Commit graph

22175 commits

Author SHA1 Message Date
Vault Automation
fde84a90c2
VAULT-41682 - generalized and center-aligned HDS Application State text (#12040) (#12049)
Co-authored-by: mohit-hashicorp <mohit.ojha@hashicorp.com>
2026-01-28 11:58:34 -05:00
Vault Automation
84cf94dba8
VAULT-41682 - Updates dashboard cards to use HDS:ApplicationState instead of EmptyState (#12041) (#12047)
* VAULT-41682 - EmptyState update to dashboard cards

* fix - spelling



---------

Co-authored-by: mohit-hashicorp <mohit.ojha@hashicorp.com>
Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
2026-01-28 11:58:05 -05:00
Vault Automation
47b000674b
UI: Convert namespace service to typescript (#12008) (#12039)
* convert to typescript

* move getOptions to namespace service

* delete unneeded ts file

* add test coverage and cleanup getOptions method

* use new admin const

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>
2026-01-27 17:07:50 -08:00
Vault Automation
ab5ff72603
Vault-40972 Third Party Plugin Counts (#12010) (#12038)
* temp

* temp

* Modified the tests a bit

* One more modification

* Added two tests for official and third party plugins

* TEmp

* Added external test with primary and secondary

* Made some fixes based on comments

* Fixing a linter error

* One more fix

Co-authored-by: divyaac <divya.chandrasekaran@hashicorp.com>
2026-01-27 15:27:49 -08:00
Vault Automation
2e32e679d0
Backport PKI (SCEP): support compound octet strings for inner PKCS7 content into ce/main (#12021)
* PKI (SCEP): support compound octet strings for inner PKCS7 content (#12019)

* Support compound octet strings for inner PKCS7 content

* Add cl

* Remove hashicorp/go-cmp ENT dependency

---------

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2026-01-27 17:07:07 +00:00
Vault Automation
852ac403bb
Root Credential Rotation Workflows (#11647) (#11996)
* Verify vault can generate dynamic credentials and rotate root password

* Added new line at end of the script file

* Remove extra space in sh script

* Remove extra space in sh script

* Created modular structure and other fixes

* linting issues

* lint issues

* Linting issue in verify-secrets.sh

* Linting issue in verify-secrets.sh

* Linting issues in verify-secrets.sh and verify-rotation.sh

* Linting issues

* Linting issues

* Linting issues

* Reverted the changes made to ldap-configs.sh and ldap-verify-configs

* Fix missing newline at end of ldap-verify-configs

Add a newline at the end of the ldap-verify-configs script.

* test ldap changes

* test ldap changes

* reverted the configuration for testing ldap [ci skip]

* reverted the configuration for testing ldap [ci skip]

* Refactoring

* Update ldap.tf

* Update ldap.tf [ci skip]

* Update ldap.tf

* Adding Password policy in ldap secret engine config

* Root credential rotation workflows

* linting issues

* Update test-run-enos-scenario-matrix.yml to check ldap changes

* Update test-run-enos-scenario-matrix.yml reverted

* conflicts resolved

* changes

* Update test-run-enos-scenario-matrix.yml to test ldap changes

* Update test-run-enos-scenario-matrix.yml reverted

* added functions

* linting issues

* linting issues

* linting issues

* Update test-run-enos-scenario-matrix.yml to tst ldap

* Update test-run-enos-scenario-matrix.yml reverted

* review changes

* Update test-run-enos-scenario-matrix.yml to test ldap

* lint issue

* reverted Update test-run-enos-scenario-matrix.yml

* refactor

* Update test-run-enos-scenario-matrix.yml test ldap

* Update verify-rotation.sh

* Update verify-rotation.sh

* Update test-run-enos-scenario-matrix.yml reverted

---------

Co-authored-by: pranaya092000 <pranaya.p@hashicorp.com>
Co-authored-by: Pranaya <Pranaya.P@ibm.com>
Co-authored-by: Luis (LT) Carbonell <lt.carbonell@hashicorp.com>
2026-01-27 13:17:18 +05:30
Vault Automation
5a54a1bb41
LDAP Check out Check in System test Cases Part-1 (#11792) (#11986)
* LDAP Check out Check in System test Cases Part-1

* Test run on pipeline

* Test run on pipeline

* Linter error fix

* Fix linter issue

* Linter error fix

* lint issue

* lint issue

* lint issue

* lint issue

* lint issue

* lint issues

* bug fix

* lint fix

* Run test on pipeline

* Remove file enos.vars.hcl from repository

* Revert "Remove file enos.vars.hcl from repository"

This reverts commit bec9bcd5e1d8b07a662756c2385ca90e035fc125.

* Restore enos.vars.hcl to repository

* CI build failure fix

* CI bug fix

* CI bug fix

* CI bug fix

* CI bug fix

* CI bug fix

* Replace string based error detection with exit code

* Changing pipeline run variable to false

---------

Co-authored-by: KajalKusum <kajal.kusum@hashicorp.com>
Co-authored-by: Kajal Kusum <kajal.kusum@ibm.com>
Co-authored-by: Luis (LT) Carbonell <lt.carbonell@hashicorp.com>
2026-01-27 12:31:51 +05:30
Vault Automation
6841981524
Root Credential Configuration Workflows (#11606) (#11991)
* Verify vault can generate dynamic credentials and rotate root password

* Added new line at end of the script file

* Remove extra space in sh script

* Remove extra space in sh script

* Created modular structure and other fixes

* linting issues

* lint issues

* Linting issue in verify-secrets.sh

* Linting issue in verify-secrets.sh

* Linting issues in verify-secrets.sh and verify-rotation.sh

* Linting issues

* Linting issues

* Linting issues

* Reverted the changes made to ldap-configs.sh and ldap-verify-configs

* Fix missing newline at end of ldap-verify-configs

Add a newline at the end of the ldap-verify-configs script.

* test ldap changes

* test ldap changes

* reverted the configuration for testing ldap [ci skip]

* reverted the configuration for testing ldap [ci skip]

* Refactoring

* Update ldap.tf

* Update ldap.tf [ci skip]

* Update ldap.tf

* Adding Password policy in ldap secret engine config

* Update test-run-enos-scenario-matrix.yml with ldap changes

* Reverted Update test-run-enos-scenario-matrix.yml for testing ldap changes

* conflict changes [ci skip]

* Update test-run-enos-scenario-matrix.yml for ldap testing

* Reverted Update test-run-enos-scenario-matrix.yml

* ldap chnged to MOUNT

* Update test-run-enos-scenario-matrix.yml to test ldap changes

* Update test-run-enos-scenario-matrix.yml reverted

* updated review comments

* updated review comments

* Update test-run-enos-scenario-matrix.yml to test ldap

* Update test-run-enos-scenario-matrix.yml reverted

* Update verify-secrets.sh

---------

Co-authored-by: pranaya092000 <pranaya.p@hashicorp.com>
Co-authored-by: Pranaya <Pranaya.P@ibm.com>
Co-authored-by: Luis (LT) Carbonell <lt.carbonell@hashicorp.com>
2026-01-27 04:48:50 +00:00
Vault Automation
b6349bf3d0
stub auth data for usage page (#12006) (#12009)
Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>
2026-01-27 00:57:20 +00:00
Vault Automation
7fc3705838
remove EntDatabaseConfig key from ce database config response (#11045) (#11060)
Co-authored-by: Thy Ton <maithytonn@gmail.com>
2026-01-26 15:55:59 -08:00
Vault Automation
3a108ea88e
Backport [VAULT-41857] pipeline(find-artifact): add support for finding artifacts from branches into ce/main (#11971)
* [VAULT-41857] pipeline(find-artifact): add support for finding artifacts from branches (#11799)

Add support for finding matching workflow artifacts from branches rather than PRs. This allows us to trigger custom HCP image builds from a branch rather than an PR. It also enables us to build and test the HCP image on a scheduled nightly cadence, which we've also enabled.

As part of these changes I also added support for specifying which environment you want to test and threaded it through the cloud scenario now that there are multiple variants. We also make the testing workflow workflow_dispatch-able so that we can trigger HVD testing for any custom image in any environment without building a new image.

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2026-01-26 22:27:10 +00:00
Vault Automation
5d36ecf565
Set up Copilot instructions entrypoint (#11946) (#11951)
Create copilot-instructions.md for the Copilot agent
to automatically apply instructions.
Remove instructions for missing specific/ folder.
Add code comment instructions for better commenting patterns and
naming conventions.

Co-authored-by: Angelo Cordon <angelo.cordon@hashicorp.com>
2026-01-26 12:01:59 -08:00
Vault Automation
7e7a1bfe63
UI: Namespace page component (#11956) (#11977)
* move namespace logic over into page component

* add onPageChange arg and pass @model

* update type and arg accessor

Co-authored-by: lane-wetmore <lane.wetmore@hashicorp.com>
2026-01-26 13:15:23 -06:00
Vault Automation
06ddf792f2
[UI] VAULT-41962 Updated tools sidebar (#11919) (#11984)
* VAULT-41962 Updated tools sidebar

* Fix failing tests and add copyright header

* Update capitailization of nav item titles

* Update tools breadcrumbs

* Add comments

* Fix failing tests!

* Update ui/tests/acceptance/config-ui/messages/messages-test.js



* Update ui/lib/core/addon/components/sidebar/nav/tools.ts



* Add more nav tests for custom messages

* Update test name

---------

Co-authored-by: Kianna <30884335+kiannaquach@users.noreply.github.com>
Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
2026-01-26 10:11:40 -08:00
Vault Automation
2855ca4318
VAULT-41206 remaining db role hwm counts (#11706) (#11931)
* add definitions and logic to track count of db roles

* add mongo db atlas roles

* fix keys for ali cloud and nomad

* fix test for consul

* remove mongodb tracking since it is already tracked by database

* add unit tests for consumption billing

* add unit tests for billing util

* feedback

* add new tests to verify that mongodb roles count towards Database roles

Co-authored-by: Amir Aslamov <amir.aslamov@hashicorp.com>
2026-01-26 09:37:33 -08:00
Vault Automation
a1f3a33a46
VAULT-42083 remove raw_policy from policy upsert observations (#11957) (#11979)
* VAULT-42083 remove raw_policy from policy upsert observations

* whoops

Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
2026-01-26 11:55:29 -05:00
Vault Automation
744024c83e
VAULT-41729 Refactor PKI Cert Counting Code (#11657) (#11881)
* Basic refactoring to reuse PKI certs for SSH

* Refactored so that files are moved to CE

* Modified comment

* Renamed CertCountSystemView

* Moved forwarding function and redefined consume function

* Renamed cert view file

* Moved forwarding function and redefined consume function

Small edit

Renamed cert view file

* Fix issues with commit

* Fix consume job

* Removed error

* Update vault/logical_system_helpers.go



---------

Co-authored-by: divyaac <divya.chandrasekaran@hashicorp.com>
Co-authored-by: Victor Rodriguez <vrizo@hashicorp.com>
2026-01-26 08:28:41 -05:00
Vault Automation
591e963342
add carbon tree chart (#11965) (#11970)
* add carbon tree chart

* a11y and test improvements

Co-authored-by: lane-wetmore <lane.wetmore@hashicorp.com>
2026-01-23 23:59:12 +00:00
Vault Automation
921ea64aba
Adjust CODEOWNERS for copilot-related files (#11949) (#11959)
Set copilot instructions code ownership to wider Vault team.

Co-authored-by: Angelo Cordon <angelo.cordon@hashicorp.com>
2026-01-23 15:12:35 -08:00
Vault Automation
0d0a06c491
Update eslint console rule (#11883) (#11948)
Allow for console error and warn and fail for everything else.
Remove disable rules for console.

Co-authored-by: Angelo Cordon <angelo.cordon@hashicorp.com>
2026-01-23 13:26:41 -08:00
Vault Automation
aa1349f5a5
actions(runners): add backup self-hosted runner types (#11884) (#11937)
* actions(runners): add backup self-hosted runner types

We've previously added backup runner types for various self-hosted
runners but were not exhaustive. This change adds at least one backup
instance type to each specified on-demand runner type.

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2026-01-23 21:12:52 +00:00
Vault Automation
3c2f5b2ea0
Enable GCP workload identity authentication for GCP KMS Managed Keys (#11918) (#11942)
* removing explicit GCP credentials checks to allow for GCP WIF authentication, in line with AWS KMS functionality

* upd: updated changelog for GCP managed keys in core

---------

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
Co-authored-by: rizkybiz <justin.defrank@gmail.com>
2026-01-23 13:48:50 -05:00
Vault Automation
e21dfb9707
UI: Add tune support to Kubernetes Secrets Engine (#11855) (#11935)
* updating kub to use new config pages

* fix tests

* remove cta

* fix test

* updating configure route data, adding tests for dropdown/exit button

Co-authored-by: Dan Rivera <dan.rivera@hashicorp.com>
2026-01-23 17:27:22 +00:00
Vault Automation
433f90417a
add variable template (#11923) (#11932)
Co-authored-by: lane-wetmore <lane.wetmore@hashicorp.com>
2026-01-23 09:49:26 -06:00
Vault Automation
fc3f525ea8
Backport remove unused TestLicenseOptions into ce/main (#11929)
* remove unused TestLicenseOptions (#11928)

* go mod tidy

---------

Co-authored-by: akshya96 <87045294+akshya96@users.noreply.github.com>
Co-authored-by: akshya96 <araghavan@hashicorp.com>
2026-01-23 07:18:29 -05:00
Vault Automation
8d3e25015f
Backport Remove go-licensing specific changes from CE into ce/main (#11922)
* no-op commit

* merging changes from ent

* deleting ent file

* moving licensing config back

* Revert "moving licensing config back"

This reverts commit 8856cd7d5d334355610782e500ebcd4438ff89b3.

* adding back licensing config to original state (#11925)

---------

Co-authored-by: akshya96 <87045294+akshya96@users.noreply.github.com>
Co-authored-by: akshya96 <araghavan@hashicorp.com>
2026-01-22 20:30:31 -08:00
Vault Automation
bb75e0846a
[UI][VAULT-41961] Update Access nav and breadcrumbs (#11869) (#11915)
* Update access nav and breadcrumbs

* Fix tsts and update permissions

* Remove pausetest

* Check if root is an array

* Fix edit breadcrumb

* Fix more tests!

* Fix logic

Co-authored-by: Kianna <30884335+kiannaquach@users.noreply.github.com>
2026-01-22 17:55:18 -08:00
Vault Automation
e745f92bc5
actions: pin to latest actions (#11818) (#11909)
- actions/cache -> v5.0.2: A bugfix around not retrying cache entries on
  429s.
- actions/setup-go -> v6.2.0: NodeJS bump and internal actions/cache
  bump. We don't use the caching in setup-go so this ought to have no
  impact for us.
- actions/setup-node -> v6.2.0: internal bump of actions/cache.
- pnpm/action-setup -> v4.2.0: Adds support for .npmrc file.

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2026-01-22 20:38:08 +00:00
Vault Automation
c493633d99
update lodash version (#11893) (#11906)
Co-authored-by: Dan Rivera <dan.rivera@hashicorp.com>
2026-01-22 18:36:13 +00:00
Vault Automation
692246e894
enos(ui): use amd64 target machines (#11875) (#11894)
Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2026-01-22 10:59:06 -07:00
Vault Automation
ae330a274e
add observations for the rabbitmq secrets engine (#11601) (#11846) 2026-01-22 10:40:17 -06:00
Vault Automation
b22b89ef2d
add observations for the consul secrets engine (#11425) (#11692) 2026-01-22 10:39:50 -06:00
Vault Automation
60eb60c24f
[UI] Ember Data Migration - KMIP Cleanup (#11838) (#11865)
* updates kmip scope roles route to ts

* updates kmip scope roles route to use api service and adds page component

* converts kmip role route to ts

* fixes a11y error in kmip header-credentials component

* updates kmip role route to use api service and adds page component

* removes kmip operation-field-display component that was moved into role page component

* converts kmip role create route to ts

* moves kmip role form component to component directory root

* converts kmip role form component to ts

* adds operation-groups helper and refactors kmip role page to use it

* adds operation-label helper and updates kmip role page to use it

* converts kmip edit role route to ts

* updates kmip role test to use operation-groups helper

* adds kmip role form

* updates kmip role edit and create routes to use api service and form class

* updates kmip role form component to work with form class

* updates kmip acceptance tests

* converts kmip credentials index route to ts

* updates kmip credentials route to use api service

* adds kmip credentials page component

* converts kmip credentials show route to ts

* updates kmip credentials show route to use api service and adds page component

* fixes flash message issue on kmip role form submit success

* converts kmip credentials generate route to ts

* reverts kmip credentials show page component in favor of details-credentials component which is also used in generate route

* fixes kmip details-credentials tests

* update kmip credentials generate route to use api service and updates page component

* removes store and pagination services from kmip engine

* converts kmip breadcrumb component to ts

* converts kmip header scope component to ts

* removes kmip Ember Data models and adapters

* removes store reference from kmip acceptance tests

* fixes issues routing back to secrets engine via breadcrumb in kmip roles and credentials routes

* removes kmip role adapter test

* updates open api helpers tests

Co-authored-by: Jordan Reimer <zofskeez@gmail.com>
2026-01-21 17:20:19 +00:00
Vault Automation
1f883d8d59
agent: Retry transient lookup-self errors (#11842) (#11860)
Co-authored-by: Mike Palmiotto <mpalmi@ibm.com>
2026-01-21 11:35:08 -05:00
Vault Automation
04d1d4ca76
UI: Client count error handling (#11852) (#11859)
* move utils to a folder

* separate methods for serializing

* separate test coverage too

* make formatQueryParams a separate util

* use api service to request export data

* consolidate error templates

* move export request to parent route

* replace EmptyState with ApplicationState

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>
2026-01-21 02:56:29 +00:00
Vault Automation
318d6a2843
UI: Add automation snippets to policy read view (#11804) (#11856)
* add automation snippets to policy and convert to page component

* only show for acl types

* remove unnecessary tag

* update test coverage

* last fix, oops!

* wait for dropdown to close

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>
2026-01-20 16:30:28 -08:00
Vault Automation
5e36c2417f
[UI] Ember Data Migration - KMIP Credentials (#11837) (#11858)
* updates kmip scope roles route to ts

* updates kmip scope roles route to use api service and adds page component

* converts kmip role route to ts

* fixes a11y error in kmip header-credentials component

* updates kmip role route to use api service and adds page component

* removes kmip operation-field-display component that was moved into role page component

* converts kmip role create route to ts

* moves kmip role form component to component directory root

* converts kmip role form component to ts

* adds operation-groups helper and refactors kmip role page to use it

* adds operation-label helper and updates kmip role page to use it

* converts kmip edit role route to ts

* updates kmip role test to use operation-groups helper

* adds kmip role form

* updates kmip role edit and create routes to use api service and form class

* updates kmip role form component to work with form class

* updates kmip acceptance tests

* converts kmip credentials index route to ts

* updates kmip credentials route to use api service

* adds kmip credentials page component

* converts kmip credentials show route to ts

* updates kmip credentials show route to use api service and adds page component

* fixes flash message issue on kmip role form submit success

* converts kmip credentials generate route to ts

* reverts kmip credentials show page component in favor of details-credentials component which is also used in generate route

* fixes kmip details-credentials tests

* update kmip credentials generate route to use api service and updates page component

Co-authored-by: Jordan Reimer <zofskeez@gmail.com>
2026-01-20 23:15:13 +00:00
Vault Automation
7cedc372c3
VAULT-41973 Move sidebar to core (#11850) (#11857)
Co-authored-by: Kianna <30884335+kiannaquach@users.noreply.github.com>
2026-01-20 22:54:38 +00:00
Vault Automation
8b300cf6eb
[UI] Ember Data Migration - KMIP Roles (#11801) (#11854)
* updates kmip scope roles route to ts

* updates kmip scope roles route to use api service and adds page component

* converts kmip role route to ts

* fixes a11y error in kmip header-credentials component

* updates kmip role route to use api service and adds page component

* removes kmip operation-field-display component that was moved into role page component

* converts kmip role create route to ts

* moves kmip role form component to component directory root

* converts kmip role form component to ts

* adds operation-groups helper and refactors kmip role page to use it

* adds operation-label helper and updates kmip role page to use it

* converts kmip edit role route to ts

* updates kmip role test to use operation-groups helper

* adds kmip role form

* updates kmip role edit and create routes to use api service and form class

* updates kmip role form component to work with form class

* updates kmip acceptance tests

* fixes flash message issue on kmip role form submit success

Co-authored-by: Jordan Reimer <zofskeez@gmail.com>
2026-01-20 20:38:18 +00:00
Vault Automation
812498cfc6
VAULT-41778 Added enos tests for LDAP auth. (#11773) (#11827)
* VAULT-41778 Fixing linting issues

* Fixing linting issues

* Fixing lint issues

* Fixing lint issues

* Fixing review comments

* Fixing lint issues

* Fix review comments

* Fix review comments

* Fix lint issues

* Fix lint issues

* Fix failing tests

* Fix lint issues

* Fixing failed tests

* Fix lint issues

* Fix lint issues

* Reverted ENOS_VAR_verify_ldap_secrets_engine variable to false

---------

Co-authored-by: rohit-ganthade-hashicorp <rohit.ganthade@hashicorp.com>
Co-authored-by: Rohit Ganthade <rohit.ganthade@gmail.com>
Co-authored-by: Luis (LT) Carbonell <lt.carbonell@hashicorp.com>
2026-01-20 08:16:46 -05:00
Vault Automation
87c9b9470b
VAULT-41681: SSH certificate observations (#11811) (#11834)
* ssh observations and tests

* remove unnecessary comments

* add metadata in comments

* add more assertions, fix test

* fix test

Co-authored-by: miagilepner <mia.epner@hashicorp.com>
2026-01-19 11:22:04 -05:00
Vault Automation
539e30c4cd
VAULT-24267 Code change for unsync secrets immediately when a mount is deleted or disabled (#11578) (#11674)
Co-authored-by: ankitsutharhashicorp <ankitkumar.suthar@hashicorp.com>
2026-01-17 10:15:27 +05:30
Vault Automation
48dbd17974
UI: Add tune support for PKI Secrets engine (#11761) (#11826)
* add dropdown

* first pass

* adding configure page w creation, edit and routing

* remove route

* remote route usage

* test fixes

* fix title

* add things back

* test fixes

* testing

* moving to template

* fixing configure

* applying suggestions & updating tests

* removing login lines to mend tests

* update header

* fix test

Co-authored-by: Dan Rivera <dan.rivera@hashicorp.com>
2026-01-16 21:30:18 +00:00
Vault Automation
4d7e01047e
go: upgrade Go to 1.25.6 (#11800) (#11819)
Resolves:
  - CVE-2025-68121
  - CVE-2025-61728
  - CVE-2025-61726
  - CVE-2025-61731
  - CVE-2025-68119

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2026-01-16 19:50:33 +00:00
Vault Automation
7a29044ea4
UI: Implement policy generator in kv v2 routes (#11798) (#11813)
* add support for initializing with capability paths

* only render flyout for enterprise versions

* update PolicyStanza to support object

* add policy generator to kv

* only set preset stanzas if no changes have been made

* add test coverage for kv adding policy generate to page headers

* add community test

* add test coverage to capabilities service

* add changelog

* add close callback

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>
2026-01-16 10:45:01 -08:00
Vault Automation
062537e1fe
VAULT-40016 Add request information to observations from direct mounts/unmounts (#11777) (#11815)
* VAULT-40016 Add request information to observations from direct mounts/unmounts

* Fix typo

Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
2026-01-16 18:24:30 +00:00
Vault Automation
0e0abf8f4e
Root credential rollback workflow (#11616) (#11785)
* Add LDAP secrets engine verification with rollback functionality

- Added LDAP secrets engine read verification module
- Implemented secrets-rollback.sh script for LDAP credential rotation testing
- Updated enos configuration files for LDAP testing support
- Added vault.zip distribution file for testing

* Optimize LDAP rollback script - improve readability and reduce redundancy

* demonstated 3 case of rollback under various situations and maintain system consistancy

* modified ldap.tf file with changes needed for secret-rollback script file

* Fix LDAP secrets engine: remove unused credential_ttl_buffer variable

* Fix shell script formatting for shfmt compliance

* Refactor LDAP secrets rollback script for clarity

* Add LDAP verification configuration to ldap.tf

Added local variable for LDAP login data and configured resource for verifying Vault LDAP configurations.

* Comment out vault_revision in enos.vars.hcl

* Remove unused generate_ldif function from secrets-rollback script

* Make sleep delays configurable in secrets-rollback script

* Add LDAP secrets rollback verification scripts and update ldap.tf configuration

* Update LDAP secrets rollback test scripts

* Update LDAP secrets engine read module

* Fix formatting in ldap.tf - correct indentation

* Change LDAP secrets engine verification to true

* Refactor LDAP rollback script for clarity

Updated script to improve clarity and consistency checks after LDAP root rotation failures.

* Add copyright and license information to script

* Fix formatting in secrets-rollback-transactional.sh

* Change LDAP secrets engine verification to false(reverting to old state)

Tried running root rotation  rollback cases with ldap set true

---------

Co-authored-by: sukanya-prakash <sukanya.p@hashicorp.com>
Co-authored-by: Sukanya P <sukanyap@Sukanyas-MacBook-Pro.local>
Co-authored-by: Sukanya P <sukanyap@mac.n3d-in.ibm.com>
2026-01-16 09:01:56 -05:00
Vault Automation
126f9f3048
VAULT-41462: Nomad secrets engine observations (#11516) (#11741)
* add nomad observations

* fix typo

* add additional metadata checks

* fix check for ttl and maxttl

* add global check for cred create

Co-authored-by: miagilepner <mia.epner@hashicorp.com>
2026-01-15 18:19:12 +01:00
Vault Automation
322d731a7a
bump github.com/hashicorp/vault/sdk to v0.21.0 (#11723) (#11732)
Co-authored-by: Maithy Ton <maithytonn@gmail.com>
2026-01-15 08:34:25 -08:00
Vault Automation
0793c817ef
[UI][VAULT-40930] Replace direct use of Hds::PageHeader with Page::Header (#11721) (#11760)
* Replace direct use of hds::pageheader with page::header

* Update test selector

* Remove unused selector

Co-authored-by: Kianna <30884335+kiannaquach@users.noreply.github.com>
2026-01-15 07:43:05 -08:00