

* Add lease management utility

* Fix runner integration tests

after renaming the token cache key

* Do not overwrite data of cached leases after renewal

* Pass token_lifecycle to minions

* Do not fail syncing multiple approles/entities with pillar templates

* Ensure config cache expiration can be disabled

* Rename changelog files (.md)

* Declare vaultpolicylexer as parallel read safe

* Correct meta[data] payload key

For tokens it is `meta`, but for secret IDs, `metadata`.

* Reuse TCP connection

* Refactor utils module

* Ensure client is recreated after clearing cache

* Always use unwrap_client config as expected server

This should fix the test failure in the runner integration test
TestAppRoleIssuance::test_server_switch_does_not_break_minion_auth

* Ensure client is recreated after clearing cache 2

* Simulate patch for KV v1 or missing `patch` capability

* Add `patch` option to Vault SDB driver

* Reduce lease validity when revocation fails

* Extract AppRole/Identity API from runner into utils

* Revoke tokens, fire events, improve cache/exception handling

* Tokens (and therefore associated leases) are revoked when cleared by default
* It's possible to disable clearing cache when a perfectly valid token
  is available, but a PermissionDeniedError is encountered.
* UnwrapExceptions always cause an event to be fired
* It's possible to enable sending of events when
    a) cache is cleared
    b) a lease is requested from cache, but it is/will be invalid
* A VaultAuthException does not immediately lead to clearing
  the connection cache
* get_authd_client and others: multiple small enhancements and fixes

* Allow updating cached config w/o closing session

* Homogenize funcs, update docs, cleanup

* Minor internal fixes

`is_valid_for` is present on all lease-like objects, while `is_valid`
specifically should account for more, e.g. the number of uses.

The Vault API does not return 404 when a lookup fails.

* Add release note

* Address review remarks

* Fix release notes

* Remove loading minion_mods from factory

* Address other review remarks

* Add inline specification of trusted CA root cert

* Small QoL additions

* Fix lint

* Fix lint for Python >=3.8 support

* Add missing fixes

* Fix unit tests

In some cases, the `spec` calls were failing because the underlying
object was already patched

---------

Co-authored-by: Thomas Phipps <tphipps@vmware.com>
2023-12-15 21:42:08 -07:00
Alan Somers
a11b4d5252 Add a changelog entry 2023-12-15 21:33:09 -07:00
Zhiwei Liang
17076c1a8f Implement salt cloud function set_backup_schedule for Linode VMs 2023-12-15 21:20:14 -07:00
Zhiwei Liang
e9cb14c91e Add backups_enabled option; improve docs 2023-12-15 01:17:27 -07:00