Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
260 commits
Select commit Hold shift + click to select a range
b01edf4
add ssh managed key documentation (#30764)
rculpepper Jul 17, 2025
cde500a
Correct performance_multiplier default (#31294)
roooms Jul 17, 2025
ce9c011
Fixing link to pre-autopilot HA upgrade documentation (#30539)
kevin-loehfelm Jul 17, 2025
465375f
Update azure.mdx for adding one section around known issue & its fix …
himanshu-8693 Jul 17, 2025
6994b6f
VAULT-38099: Fix plugin audit panic during unseal (#31266)
miagilepner Jul 17, 2025
6e4b361
[OSS PATCH] VAULT-36896: add clear logs about auto reporting disablin…
aslamovamir Jul 17, 2025
584a3da
Dependency updates for main (#31299)
VioletHynes Jul 17, 2025
d7030a1
[OSS PATCH] Update logging and docs around enabling and disabling pro…
aslamovamir Jul 17, 2025
6981f47
remove sys/namespace capabilities check for refresh button (#31308)
hellobontempo Jul 17, 2025
1e7f22a
Add DB type consts (#31295)
elliesterner Jul 17, 2025
4c828c3
UI: Replication - fixing overflow issue on secondaries list / table (…
drivera258 Jul 17, 2025
41d8301
UI: Fix namespace picker selecting all namespaces with matching nodes…
hellobontempo Jul 17, 2025
9190485
auth/userpass: update dummy string generation (#31318)
mickael-hc Jul 18, 2025
8700bec
[UI] Ember Data Migration - API Property Casing (#31325)
zofskeez Jul 18, 2025
4a76fdc
updates login settings api vars to snake_case (#31336)
zofskeez Jul 18, 2025
df0e6bb
login/mfa: update loginmfa cache and tests (#31297)
mickael-hc Jul 18, 2025
3c7df59
[UI] Ember Data Migration - Remove API Client (#31337)
zofskeez Jul 21, 2025
1d60673
update dummy string (#31342)
mickael-hc Jul 21, 2025
0660ea6
Update README (#31244)
Younique98 Jul 22, 2025
8309387
Add a note on newlines in indirect reference values in seal configs (…
sgmiller Jul 22, 2025
1fb0066
Update clientcountutil to accommodate entity record usage time change…
akshya96 Jul 22, 2025
c710206
reinstitutes api migration reversions (#31347)
zofskeez Jul 22, 2025
8011ac7
fixes ent tests (#31355)
zofskeez Jul 22, 2025
8f7d76d
VAULT-35087: add Open-API support for secret recovery operations (#31…
bosouza Jul 23, 2025
881febb
update alias lookahead to respect case (#31352)
mickael-hc Jul 23, 2025
e6ce95a
Replace codemirror 6 code editor with HDS CodeEditor component (#30188)
zamoore Jul 23, 2025
266f8e5
[VAULT-38229] Enable test timing cache restore without requiring cach…
Jul 23, 2025
857e66b
VAULT-35602: Adding Enos OpenLDAP test (#30801)
tvo0813 Jul 23, 2025
194241e
VAULT-35838: advance deprecation of duplicate HCL attributes to pendi…
bosouza Jul 24, 2025
a47862e
added changelog records for minor release (#31374)
lursu Jul 25, 2025
f020140
VAULT-31185 & 31186/use identity token auth for Artifactory in Vault …
kporter101 Jul 28, 2025
738649e
pipeline(github sync branch): fix default to-repo (#31259)
ryancragun Jul 29, 2025
4036485
(enos) Add KMIP Enos Test Suite (#31378)
Jul 29, 2025
f18a064
UI: Cleanup scss color variables (#31386)
hellobontempo Jul 29, 2025
3a37fe4
UI: Stablize control group tests (#31390)
hellobontempo Jul 30, 2025
c80c4b4
UI: Fix externally mounted engine tooltip bug (#31382)
drivera258 Jul 30, 2025
b35bd44
VAULT-38228 CE side of sighup for observations (#31384)
VioletHynes Jul 30, 2025
fc249a4
VAULT-37303 CE changes (#31392)
VioletHynes Jul 31, 2025
9ff8f7e
fix(gcs): failed locks due to upstream library error check changes (#…
steved Jul 31, 2025
863ab94
[UI] Ember Data Migration - Auth Method Enable (#31394)
zofskeez Aug 1, 2025
3bb3e16
adding settled line (#31396)
drivera258 Aug 1, 2025
4a2b5bf
run colocated components codemod (#31397)
meirish Aug 1, 2025
f04fe92
UI: Remove tabs for each client count type (#31393)
hellobontempo Aug 1, 2025
0d7882c
fix error on transform-edit-form component (#31409)
meirish Aug 1, 2025
970975c
[UI] - Colocated components in addons (#31413)
meirish Aug 4, 2025
fb6982b
replace tooltip and tweak working on for replication dash card (#31395)
emoncuso Aug 4, 2025
ed1615b
Update changelog with recently published security bulletins (#31408)
mickael-hc Aug 4, 2025
078585b
identity/mfa: revert cache value and add comments to mfa cache (#31421)
mickael-hc Aug 4, 2025
32e3ecb
Add hooks for enterprise token auth metadata feature. (#31391)
victorr Aug 5, 2025
9507c22
UI: Builds template and basic page component for new client-list rout…
hellobontempo Aug 5, 2025
e23de51
Export api changes to add first used timestamp column in query period…
akshya96 Aug 5, 2025
3b15131
delete open api tests (#31426)
hellobontempo Aug 5, 2025
e2273db
auth/ldap: ensure consistent entity aliasing when set from the userna…
benashz Aug 5, 2025
eedc2b7
Add limit to JSON nesting depth (#31069)
biazmoreira Aug 6, 2025
99b6327
Changelog for 1.20.2, 1.19.8, 1.18.13, 1.16.24 (#31436)
tomcf-hcp Aug 6, 2025
bce06a8
Add updates to various CE files to support the new ENT SPIFFE auth pl…
stevendpclark Aug 6, 2025
3d46115
add basic routes for secrets recovery (#31412)
lane-wetmore Aug 6, 2025
0187338
[Enos] VAULT-30196: SSH Secrets Engine (#29534)
charlesn-hc Aug 6, 2025
beeb8c2
VAULT-37080: Maintain redundancy zones for unhealthy nodes (#31443)
miagilepner Aug 7, 2025
897938b
(enos) require unseal failure test before re-adding raft nodes in eno…
Aug 7, 2025
a18b4df
VAULT-37080: Fix changelog and comment (#31449)
miagilepner Aug 7, 2025
d762062
go: bump Go to 1.24.6 to resolve GO-2025-3849 (main) (#31450)
ryancragun Aug 7, 2025
aa73cbf
updating utilization api client (#31385)
murali-partha Aug 7, 2025
475928c
VAULT-30196: Use updated vault cluster for autopilot (#31447)
charlesn-hc Aug 7, 2025
dd1063b
VAULT-38794 Update KV plugin to add additional version metadata for o…
VioletHynes Aug 7, 2025
8f4a2b5
[VAULT-34830] actions: update CE workflows for unified enterprise rep…
ryancragun Aug 7, 2025
53bd1e2
UI: Adding flag for displaying old or new page views for secret engin…
drivera258 Aug 7, 2025
3313241
moving CTA out from toolbar into separate hds button (#31456)
drivera258 Aug 7, 2025
36d873a
Log LDAP Rotations (#31401)
kpcraig Aug 8, 2025
dca6233
Clarifying audit log feature releases (#31460)
mladlow Aug 8, 2025
1fafe2f
Log DB Rotations (#31402)
kpcraig Aug 8, 2025
17e5b92
Log transit rotations (#31420)
kpcraig Aug 8, 2025
9b75225
use findRecord instead (#31470)
hellobontempo Aug 11, 2025
6b1a6b2
UI: Upgrade to HDS 4.20.1 (#31467)
hellobontempo Aug 11, 2025
6d7968a
UI: Moving CTA buttons out of toolbars for keymgmt + add manage butto…
drivera258 Aug 11, 2025
b0a9ad2
UI: Generalize Clients::Table component (#31439)
hellobontempo Aug 11, 2025
c88b313
enable test server in dev (#31469)
meirish Aug 11, 2025
a0f8dab
Fix bug preventing multiline statemtents in rotation_statements for d…
jaireddjawed Aug 11, 2025
bcd584a
VAULT-37630: CE changes for recover as a copy policy handling (#31472)
miagilepner Aug 12, 2025
32e806f
[UI] - Glimmerize b64-toggle component (#31423)
meirish Aug 12, 2025
7d4854d
UI: Build dropdown filter toolbar (#31475)
hellobontempo Aug 12, 2025
06ab7d2
[VAULT-38882] actions(build): build and test on changes to gotoolchai…
ryancragun Aug 12, 2025
b76a28a
[VAULT-38883] enos: remove Ubuntu 20.04 from the test matrix (#31482)
ryancragun Aug 12, 2025
b0d8f4f
UI Bug fix: Fix DR Secondary view (#31478)
Monkeychip Aug 13, 2025
3f30ca8
UI: Security card component for new configuration page (#31487)
drivera258 Aug 13, 2025
bb54062
UI: Snapshots index route (#31473)
lane-wetmore Aug 13, 2025
a607fb1
UI: wrap ember-power-select- overrides so Hds::SuperSelect is usable …
hellobontempo Aug 14, 2025
bfa0c41
(enos) generalize container startup script (#31483)
Aug 14, 2025
6649576
VAULT-38897: Clarify that audit security fix is a breaking change (#3…
mladlow Aug 14, 2025
d79813a
Add password rotation url to ldap auth (#31363)
jadeidev Aug 14, 2025
d5f65e7
VAULT-38463: Fix Enos LDAP issue for dev tests (#31407)
tvo0813 Aug 15, 2025
7af2567
VAULT-38884, VAULT-38885: enos(rhel): bump 9.5 to 9.6 and add 10.0 (#…
ryancragun Aug 15, 2025
b5b4a95
VAULT-34830 actions(plugin-update): update plugins from enterprise (#…
ryancragun Aug 15, 2025
0429506
remove readonly attr once element is ready for input (#31502)
lane-wetmore Aug 15, 2025
4c3a440
testhelpers(ldap): always time out if we can't start the container in…
ryancragun Aug 15, 2025
812a240
Backport VAULT-34830: enable the new workflow into ce/main (#8681)
ryancragun Aug 19, 2025
6d355aa
remove file that slipped in during the backport but before the change…
ryancragun Aug 19, 2025
9a73034
UI: Creating Metadata card for configuration page (#8679) (#8709)
hc-github-team-secure-vault-core Aug 19, 2025
11458aa
actions(metadata): fix metadata version for ce (#8713) (#8714)
hc-github-team-secure-vault-core Aug 20, 2025
711ed1a
Add support for AES-CBC to transit (#8367) (#8741)
hc-github-team-secure-vault-core Aug 20, 2025
8a9c306
UI: Create version card (#8710) (#8744)
hc-github-team-secure-vault-core Aug 20, 2025
3594d6d
[VAULT-38605] Add self-enrollment option to the TOTP Login MFA method…
hc-github-team-secure-vault-core Aug 20, 2025
ae0e5e1
[VAULT-38601] Modify response to MFA enforced requests to enable TOTP…
hc-github-team-secure-vault-core Aug 20, 2025
18d77ba
Fix token creation in a namespace (#8461) (#8747)
hc-github-team-secure-vault-core Aug 20, 2025
ffa18b3
enos(sample): don't double sample (#8752) (#8770)
hc-github-team-secure-vault-core Aug 20, 2025
c2c89df
changelog: add hash link to changes that originate from enterprise (#…
hc-github-team-secure-vault-core Aug 20, 2025
5d264c2
pipeline(backport): use --strategy-option=theirs (#8767) (#8780)
hc-github-team-secure-vault-core Aug 20, 2025
9d27d4f
VAULT-37630: Recover as a copy (#8640) (#8798)
hc-github-team-secure-vault-core Aug 21, 2025
ec0ca21
[UI] VAULT-37386 Plugin management: General Settings Route + Template…
hc-github-team-secure-vault-core Aug 21, 2025
0445163
VAULT-38193 Add database observations to Vault (#8727) (#8802)
hc-github-team-secure-vault-core Aug 21, 2025
a233f7a
update vault-plugin-secrets-openldap to v0.16.1 (#8820) (#8821)
hc-github-team-secure-vault-core Aug 22, 2025
80d29b4
VAULT-39129: Updating enos tutorial scenario link (#8831) (#8835)
hc-github-team-secure-vault-core Aug 22, 2025
e1e1518
[VAULT-39153] pipeline(backport): remove docs and pipeline from allow…
hc-github-team-secure-vault-core Aug 22, 2025
8009bb9
[VAULT-39157] enos(cloud): add basic vault cloud scenario (#8828) (#8…
hc-github-team-secure-vault-core Aug 22, 2025
8a89a1c
Upgrade to CRT schema 2 to fix crt-report-dispatch event (#8572) (#8809)
hc-github-team-secure-vault-core Aug 22, 2025
eff87a1
api/client: support setting extra headers with new logical request in…
hc-github-team-secure-vault-core Aug 22, 2025
1d3b51b
[VAULT-39208]: actions: update action pins (#8864) (#8865)
hc-github-team-secure-vault-core Aug 22, 2025
e9e162f
UI: Create Lease Duration card component + style updates (#8815) (#8870)
hc-github-team-secure-vault-core Aug 22, 2025
9c09be2
[UI] Cubbyhole List View Bug (#8859) (#8871)
hc-github-team-secure-vault-core Aug 25, 2025
876a38c
Disallow writing of barrier keyring if seals aren't healthy (#8707) (…
hc-github-team-secure-vault-core Aug 25, 2025
9f7449d
VAULT-38888 Add prefix vault to metric summary definitions into main …
hc-github-team-secure-vault-core Aug 26, 2025
88a7463
[VAULT-39235]: pipeline(changed-files): don't group underscore prefix…
hc-github-team-secure-vault-core Aug 26, 2025
8883f32
VAULT-39010 Adding new go-discover logic (#8884) (#8931)
hc-github-team-secure-vault-core Aug 26, 2025
ea954aa
Backport bump go-getter to 1.7.9 into ce/main (#8926)
hc-github-team-secure-vault-core Aug 26, 2025
8d2cb89
VAULT-38463: Addressing ldap pipeline failure (#8817) (#8911)
hc-github-team-secure-vault-core Aug 26, 2025
3e46271
Backport [VAULT-38910]: upgrade docker package to resolve GO-2025-382…
hc-github-team-secure-vault-core Aug 26, 2025
9676a69
manually copy over missing changelogs for main (#8956)
raskchanky Aug 26, 2025
f9adb45
Use bitnamilegacy cassandra image for tests (#8984) (#8985)
hc-github-team-secure-vault-core Aug 28, 2025
5f8575d
[VAULT-39237] actions(generate-changelog) generate changelogs in ce f…
hc-github-team-secure-vault-core Aug 28, 2025
bfd2e54
UI: Moving settings/mount-backend-form to secrets/mounts (#8975) (#8998)
hc-github-team-secure-vault-core Aug 28, 2025
79c8bce
Update CHANGELOG.md for 1.20.3 1.19.9 1.18.14 and 1.16.25 (#31527)
ldilalla-HC Aug 28, 2025
3edbb13
changelog: fix commit URL in CE generated template (#9010) (#9013)
hc-github-team-secure-vault-core Aug 28, 2025
37bd994
VAULT-38463: Fix ldap failure (#8996) (#9001)
hc-github-team-secure-vault-core Aug 28, 2025
75996c8
Merge remote-tracking branch 'remotes/from/ce/main'
hc-github-team-secure-vault-core Aug 29, 2025
a820af0
Backport [VAULT-38600] Fix the name of the CE stub for mfaLoginEnterp…
hc-github-team-secure-vault-core Aug 29, 2025
ca42c3e
Merge remote-tracking branch 'remotes/from/ce/main'
hc-github-team-secure-vault-core Aug 29, 2025
11f3770
Update CHANGELOG.md (#31528)
ldilalla-HC Aug 29, 2025
50af559
VAULT-38796, VAULT-38889 reformat observation schema to version 2 (#9…
hc-github-team-secure-vault-core Aug 29, 2025
3c459f7
[VAULT-39267] actions(slack): migrate to v2 action (#8964) (#8990)
hc-github-team-secure-vault-core Aug 29, 2025
eaf949c
VAULT-37633: Database static role recover operations (#8922) (#8982)
hc-github-team-secure-vault-core Aug 29, 2025
49b493c
Merge remote-tracking branch 'remotes/from/ce/main'
hc-github-team-secure-vault-core Aug 29, 2025
5d632ef
[VAULT-38600] Create TOTP Login MFA credential self-enrollment API en…
hc-github-team-secure-vault-core Aug 29, 2025
cafd652
Merge remote-tracking branch 'remotes/from/ce/main'
hc-github-team-secure-vault-core Aug 29, 2025
c9605c7
VAULT-36947: Support force unloading a snapshot (#8740) (#9036)
hc-github-team-secure-vault-core Sep 1, 2025
dff2b03
Merge remote-tracking branch 'remotes/from/ce/main'
hc-github-team-secure-vault-core Sep 1, 2025
e40eca1
VAULT-39294: Deprecate recover_snapshot_id query param and use a head…
hc-github-team-secure-vault-core Sep 1, 2025
24b9340
Merge remote-tracking branch 'remotes/from/ce/main'
hc-github-team-secure-vault-core Sep 1, 2025
66a27fd
VAULT-37632 allow restoring SSH CA from loaded snapshot (#8581) (#9034)
hc-github-team-secure-vault-core Sep 2, 2025
9fae4d8
Merge remote-tracking branch 'remotes/from/ce/main'
hc-github-team-secure-vault-core Sep 2, 2025
d610fa1
VAULT-38929: Autoload snapshots (#8651) (#9044)
hc-github-team-secure-vault-core Sep 2, 2025
8fc7a33
Merge remote-tracking branch 'remotes/from/ce/main'
hc-github-team-secure-vault-core Sep 2, 2025
4a885a8
[VAULT-34035] UI: Retrieve plugin catalog data on enable a secrets en…
hc-github-team-secure-vault-core Sep 2, 2025
f9ebc67
[VAULT-38599] Update the MFA login validation endpoint to support TOT…
hc-github-team-secure-vault-core Sep 2, 2025
1fcf554
UI: Add plugin settings route and tab to configuration page (#9031) (…
hc-github-team-secure-vault-core Sep 2, 2025
7f54bb9
Merge remote-tracking branch 'remotes/from/ce/main'
hc-github-team-secure-vault-core Sep 2, 2025
2b469de
UI: Update client count overview table and add filtering (#8663) (#9057)
hc-github-team-secure-vault-core Sep 2, 2025
f5ba791
Merge remote-tracking branch 'remotes/from/ce/main'
hc-github-team-secure-vault-core Sep 2, 2025
e47c5b5
UI: hackweek: add copilot instructions to ui repo (#8680) (#8728)
hc-github-team-secure-vault-core Sep 2, 2025
9dd3a05
Merge remote-tracking branch 'remotes/from/ce/main'
hc-github-team-secure-vault-core Sep 2, 2025
db99469
Backport UI: Reorganize client components into ce/main (#8826)
hc-github-team-secure-vault-core Sep 2, 2025
11754cc
Merge remote-tracking branch 'remotes/from/ce/main'
hc-github-team-secure-vault-core Sep 2, 2025
27fa51c
[VAULT-39333] pipeline(copy-pr): always fetch HEAD repo with it's clo…
hc-github-team-secure-vault-core Sep 2, 2025
ea46b31
UI: Fix chart legend order (#8827) (#8856)
hc-github-team-secure-vault-core Sep 2, 2025
6a50eee
UI: Fix entities and groups error when navigating away from list view…
hc-github-team-secure-vault-core Sep 2, 2025
836b339
Merge remote-tracking branch 'remotes/from/ce/main'
hc-github-team-secure-vault-core Sep 3, 2025
c2823e9
UI: Render client export table in "Client list" tab (#8880) (#9071)
hc-github-team-secure-vault-core Sep 3, 2025
cdab7b1
Merge remote-tracking branch 'remotes/from/ce/main'
hc-github-team-secure-vault-core Sep 3, 2025
02a0e63
Copy Auth Config Display Attr Updates into main (#8995) (#8997)
hc-github-team-secure-vault-core Sep 3, 2025
130b341
Merge remote-tracking branch 'remotes/from/ce/main'
hc-github-team-secure-vault-core Sep 3, 2025
5909d3f
actions(gofumpt): pin to gofumpt v0.8.0 (#9069) (#9075)
hc-github-team-secure-vault-core Sep 3, 2025
551b469
Merge remote-tracking branch 'remotes/from/ce/main'
hc-github-team-secure-vault-core Sep 3, 2025
9538905
UI: Build snapshot manage form (#8675) (#8957)
hc-github-team-secure-vault-core Sep 3, 2025
fd80881
Merge remote-tracking branch 'remotes/from/ce/main'
hc-github-team-secure-vault-core Sep 3, 2025
27f194f
UI: Snapshot load form (#8743) (#9093)
zofskeez Sep 3, 2025
7bd975f
add aria-describedby and id to non-accessible elements (#9025) (#9030)
hc-github-team-secure-vault-core Sep 3, 2025
88d1fd5
Merge remote-tracking branch 'remotes/from/ce/main'
hc-github-team-secure-vault-core Sep 3, 2025
a521693
UI: Snapshot details view (#8974) (#9097)
zofskeez Sep 3, 2025
d283ef5
renables test server setting that was reverted (#9046) (#9098)
ryancragun Sep 3, 2025
9537c44
Merge remote-tracking branch 'remotes/from/ce/main'
hc-github-team-secure-vault-core Sep 3, 2025
d8ecd06
Copy [UI] Ember Data Migration - Auth Method Configs into main (#9000…
zofskeez Sep 4, 2025
5b0cd2f
Merge remote-tracking branch 'remotes/from/ce/main'
hc-github-team-secure-vault-core Sep 4, 2025
b79dcd7
[UI] Ember Data Migration - Auth Method/Config Cleanup (#9033) (#9058)
hc-github-team-secure-vault-core Sep 4, 2025
dcebc60
Merge remote-tracking branch 'remotes/from/ce/main'
hc-github-team-secure-vault-core Sep 4, 2025
f4a2cb3
Fix package name (#9103) (#9116)
hc-github-team-secure-vault-core Sep 4, 2025
5306a8c
Merge remote-tracking branch 'remotes/from/ce/main'
hc-github-team-secure-vault-core Sep 4, 2025
4bb8810
Backport [VAULT-39289] go: update github.com/ulikunitz/xz to resolve …
hc-github-team-secure-vault-core Sep 4, 2025
b4b347f
Backport [VAULT-38467] Cumulative namespace client count calculation …
hc-github-team-secure-vault-core Sep 4, 2025
a4d81c5
Merge remote-tracking branch 'remotes/from/ce/main'
hc-github-team-secure-vault-core Sep 4, 2025
1636e24
retry the build-push-action once if it fails (#9011) (#9119)
hc-github-team-secure-vault-core Sep 4, 2025
31efccd
Merge remote-tracking branch 'remotes/from/ce/main'
hc-github-team-secure-vault-core Sep 4, 2025
51f56b8
[VAULT-39158, VAULT-39159]pipeline: add support for building HVD imag…
hc-github-team-secure-vault-core Sep 4, 2025
7ec248b
Merge remote-tracking branch 'remotes/from/ce/main'
hc-github-team-secure-vault-core Sep 5, 2025
c1e8dba
Cherry pick changelog 11f3770 (#9150) (#9151)
hc-github-team-secure-vault-core Sep 5, 2025
f483a4f
Merge remote-tracking branch 'remotes/from/ce/main'
hc-github-team-secure-vault-core Sep 5, 2025
0cb3c19
fix setting type in test (#9152) (#9154)
hc-github-team-secure-vault-core Sep 5, 2025
27ba63f
pluralize model for dynamic segment (#9149) (#9155)
hc-github-team-secure-vault-core Sep 5, 2025
2550d8c
Merge remote-tracking branch 'remotes/from/ce/main'
hc-github-team-secure-vault-core Sep 5, 2025
10cfe49
secrets/ldap: remove note in changelog entry (#9157) (#9158)
hc-github-team-secure-vault-core Sep 5, 2025
0fe8815
removes listing visibility config field from secrets engine form (#91…
hc-github-team-secure-vault-core Sep 5, 2025
73c6504
Merge remote-tracking branch 'remotes/from/ce/main'
hc-github-team-secure-vault-core Sep 5, 2025
556810c
stub billing start for CE test runs (#9159) (#9160)
hc-github-team-secure-vault-core Sep 6, 2025
98108f8
UI: Rely on `sys/internal/counters/activity` response to set time per…
hc-github-team-secure-vault-core Sep 6, 2025
c56443b
Merge remote-tracking branch 'remotes/from/ce/main'
hc-github-team-secure-vault-core Sep 8, 2025
c57faf2
VAULT-38463: Disable ENOS LDAP test (#9059) (#9172)
hc-github-team-secure-vault-core Sep 8, 2025
fd799ae
Merge remote-tracking branch 'remotes/from/ce/main'
hc-github-team-secure-vault-core Sep 8, 2025
396f5c3
Sys Mounts Auth Tune Path (#8963) (#9185)
hc-github-team-secure-vault-core Sep 8, 2025
bbb6f1e
VAULT-39355: Fixing Enos Dev Scenario Tests (#9162) (#9177)
hc-github-team-secure-vault-core Sep 8, 2025
ee5611b
Merge remote-tracking branch 'remotes/from/ce/main'
hc-github-team-secure-vault-core Sep 8, 2025
0a39621
[DOCS] Retire legacy content files - CE (#9115)
schavis Sep 8, 2025
ca67e63
Merge remote-tracking branch 'remotes/from/ce/main'
hc-github-team-secure-vault-core Sep 8, 2025
10855a6
Update to Go 1.25.1 (#8284) (#9191)
hc-github-team-secure-vault-core Sep 9, 2025
4171757
Copy Support RFC-9440 colon-wrapped Base64 for forwarded client certs…
hc-github-team-secure-vault-core Sep 9, 2025
89f4654
Merge remote-tracking branch 'remotes/from/ce/main'
hc-github-team-secure-vault-core Sep 9, 2025
c19829c
Fix KDF for key import with derivation enabled (#9106) (#9218)
hc-github-team-secure-vault-core Sep 9, 2025
fd52499
Batch Certificate Endpoint Addition (#8800) (#9223)
hc-github-team-secure-vault-core Sep 9, 2025
24801d1
Merge remote-tracking branch 'remotes/from/ce/main'
hc-github-team-secure-vault-core Sep 9, 2025
f2872f0
[VAULT-39158] actions(build-hcp-image): various small fixes (#9207) (…
hc-github-team-secure-vault-core Sep 9, 2025
7cfc4eb
Merge remote-tracking branch 'remotes/from/ce/main'
hc-github-team-secure-vault-core Sep 9, 2025
d173b10
[VAULT-37521] UI: update secrets/mounts route to call plugin-catalog …
hc-github-team-secure-vault-core Sep 9, 2025
13edba3
Merge remote-tracking branch 'remotes/from/ce/main'
hc-github-team-secure-vault-core Sep 10, 2025
ba4b639
CE backport: Rename token_auth_metadata to alias_metadata (#9237)
hc-github-team-secure-vault-core Sep 10, 2025
e08da33
Merge remote-tracking branch 'remotes/from/ce/main'
hc-github-team-secure-vault-core Sep 10, 2025
72d9414
UI: Add engine disable functionality to delete dropdown option (#9235…
hc-github-team-secure-vault-core Sep 10, 2025
9eb24c2
updated aws key id and secret (#9136) (#9202)
hc-github-team-secure-vault-core Sep 10, 2025
a70bc7c
Backport Fix cert auth role quotas into ce/main (#9246)
hc-github-team-secure-vault-core Sep 10, 2025
adadffd
Merge remote-tracking branch 'remotes/from/ce/main'
hc-github-team-secure-vault-core Sep 10, 2025
50fba16
VAULT-15663 UI: Fix padding issue in generate creds page for SSH secr…
hc-github-team-secure-vault-core Sep 10, 2025
f1de6c5
Merge remote-tracking branch 'remotes/from/ce/main'
hc-github-team-secure-vault-core Sep 10, 2025
5ead15b
UI: Add month filtering to client count dashboard (#9148) (#9255)
hc-github-team-secure-vault-core Sep 10, 2025
251b414
Merge remote-tracking branch 'remotes/from/ce/main'
hc-github-team-secure-vault-core Sep 10, 2025
91eabbd
[Feature][UI]: General Settings Follow Up Items (#8965) (#9262)
hc-github-team-secure-vault-core Sep 10, 2025
fb77bff
Merge remote-tracking branch 'remotes/from/ce/main'
hc-github-team-secure-vault-core Sep 10, 2025
a82cff4
Copy improve auth/ldap TestRotateRootWithRotationUrl test case into m…
hc-github-team-secure-vault-core Sep 10, 2025
1645c1f
Merge remote-tracking branch 'remotes/from/ce/main'
hc-github-team-secure-vault-core Sep 11, 2025
9e20e6d
VAULT-38951: add openapi support counters endpoints (#9107) (#9266)
hc-github-team-secure-vault-core Sep 11, 2025
f6a3673
Merge remote-tracking branch 'remotes/from/ce/main'
hc-github-team-secure-vault-core Sep 11, 2025
a73eca5
Backport license: add support for publishing artifacts to IBM PAO int…
hc-github-team-secure-vault-core Sep 11, 2025
d65d2d6
Merge remote-tracking branch 'remotes/from/ce/main'
hc-github-team-secure-vault-core Sep 11, 2025
0fe7702
VAULT-39368 fix version not being populated for some KV mounts in eve…
hc-github-team-secure-vault-core Sep 11, 2025
bbb95b6
actions: update pins (#9272) (#9273)
hc-github-team-secure-vault-core Sep 11, 2025
e183fbd
Merge remote-tracking branch 'remotes/from/ce/main'
hc-github-team-secure-vault-core Sep 11, 2025
9e30dac
updated vault ci access key name (#9238) (#9281)
hc-github-team-secure-vault-core Sep 11, 2025
7a6d1b5
adding tests for plugin settings page (#9292) (#9296)
hc-github-team-secure-vault-core Sep 11, 2025
cb015b7
Merge remote-tracking branch 'remotes/from/ce/main'
hc-github-team-secure-vault-core Sep 11, 2025
2d551a8
[VAULT-38468] Cumulative namespace counts API (#9186) (#9308)
hc-github-team-secure-vault-core Sep 12, 2025
cad4ab8
Merge remote-tracking branch 'remotes/from/ce/main'
hc-github-team-secure-vault-core Sep 12, 2025
0c3a3e2
[VAULT-39457] UI: add changelog for plugin management updates (#9309)…
hc-github-team-secure-vault-core Sep 12, 2025
3d50fe1
Merge remote-tracking branch 'remotes/from/ce/main'
hc-github-team-secure-vault-core Sep 12, 2025
58f0f9f
Merge pull request #71 from rahulkaukuntla/rahul/use-v2-sdk-with-api-…
rahulkaukuntla Jul 16, 2025
0923ea4
Merge branch 'master' into rahul/sync-with-upstream
dustmop Sep 12, 2025
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  
The diff you're trying to view is too large. We only load the first 3000 changed files.
1 change: 0 additions & 1 deletion .copywrite.hcl
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,6 @@ project {
header_ignore = [
"helper/pkcs7/**",
"ui/node_modules/**",
"ui/api-client/**",
"enos/modules/k8s_deploy_vault/raft-config.hcl",
"plugins/database/postgresql/scram/**",
]
Expand Down
2 changes: 2 additions & 0 deletions .github/actionlint.yml
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,8 @@ self-hosted-runner:
labels:
- small
- medium
- large
- xlarge
- ondemand
- disk_gb=64
- os=linux
Expand Down
44 changes: 39 additions & 5 deletions .github/actions/build-vault/action.yml
Original file line number Diff line number Diff line change
Expand Up @@ -70,7 +70,7 @@ runs:
shell: bash
run: git config --global url."https://${{ inputs.github-token }}:@github.com".insteadOf "https://github.com"
- name: Restore UI from cache
uses: actions/cache@1bd1e32a3bdc45362d1e726936510720a7c30a57 # v4.2.0
uses: actions/cache@0400d5f644dc74513175e3cd8d07132dd4860809 # v4.2.4
with:
# Restore the UI asset from the UI build workflow. Never use a partial restore key.
enableCrossOsArchive: true
Expand All @@ -90,9 +90,11 @@ runs:
if [[ '${{ inputs.vault-edition }}' =~ 'ce' ]]; then
build_step_name='Vault ${{ inputs.goos }} ${{ inputs.goarch }} v${{ inputs.vault-version }}'
package_version='${{ inputs.vault-version }}'
linux_package_license='BUSL-1.1'
else
build_step_name='Vault ${{ inputs.goos }} ${{ inputs.goarch }} v${{ inputs.vault-version }}+${{ inputs.vault-edition }}'
package_version='${{ inputs.vault-version }}+ent' # this should always be +ent here regardless of enterprise edition
linux_package_license='IPLA'
fi
# Generate a builder cache key that considers anything that might change
# our build container, including:
Expand All @@ -110,7 +112,13 @@ runs:
echo "build-step-name=${build_step_name}"
echo "vault-builder-cache-key=${docker_sha}-${build_sha}-${tools_sha}-${github_sha}-$(cat .go-version)"
echo "package-version=${package_version}"
echo "linux_package_license=${linux_package_license}"
} | tee -a "$GITHUB_OUTPUT"
- if: inputs.vault-edition != 'ce'
id: build-vault-select-license
uses: hashicorp-forge/actions-pao-tool/select-license@6997f7457c338e008506005cc370e7b02f7fb421 # v1.0.3
with:
arch: ${{ matrix.goarch }}
- if: inputs.cgo-enabled == '0'
name: ${{ steps.metadata.outputs.build-step-name }}
env:
Expand All @@ -126,14 +134,38 @@ runs:
shell: bash
run: make ci-build
- if: inputs.cgo-enabled == '1'
uses: docker/setup-buildx-action@b5ca514318bd6ebac0fb2aedd5d36ec1b5c232a2 # v3.10.0
uses: docker/setup-buildx-action@e468171a9de216ec08956ac3ada2f0791b6bd435 # v3.11.1
with:
driver-opts: network=host # So we can run our own little registry
- if: inputs.cgo-enabled == '1'
shell: bash
run: docker run -d -p 5000:5000 --restart always --name registry registry:2
- if: inputs.cgo-enabled == '1'
name: Build CGO builder image
- name: Build CGO builder image
if: inputs.cgo-enabled == '1'
id: build-push-action-attempt-1
continue-on-error: true # we will retry this if it fails
uses: docker/build-push-action@263435318d21b8e681c14492fe198d362a7d2c83 # v6.18.0
env:
DOCKER_BUILD_SUMMARY: false
with:
context: .
build-args: |
GO_VERSION=${{ steps.set-up-go.outputs.go-version }}
# Only build a container for the host OS since the same container
# handles cross building.
platforms: linux/amd64
push: true
target: builder
tags: localhost:5000/vault-builder:${{ steps.metadata.outputs.vault-builder-cache-key }}
# Upload the resulting minimal image to actions cache. This could
# be a problem if the resulting images are too big.
cache-from: type=gha,scope=vault-builder-${{ steps.metadata.outputs.vault-builder-cache-key }}
cache-to: type=gha,mode=min,scope=vault-builder-${{ steps.metadata.outputs.vault-builder-cache-key }}
github-token: ${{ inputs.github-token }}
- name: Build CGO builder image
id: build-push-action-attempt-2
continue-on-error: false
if: inputs.cgo-enabled == '1' && steps.build-push-action-attempt-1.outcome != 'success'
uses: docker/build-push-action@263435318d21b8e681c14492fe198d362a7d2c83 # v6.18.0
env:
DOCKER_BUILD_SUMMARY: false
Expand Down Expand Up @@ -176,6 +208,8 @@ runs:
- if: inputs.vault-edition != 'ce'
shell: bash
run: make ci-prepare-ent-legal
env:
LICENSE_DIR: "${{ steps.build-vault-select-license.outputs.license-path }}/Softcopy"
- if: inputs.vault-edition == 'ce'
shell: bash
run: make ci-prepare-ce-legal
Expand All @@ -198,7 +232,7 @@ runs:
version: ${{ steps.metadata.outputs.package-version }}
maintainer: HashiCorp
homepage: https://github.com/hashicorp/vault
license: BUSL-1.1
license: ${{ steps.metadata.outputs.linux_package_license }}
binary: ${{ steps.metadata.outputs.binary-path }}
deb_depends: openssl
rpm_depends: openssl
Expand Down
2 changes: 1 addition & 1 deletion .github/actions/checkout/action.yml
Original file line number Diff line number Diff line change
Expand Up @@ -70,7 +70,7 @@ runs:
echo "ref=${checkout_ref}"
echo "depth=${fetch_depth}"
} | tee -a "$GITHUB_OUTPUT"
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
- uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0
with:
path: ${{ inputs.path }}
fetch-depth: ${{ steps.ref.outputs.depth }}
Expand Down
35 changes: 30 additions & 5 deletions .github/actions/containerize/action.yml
Original file line number Diff line number Diff line change
Expand Up @@ -38,6 +38,11 @@ outputs:
runs:
using: composite
steps:
- if: inputs.vault-edition != 'ce' && (inputs.docker == 'true' || inputs.redhat == 'true')
uses: hashicorp-forge/actions-pao-tool/select-license@6997f7457c338e008506005cc370e7b02f7fb421 # v1.0.3
id: build-vault-select-license
with:
arch: ${{ matrix.goarch }}
- id: vars
shell: bash
run: |
Expand All @@ -48,27 +53,35 @@ runs:
docker_container_target='default'
redhat_container_tags='quay.io/redhat-isv-containers/5f89bb5e0b94cf64cfeb500a:${{ inputs.vault-version }}-ubi'
redhat_container_target='ubi'
license_source='LICENSE'
license_dest='/usr/share/doc/vault/LICENSE.txt'
;;
"ent")
container_version='${{ inputs.vault-version }}+${{ inputs.vault-edition }}'
docker_container_tags='docker.io/hashicorp/vault-enterprise:${{ inputs.vault-version }}-${{ inputs.vault-edition}} public.ecr.aws/hashicorp/vault-enterprise:${{ inputs.vault-version }}-${{ inputs.vault-edition }}'
docker_container_target='default'
redhat_container_tags='quay.io/redhat-isv-containers/5f89bb9242e382c85087dce2:${{ inputs.vault-version }}-${{ inputs.vault-edition }}-ubi'
redhat_container_target='ubi'
license_source='${{ steps.build-vault-select-license.outputs.license-path }}/Softcopy'
license_dest='/usr/share/doc/vault/Softcopy/'
;;
"ent.hsm")
container_version='${{ inputs.vault-version }}+${{ inputs.vault-edition }}'
docker_container_tags='docker.io/hashicorp/vault-enterprise:${{ inputs.vault-version }}-${{ inputs.vault-edition}} public.ecr.aws/hashicorp/vault-enterprise:${{ inputs.vault-version }}-${{ inputs.vault-edition }}'
docker_container_target='ubi-hsm'
redhat_container_tags='quay.io/redhat-isv-containers/5f89bb9242e382c85087dce2:${{ inputs.vault-version }}-${{ inputs.vault-edition }}-ubi'
redhat_container_target='ubi-hsm'
license_source='${{ steps.build-vault-select-license.outputs.license-path }}/Softcopy'
license_dest='/usr/share/doc/vault/Softcopy/'
;;
"ent.hsm.fips1403")
container_version='${{ inputs.vault-version }}+${{ inputs.vault-edition }}'
docker_container_tags='docker.io/hashicorp/vault-enterprise:${{ inputs.vault-version }}-${{ inputs.vault-edition}} public.ecr.aws/hashicorp/vault-enterprise:${{ inputs.vault-version }}-${{ inputs.vault-edition }}'
docker_container_target='ubi-hsm-fips'
redhat_container_tags='quay.io/redhat-isv-containers/5f89bb9242e382c85087dce2:${{ inputs.vault-version }}-${{ inputs.vault-edition }}-ubi'
redhat_container_target='ubi-hsm-fips'
license_source='${{ steps.build-vault-select-license.outputs.license-path }}/Softcopy'
license_dest='/usr/share/doc/vault/Softcopy/'
;;
"ent.fips1403")
# NOTE: For compatibility we still publish the ent.fips1403 containers to different
Expand All @@ -81,6 +94,8 @@ runs:
docker_container_target='ubi-fips'
redhat_container_tags='quay.io/redhat-isv-containers/6283f645d02c6b16d9caeb8e:${{ inputs.vault-version }}-${{ inputs.vault-edition }}-ubi'
redhat_container_target='ubi-fips'
license_source='${{ steps.build-vault-select-license.outputs.license-path }}/Softcopy'
license_dest='/usr/share/doc/vault/Softcopy/'
;;
*)
echo "Cannot generate container tags for unknown vault edition: ${{ inputs.vault-edition }}" 2>&1
Expand All @@ -93,6 +108,8 @@ runs:
echo "docker-container-target=${docker_container_target}"
echo "redhat-container-tags=${redhat_container_tags}"
echo "redhat-container-target=${redhat_container_target}"
echo "license_source=${license_source}"
echo "license_dest=${license_dest}"
echo "revision=$(make ci-get-revision)"
} | tee -a "$GITHUB_OUTPUT"
- if: inputs.docker == 'true' || inputs.redhat == 'true'
Expand All @@ -104,20 +121,28 @@ runs:
[[ ! -d "$dest_dir" ]] && mkdir -p "$dest_dir"
[[ ! -f "$dest_path" ]] && cp ${{ inputs.vault-binary-path }} "${dest_path}"
- if: inputs.docker == 'true'
uses: hashicorp/actions-docker-build@v2.1.0
uses: hashicorp/actions-docker-build@ryan/VAULT-34830-allow-repo-configuration
with:
arch: ${{ inputs.goarch }}
do_zip_extract_step: 'false' # Don't download and extract an already present binary
target: ${{ steps.vars.outputs.docker-container-target }}
tags: ${{ steps.vars.outputs.docker-container-tags }}
extra_build_args: |
LICENSE_SOURCE=${{ steps.vars.outputs.license_source }}
LICENSE_DEST=${{ steps.vars.outputs.license_dest }}
repo_name: ${{ inputs.vault-edition == 'ce' && 'vault' || 'vault-enterprise' }}
revision: ${{ steps.vars.outputs.revision }}
tags: ${{ steps.vars.outputs.docker-container-tags }}
target: ${{ steps.vars.outputs.docker-container-target }}
version: ${{ steps.vars.outputs.container-version }}
- if: inputs.redhat == 'true'
uses: hashicorp/actions-docker-build@v2.1.0
uses: hashicorp/actions-docker-build@ryan/VAULT-34830-allow-repo-configuration
with:
arch: ${{ inputs.goarch }}
do_zip_extract_step: 'false' # Don't download and extract an already present binary
extra_build_args: |
LICENSE_SOURCE=${{ steps.vars.outputs.license_source }}
LICENSE_DEST=${{ steps.vars.outputs.license_dest }}
redhat_tag: ${{ steps.vars.outputs.redhat-container-tags }}
target: ${{ steps.vars.outputs.redhat-container-target }}
repo_name: ${{ inputs.vault-edition == 'ce' && 'vault' || 'vault-enterprise' }}
revision: ${{ steps.vars.outputs.revision }}
target: ${{ steps.vars.outputs.redhat-container-target }}
version: ${{ steps.vars.outputs.container-version }}
2 changes: 1 addition & 1 deletion .github/actions/create-dynamic-config/action.yml
Original file line number Diff line number Diff line change
Expand Up @@ -39,7 +39,7 @@ runs:
} | tee -a "$GITHUB_ENV"
- name: Try to restore dynamic config from cache
id: dyn-cfg-cache
uses: actions/cache@1bd1e32a3bdc45362d1e726936510720a7c30a57 # v4.2.0
uses: actions/cache@0400d5f644dc74513175e3cd8d07132dd4860809 # v4.2.4
with:
path: ${{ env.DYNAMIC_CONFIG_PATH }}
key: dyn-cfg-${{ env.DYNAMIC_CONFIG_KEY }}
Expand Down
83 changes: 54 additions & 29 deletions .github/actions/metadata/action.yml
Original file line number Diff line number Diff line change
Expand Up @@ -39,12 +39,18 @@ outputs:
go-tags:
description: The minimal set of Go tags required to build the correct edition of Vault.
value: ${{ steps.workflow-metadata.outputs.go-tags }}
is-ce-in-enterprise:
description: Whether or not the workflow is running CE Vault in the context of Vault Enterprise.
value: ${{ steps.workflow-metadata.outputs.is-ce-in-enterprise }}
is-draft:
description: Whether or not the workflow is executing in the context of a pull request draft.
value: ${{ steps.workflow-metadata.outputs.is-draft }}
is-enterprise:
description: Whether or not the workflow is executing in the context of Vault enterprise.
value: ${{ steps.workflow-metadata.outputs.is-enterprise }}
is-ent-branch:
description: Whether or not the workflow is executing in the context of Vault Enterprise.
value: ${{ steps.workflow-metadata.outputs.is-ent-branch }}
is-ent-repo:
description: Whether or not the workflow is executing in the context of hashicorp/vault-enterprise
value: ${{ steps.workflow-metadata.outputs.is-ent-repo }}
is-fork:
description: Whether or not the workflow is being triggered on a pull request that is a fork.
value: ${{ steps.workflow-metadata.outputs.is-fork }}
Expand Down Expand Up @@ -102,9 +108,9 @@ runs:
is_draft='${{ github.event.pull_request.draft }}'

# Determine our pull request labels. We specifically look them up via the pulls API
# because at some point they stopped being reliable in the
# github.event.pull_request.labels.*.name context.

# because the github.event.pull_request.labels.*.name context is very inflexible.
# This allows people to add labels after inital pull request and/or to re-run this
# workflow to reload them.
labels=$(gh api "/repos/${{ github.repository }}/issues/${{ github.event.number }}/labels" | jq -erc '. | map(.name)')
else
# We can assume we're being triggered for a 'push' (a merge)
Expand Down Expand Up @@ -145,28 +151,47 @@ runs:
echo "workflow-trigger=${{ github.event_name }}"
} | tee -a "$GITHUB_OUTPUT"

# Set CE and Ent specific workflow metadata
is_enterprise='${{ contains(github.repository, 'vault-enterprise') }}'
if [ "$is_enterprise" = 'true' ]; then
{
echo 'compute-build=["self-hosted","ondemand","os=linux","disk_gb=64","type=c6a.4xlarge"]'
echo 'compute-build-ui=["self-hosted","ondemand","os=linux", "disk_gb=64", "type=c6a.2xlarge"]'
echo 'compute-test-go=["self-hosted","ondemand","os=linux","disk_gb=64","type=c6a.2xlarge"]'
echo 'compute-test-ui=["self-hosted","ondemand","os=linux","type=m6a.2xlarge"]'
echo 'compute-small=["self-hosted","linux","small"]'
echo 'go-tags=ent,enterprise'
echo 'is-enterprise=true'
echo 'vault-version-metadata=${{ inputs.vault-version }}+ent'
} | tee -a "$GITHUB_OUTPUT"
# Set CE, Ent, and CE in Ent specific workflow metadata
is_enterprise_repo='${{ contains(github.repository, 'vault-enterprise') }}'
if [ "$is_enterprise_repo" = 'true' ]; then
base_ref='${{ github.event.pull_request.base.ref || github.event.base_ref || github.ref_name || github.event.branch || github.ref }}'
is_ent_repo='true'
is_ce_in_enterprise=$([[ $base_ref == ce/* ]] && echo "true" || echo "false")
if [ "$is_ce_in_enterprise" = 'true' ]; then
is_enterprise="false"
go_tags=''
version_metadata='${{ inputs.vault-version }}'
else
is_enterprise='true'
go_tags='ent,enterprise'
version_metadata='${{ inputs.vault-version }}+ent'
fi
compute_build='["self-hosted","ondemand","os=linux","disk_gb=64","type=c6a.4xlarge"]'
compute_build_ui='["self-hosted","ondemand","os=linux", "disk_gb=64", "type=c6a.2xlarge"]'
compute_test_go='["self-hosted","ondemand","os=linux","disk_gb=64","type=c6a.2xlarge"]'
compute_test_ui='["self-hosted","ondemand","os=linux","type=m6a.2xlarge"]'
compute_small='["self-hosted","linux","small"]'
else
{
echo 'compute-build="custom-linux-medium-vault-latest"'
echo 'compute-build-ui="custom-linux-xl-vault-latest"'
echo 'compute-test-go="custom-linux-medium-vault-latest"'
echo 'compute-test-ui="custom-linux-medium-vault-latest"'
echo 'compute-small="ubuntu-latest"'
echo 'go-tags='
echo 'is-enterprise=false'
echo 'vault-version-metadata=${{ inputs.vault-version }}'
} | tee -a "$GITHUB_OUTPUT"
compute_build='"custom-linux-medium-vault-latest"'
compute_build_ui='"custom-linux-xl-vault-latest"'
compute_test_go='"custom-linux-medium-vault-latest"'
compute_test_ui='"custom-linux-medium-vault-latest"'
compute_small='"ubuntu-latest"'
go_tags=''
is_ce_in_enterprise='false'
is_ent_branch='false'
is_ent_repo='false'
version_metadata='${{ inputs.vault-version }}'
fi
{
echo "compute-build=${compute_build}"
echo "compute-build-ui=${compute_test_ui}"
echo "compute-test-go=${compute_test_go}"
echo "compute-test-ui=${compute_test_ui}"
echo "compute-small=${compute_small}"
echo "go-tags=${go_tags}"
echo "is-ce-in-enterprise=${is_ce_in_enterprise}"
echo "is-ent-branch=${is_enterprise}"
echo "is-ent-repo=${is_ent_repo}"
echo "vault-version-metadata=${version_metadata}"
} | tee -a "$GITHUB_OUTPUT"
8 changes: 4 additions & 4 deletions .github/actions/run-apupgrade-tests/action.yml
Original file line number Diff line number Diff line change
Expand Up @@ -36,7 +36,7 @@ runs:
run: vault-auth
- name: Fetch Secrets
id: secrets
uses: hashicorp/vault-action@d1720f055e0635fd932a1d2a48f87a666a57906c # v3.0.0
uses: hashicorp/vault-action@4c06c5ccf5c0761b6029f56cfb1dcf5565918a3b # v3.4.0
with:
url: ${{ steps.vault-auth.outputs.addr }}
caCertificate: ${{ steps.vault-auth.outputs.ca_certificate }}
Expand All @@ -52,7 +52,7 @@ runs:
run: |
git config --global url."https://${{ steps.secrets.outputs.github-token }}@github.com".insteadOf https://github.com
- name: Check out the .release/versions.hcl file from Vault Enterprise repository
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0
with:
ref: ${{ inputs.checkout-ref }}
- uses: ./.github/actions/set-up-go
Expand All @@ -61,14 +61,14 @@ runs:
- name: Build external tools
uses: ./.github/actions/install-external-tools
- name: Checkout VCM repository
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0
with:
repository: hashicorp/vcm
ref: 1fcab6591e3bdc81d2921ca77441bfcf913c6a57
token: ${{ inputs.github-token }}
path: vcm
- name: Checkout Vault tools repository to get the Autopilot upgrade tool
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0
with:
repository: hashicorp/vault-tools
token: ${{ inputs.github-token }}
Expand Down
Loading
Loading