869 Commits

Author SHA1 Message Date
x032205
fe47684821 Merge branch 'main' into SECRETS-191 2026-05-02 00:50:13 -04:00
x032205
910c41957c remove PUT examples 2026-04-29 16:02:08 -04:00
x032205
d475e8c0ea feat(pam): support external object storage for session recordings 2026-04-29 04:00:37 -04:00
Carlos Monastyrski
a2cac916e8 Address PR comments 2026-04-27 14:45:41 -03:00
Carlos Monastyrski
70baae3853 Add Venafi TPP external CA integration 2026-04-27 09:43:05 -03:00
adilson
3c73cc03b7 Merge branch 'main' into feat/adilsitos/secrets-205 2026-04-24 09:22:46 -03:00
Carlos Monastyrski
026f8ddbff Address PR comments 2026-04-24 01:04:47 -03:00
Carlos Monastyrski
9b6cfbcf07 Merge remote-tracking branch 'origin/main' into feat/PKI-171 2026-04-23 22:00:06 -03:00
adilson
05ef05eef0 Merge branch 'main' into feat/adilsitos/secrets-205 2026-04-23 18:36:25 -03:00
x032205
6bb82cf616 Merge branch 'main' into SECRETS-191 2026-04-23 15:14:47 -04:00
adilson
4643efeabc Merge branch 'main' into sync-secrets/eng-2939 2026-04-23 15:45:18 -03:00
x032205
82b91b98d0 warning about cookie and TOTP secrets 2026-04-22 23:19:59 -04:00
x032205
4d316471e4 improve docs 2026-04-22 23:16:14 -04:00
adilson
4d6e67172b update docs to have travis on browser 2026-04-22 23:56:53 -03:00
adilson
38e7c4199d address review comments 2026-04-22 23:36:06 -03:00
=
e7a08d8158 feat: updated more checks 2026-04-22 20:34:07 +05:30
Carlos Monastyrski
9ac33a61fa Merge remote-tracking branch 'origin/main' into feat/PKI-171 2026-04-22 01:54:19 -03:00
Carlos Monastyrski
153ff4bad0 Add Digicert API External CA integration 2026-04-22 01:22:57 -03:00
Saif Ur Rahman
db964a7493 feat(pki): add AWS ACM Public CA support (#6069)
* feat(pki): add AWS ACM Public CA support

Adds a new external CA type that issues, renews, and revokes public
certificates via AWS Certificate Manager with Route 53 DNS validation.

- New aws-acm-public-ca service module (client, fns, schemas, validators)
- Route 53 DNS provider for ACM CNAME validation records
- externalMetadata jsonb column on certificates (stores ARN/region)
- Issuance queue tuned for ACM: 30 attempts with fixed backoff,
  retryable validation-pending errors, final-attempt request FAIL hook
- Pre-flight validation rejects CSR, non-DNS SANs, subject fields,
  custom validity, and CA certs (ACM constraints)
- Profile service restricts ACM CAs to API enrollment
- v1/v2 list endpoints, ExternalCaModal UI, frontend types/hooks

* chore(backend): add @aws-sdk/client-acm dependency

* chore(pki): remove ACM development mock client

* fix(pki): surface AWS errors and fix ACM renewal polling

- Wrap ACM/Route 53 preflight calls in createCertificateAuthority and
  updateCertificateAuthority so IAM errors surface as BadRequestError
  with the AWS message, instead of a generic 500.
- Skip the fixed-validity TTL check on renewal — ACM sets validity itself
  and the TTL derived from the original cert can floor below 198 days.
- Require notAfter to advance before exporting a renewed cert. ACM returns
  the original cert from ExportCertificate until the renewal is fully
  re-issued, which was causing duplicate-serial insert failures.

* fix(pki): retry ACM export when renewal relation not yet ready

* chore(pki): clean up ACM extras and add docs

- Drop dead `calculateAcmRenewBeforeDays` clamp; profile schema already
  caps `renewBeforeDays` at 30, so the 198-day clamp never triggered.
- Drop the redundant `basicConstraints` plumbing for the ACM validator;
  `certificate-v3-service.ts` already blocks CA issuance for all external
  CAs upstream.
- Run pre-flight ACM input validation before the approval branch so bad
  inputs (TTL, SANs, subject fields) are rejected at submit time instead
  of after an approver has already approved.
- Use serial-number comparison to detect a renewed cert body in ACM,
  instead of relying on `NotAfter` advancement (which can lag).
- Persist `keyUsages` / `extendedKeyUsages` parsed from the issued cert
  rather than echoing the request, so DB matches what AWS actually issued.
- Add docs page covering setup, IAM, auto-renewal, troubleshooting, and
  an FAQ; wire it into docs.json under the External CAs section.

* fix(pki): make external CA revocation atomic and surface AWS errors

- Call the upstream CA revoke before updating the local cert row, so a
  failed AWS call (e.g., a reason ACM rejects) doesn't leave the cert
  marked revoked locally while still active at the issuer.
- Wrap the ACM RevokeCertificate call so AWS errors come back as a
  BadRequestError with the underlying message, instead of falling
  through to the generic "Something went wrong" 500.

* fix(pki): preserve original region on ACM renewal and hoist AWS calls out of CA update transaction

- On renewal, store the original certificate's region in externalMetadata
  instead of the CA's current region, so subsequent revoke/renew keep
  targeting the correct region-locked ARN even if the CA was edited.
- In updateCertificateAuthority, run ACM ListCertificates and Route 53
  GetHostedZone before opening the DB transaction, mirroring
  createCertificateAuthority so slow AWS calls don't pin a pool connection.

* fix(pki): derive ACM signature algorithm from issued cert

ACM picks the signature algorithm server-side and has no SigningAlgorithm
parameter on RequestCertificate, so the caller-supplied signatureAlgorithm
was being persisted without ever matching what AWS actually signed with.
Parse it from the issued cert and normalize to CertSignatureAlgorithm
before writing to the DB. Drop the now-dead parameter from the ACM
orderCertificateFromProfile signature.

* chore(pki): remove unused AwsAcmKeyAlgorithm enum

* refactor(pki): generate ACM export passphrase with nanoid customAlphabet

Uses nanoid's customAlphabet instead of manual modular sampling, matching
the pattern used elsewhere in the codebase (e.g. dynamic-secret providers).
Eliminates the modular bias where the first 8 alphabet characters appeared
slightly more frequently than the others.

* fix(ui): mark AWS Connection field as required in ACM external CA form

Matches the sibling fields (Route 53 Connection, Hosted Zone ID, Region)
which already had the required indicator.

* docs(pki): clarify ACM auto-renewal and refresh screenshots

Explain that AWS itself attempts managed renewal 45 days before expiry, and what Infisical's own auto-renewal does in that case (skip RenewCertificate if AWS already renewed, otherwise trigger it). Swap "export" wording for plainer "save"/"pull in". Add new setup screenshots.

* docs(pki): add ACM public CA API reference pages

* refactor(pki): share Route 53 helper and tidy ACM internals

- Extract Route 53 into a shared dns-providers/route53.ts reused by both
  ACME and ACM Public CA. Adds an optional comment field so ACME keeps
  its original change-history strings. The ACME delete path also now
  applies sha256=CustomAWSHasher and useFipsEndpoint consistently with
  upsert.
- Move the two ACM validation error classes into a dedicated -errors.ts
  and rename to AcmPendingError / AcmTerminalError, since they also
  cover renewal and export paths beyond the original DNS-validation
  signal.
- Replace single-character regex strips (: and -) with split/join, and
  wrap the AWS error-message match in RE2 to match the rest of the repo.

* feat(ui): pre-fill and lock TTL for ACM Public CA profiles

AWS ACM Public CA issues certificates with a fixed 198-day validity and
the backend rejects any other value. When the selected CA on a certificate
profile is AWS ACM Public CA, the TTL field now pre-fills to 198 and is
disabled, with a tooltip explaining the fixed validity.

* docs(pki): expand ACM Public CA guide and document permissions on AWS connection

- Rewrite the ACM Public CA overview to scope explicitly to public
  certificates and drop the comparison with AWS Private CA.
- Expand the enrollment-method FAQ entry to explain that only API
  enrollment applies, because EST, SCEP, and ACME all submit a CSR and
  ACM generates the private key itself.
- Add an AWS ACM Public CA accordion (ACM + Route 53 permissions) to
  both the IAM Role and IAM User sections of the AWS app connection
  docs so users can set up permissions alongside existing services.

* fix(pki): skip AWS ACM revoke for superseded certificates

When an ACM certificate is renewed, the ARN is reused for the new
certificate body and the superseded cert is no longer present at AWS.
Calling RevokeCertificate on that ARN would revoke the currently-active
renewed cert. When revoking a cert that has renewedByCertificateId set,
skip the AWS call and let the service layer mark the DB row as REVOKED
on its own — matching the pattern already used in PKI syncs for
superseded certificates.
2026-04-22 03:30:00 +05:30
adilson
4477c3b9f2 add images into docs 2026-04-21 18:43:48 -03:00
adilson
61993bec3e add docs 2026-04-21 16:39:21 -03:00
adilson
82a3cc5fa2 remove options on sync for travis 2026-04-20 22:30:00 -03:00
adilson
c980065c52 Merge branch 'main' into sync-secrets/eng-2939 2026-04-20 17:03:59 -03:00
adilson
ac6fd1f5e9 update documentation with screenshots 2026-04-20 16:49:31 -03:00
x032205
afc364957f Merge branch 'main' into SECRETS-191 2026-04-20 15:34:01 -04:00
x032205
b69db782ac docs 2026-04-20 15:09:25 -04:00
adilson
f8de228cf9 add travis ci sync and app connection 2026-04-20 14:08:01 -03:00
Daniel
d2abdff0d9 Merge branch 'main' into igor/eng-4649-create-migration-tool-from-doppler-to-infisical 2026-04-17 21:47:47 +02:00
Jake Hulberg
dac4094dcb docs: add walkthrough video to Vercel Sync page
Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-17 09:20:29 -05:00
Daniel
ea2a579d5e Merge branch 'main' into igor/eng-4649-create-migration-tool-from-doppler-to-infisical 2026-04-15 03:48:20 +02:00
Daniel
ce98399bc0 requested changes 2026-04-15 03:46:15 +02:00
Daniel
e02e4899de Update infisical-proxy.mdx 2026-04-15 00:47:49 +02:00
adilson
b449b8d978 update flag 2026-04-14 18:23:01 -03:00
adilson
e054fe6f98 add pooling-fallback-internal flag into docs 2026-04-14 18:16:11 -03:00
adilson
71e06dc785 docs: update documentation to explain how server sent events work on proxy CLI 2026-04-14 13:51:04 -03:00
Jake Hulberg
bfe1e1d781 Replace team@infisical.com with support or sales in docs
- Enterprise license/purchase contexts → sales@infisical.com
- Assistance, reporting, feature requests → support@infisical.com
- SMTP credential examples → you@example.com

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-04-14 06:40:51 -05:00
bernie-g
c156ea338f docs(pam): add AI Session Insights docs and Anthropic connection page 2026-04-10 16:40:45 -04:00
Daniel Hougaard
94043e10e2 Merge branch 'main' into igor/eng-4649-create-migration-tool-from-doppler-to-infisical 2026-04-08 04:25:35 +02:00
Carlos Monastyrski
c6a55e6d37 Merge remote-tracking branch 'origin/main' into feat/netscaler-pki-sync 2026-04-07 09:34:45 -03:00
Daniel Hougaard
02d396aa72 Merge branch 'main' into igor/eng-4649-create-migration-tool-from-doppler-to-infisical 2026-04-04 03:08:42 +02:00
Jake Hulberg
35a01869c5 Remove Docker Swarm documentation entirely
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-04-03 10:00:04 -05:00
Carlos Monastyrski
b373c6eadf Add NetScaler PKI sync 2026-04-01 01:37:16 -03:00
Igor Correa
5fb7eac707 fix(docs): correct typo "Coppy" -> "Copy" in Doppler connection guide 2026-03-31 15:35:15 -03:00
Igor Correa
8f4ab9cda7 docs: add Doppler app connection guide and images 2026-03-31 14:23:20 -03:00
Daniel Hougaard
94ddd7c665 Update aws.mdx 2026-03-24 18:09:45 +01:00
Igor Horta Corrêa
0d47ac4d99 Merge pull request #5755 from Infisical/igor/eng-4687-add-option-to-disable-certificate-import-in-akv-secret-sync
feat(secret-sync): add option to disable certificate import in Azure Key Vault sync
2026-03-22 17:15:01 -03:00
Igor Correa
dce673c737 docs(secret-sync): remove key schema option from Infisical-to-Infisical sync docs 2026-03-20 17:09:21 -03:00
Igor Correa
ec14a4a953 feat(external-infisical-sync): filter project list to secret-manager type only
Only expose Secret Manager projects when listing remote Infisical projects for sync destination, preventing selection of non-compatible project types.
2026-03-19 23:35:39 -03:00
Igor Correa
3e2452eb3e fix: docs 2026-03-19 19:07:44 -03:00
Igor Correa
e74925e384 fix: unecessary text for the docs 2026-03-19 19:06:29 -03:00