17475 Commits

Author SHA1 Message Date
Fang-Pen Lin
4475457d4f Display body 2025-12-05 12:07:47 -08:00
Fang-Pen Lin
7a9374c72b Handle body 2025-12-05 12:07:46 -08:00
Fang-Pen Lin
43525b5494 Update http view 2025-12-05 12:07:45 -08:00
Fang-Pen Lin
f5d2920e22 Provide metadata for k8s pam 2025-12-05 12:07:44 -08:00
Fang-Pen Lin
b98e9e7599 Add HTTP event view 2025-12-05 12:07:43 -08:00
Fang-Pen Lin
5b97f5ae10 Fix log format 2025-12-05 12:07:42 -08:00
Fang-Pen Lin
73f2c2b2e5 Add http events 2025-12-05 12:07:41 -08:00
Fang-Pen Lin
30b451469b Fix sa validation without ns 2025-12-05 12:07:40 -08:00
Fang-Pen Lin
47da427612 Fix form 2025-12-05 12:07:39 -08:00
Fang-Pen Lin
8d2f308c10 Remove unused stuff 2025-12-05 12:07:38 -08:00
Fang-Pen Lin
c1d537c114 Adjust ui 2025-12-05 12:07:37 -08:00
Fang-Pen Lin
02babcb3a5 Fix ssl stuff 2025-12-05 12:07:36 -08:00
Fang-Pen Lin
e62705a81d Add missing k8s stuff
# Conflicts:
#	frontend/src/pages/pam/PamAccountsPage/components/PamAccessAccountModal.tsx
2025-12-05 12:07:35 -08:00
Fang-Pen Lin
2140956ba8 Fix account creation, remove rotation stuff for now 2025-12-05 12:07:34 -08:00
Fang-Pen Lin
5ac4e0a5bb Fix adding res and add missing forms 2025-12-05 12:07:33 -08:00
Fang-Pen Lin
e12f30cd43 Connect k8s 2025-12-05 12:07:32 -08:00
Fang-Pen Lin
284024d10b Add k8s stuff 2025-12-05 12:07:31 -08:00
Victor Santos
6db5188b36 feat: update AWS IAM session duration handling and improve account access functionality
- Changed session duration parameter from maxSessionDuration to defaultSessionDuration for consistency.
- Refactored AWS STS client creation to use a hardcoded default region, simplifying the configuration.
- Enhanced PAM account access modal to include account path and project ID in the access request.
- Updated various components and schemas to reflect the new session duration naming and improve type safety.
2025-12-05 16:56:55 -03:00
Piyush Gupta
1269e7c245 Merge pull request #4976 from Infisical/chore/external-kms-api-refactor
chore: external-kms API refactor
2025-12-06 01:23:05 +05:30
Piyush Gupta
8b32abaf85 fix: assume privileges 2025-12-06 01:22:50 +05:30
Piyush Gupta
32ecbd2d6d fix: edge cases 2025-12-05 23:46:37 +05:30
carlosmonastyrski
bf93644ce0 Merge pull request #4992 from Infisical/fix/pki-renewals
fix: renewals for internal CAs and minor improvement on the export certificate modal
2025-12-05 15:03:24 -03:00
Carlos Monastyrski
9e1a3c6fe0 Improve pkcs12 error message 2025-12-05 14:55:55 -03:00
Piyush Gupta
91539ce10f fix: MFA enabled orgs redirect 2025-12-05 23:21:59 +05:30
Piyush Gupta
1f0daf447e fix: review changes 2025-12-05 22:17:42 +05:30
Victor Santos
feb1d9b854 Merge branch 'main' into feature/aws-iam-pam 2025-12-05 13:29:30 -03:00
Carlos Monastyrski
d8feb988ea Remove redundant null check 2025-12-05 13:06:56 -03:00
Carlos Monastyrski
c81116ff60 Fix renewal issue for internal CAs and improve export certificate modal 2025-12-05 12:48:25 -03:00
Piyush Gupta
a6255d47b2 fix: review changes 2025-12-05 21:09:37 +05:30
Piyush Gupta
3f70897593 Merge pull request #4970 from Infisical/chore/pam-access-account-with-path
chore: updates pam access account endpoint to use account path instead of id [PAM-64]
2025-12-05 20:03:33 +05:30
Piyush Gupta
fd1a3d5d12 fix: review changes 2025-12-05 19:39:21 +05:30
Piyush Gupta
58fbbe0d91 Merge branch 'main' of https://github.com/Infisical/infisical into chore/external-kms-api-refactor 2025-12-05 18:01:43 +05:30
Piyush Gupta
fc9ded7d57 Merge branch 'main' of https://github.com/Infisical/infisical into feat/suborg-scope-support 2025-12-05 15:14:52 +05:30
Daniel Hougaard
b3f2fb1399 added missed endpoint 2025-12-04 23:02:29 -08:00
Victor Santos
b2e4c1e6bf feat: update PAM account types and endpoint handling for optional rotation settings
- Made the rotationEnabled field optional in the account schema to enhance flexibility.
- Updated endpoint logic to default rotationEnabled to false if not provided in the request.
- Adjusted account DTOs to reflect the optional nature of rotationEnabled, improving type safety.
2025-12-05 01:44:33 -03:00
Daniel Hougaard
cc9cee3953 fix(additional-privileges): return correct project membership ID 2025-12-04 20:43:30 -08:00
Victor Santos
a755b5bfa0 feat: improve PAM account update handling with enhanced error management
- Added try-catch block to handle potential database errors during account updates.
- Implemented specific error handling for unique constraint violations, providing clearer feedback for duplicate account names.
- Updated AWS IAM account schema to indicate that credential rotation is not supported, defaulting to false.
2025-12-05 01:14:28 -03:00
Victor Santos
ac5c185f76 feat: enhance PAM account handling with type safety and improved response structure
- Introduced type inference for sanitized accounts to ensure consistent data handling.
- Updated account response structure to explicitly cast accounts to the sanitized type.
- Refined the decryption function to omit sensitive fields from the returned account object.
- Improved error handling in SQL resource factory by enforcing required gateway ID validation.
2025-12-05 00:56:33 -03:00
Victor Santos
aac84e3952 feat: enhance AWS IAM resource support with refined validation and response structure
- Updated AWS IAM resource response schema to include distinct object structures for Postgres, MySQL, and SSH resource types.
- Improved validation for project ID to ensure it is a valid UUID.
- Adjusted console URL expiration handling to default to a calculated date if not provided.
- Modified regex for ARN role validation to accommodate additional characters.
2025-12-04 23:54:24 -03:00
Victor Santos
b589ab3be4 feat: add AWS IAM resource support with console access functionality
- Introduced AWS IAM resource type in the system, allowing users to create and manage AWS IAM accounts.
- Implemented AWS IAM resource forms and account forms for creating and updating IAM resources and accounts.
- Added functionality to generate AWS Console URLs for IAM accounts, enabling direct access to the AWS Console.
- Updated various components and hooks to handle AWS IAM-specific logic, including session expiration and access management.
- Enhanced the UI to reflect AWS IAM integration, including new modals and forms for user interaction.
2025-12-04 23:41:36 -03:00
carlosmonastyrski
4a62a872eb Merge pull request #4980 from Infisical/feat/PKI-67
feature: refine PKI access control permissions
2025-12-04 23:21:07 -03:00
Carlos Monastyrski
e870b449d6 Skip private key on response if user do not have access to read 2025-12-04 21:13:43 -03:00
Carlos Monastyrski
90c73def68 UI improvements on PKI product 2025-12-04 18:55:26 -03:00
Piyush Gupta
f14b03b6ac fix: kms endpoints to rerutn credentialsHash 2025-12-05 02:49:20 +05:30
Scott Wilson
c9a2a9d8f8 Merge pull request #4987 from Infisical/fix-change-org-query-removal
fix(frontend): correct query removal call sequence in when changing organization
2025-12-04 09:23:25 -08:00
Carlos Monastyrski
003aa1cd59 Remove duplicate read permission on default roles 2025-12-04 14:18:10 -03:00
Scott Wilson
462968780d fix: correct query removal call sequence in when changing organization 2025-12-04 09:13:40 -08:00
Carlos Monastyrski
2b038575ad Remove unused ca.id on CertificateAuthorities permission 2025-12-04 12:17:59 -03:00
Carlos Monastyrski
3f73f7cb05 Fix unit test 2025-12-04 10:53:39 -03:00
Carlos Monastyrski
022c2a860e Improve list endpoints permissions check and address PR comments 2025-12-04 04:58:32 -03:00