mirror of
https://github.com/hashicorp/vault.git
synced 2025-08-31 19:41:12 +02:00
* VAULT-38463: Addressing ldap pipeline failure * testing ldap tests * testing ldap tests * debugging ldap issue * testing pipeline * testing pipeline * testing pipeline * testing pipeline * testing pipeline * testing pipeline * testing pipeline * debugging ldap failure * debugging ldap failure * debugging pipeline * adding dependency for verify secrets * removing extra code * undo changes * undo changes Co-authored-by: Tin Vo <tintvo08@gmail.com>
This commit is contained in:
parent
ea954aabaf
commit
8d2cb89704
@ -197,7 +197,7 @@ jobs:
|
||||
echo 'ENOS_VAR_vault_revision=${{ inputs.vault-revision }}'
|
||||
echo 'ENOS_VAR_vault_upgrade_initial_version=${{ matrix.attributes.upgrade_initial_version }}'
|
||||
echo 'ENOS_VAR_verify_aws_secrets_engine=false'
|
||||
echo 'ENOS_VAR_verify_ldap_secrets_engine=false'
|
||||
echo 'ENOS_VAR_verify_ldap_secrets_engine=true'
|
||||
echo 'ENOS_VAR_verify_log_secrets=true'
|
||||
} | tee -a "$GITHUB_ENV"
|
||||
- uses: hashicorp/setup-terraform@b9cd54a3c349d3f38e8881555d616ced269862dd # v3.1.2
|
||||
|
@ -516,7 +516,8 @@ scenario "agent" {
|
||||
description = global.description.verify_secrets_engines_create
|
||||
module = module.vault_verify_secrets_engines_create
|
||||
depends_on = [
|
||||
step.verify_vault_unsealed
|
||||
step.verify_vault_unsealed,
|
||||
step.get_vault_cluster_ips
|
||||
]
|
||||
|
||||
providers = {
|
||||
|
@ -747,6 +747,7 @@ scenario "dr_replication" {
|
||||
hosts = step.create_primary_cluster_targets.hosts
|
||||
ip_version = matrix.ip_version
|
||||
integration_host_state = step.set_up_external_integration_target.state
|
||||
ldap_enabled = false
|
||||
leader_host = step.get_primary_cluster_ips.leader_host
|
||||
ports = global.ports
|
||||
ipv4_cidr = step.create_vpc.ipv4_cidr
|
||||
@ -1154,6 +1155,7 @@ scenario "dr_replication" {
|
||||
create_state = step.verify_secrets_engines_on_primary.state
|
||||
hosts = step.get_secondary_cluster_ips.follower_hosts
|
||||
ip_version = matrix.ip_version
|
||||
ldap_enabled = false
|
||||
vault_addr = step.create_secondary_cluster.api_addr_localhost
|
||||
vault_edition = matrix.edition
|
||||
vault_install_dir = global.vault_install_dir[matrix.artifact_type]
|
||||
@ -1296,6 +1298,7 @@ scenario "dr_replication" {
|
||||
create_state = step.verify_secrets_engines_on_primary.state
|
||||
hosts = step.get_secondary_cluster_ips.follower_hosts
|
||||
ip_version = matrix.ip_version
|
||||
ldap_enabled = false
|
||||
vault_addr = step.create_secondary_cluster.api_addr_localhost
|
||||
vault_edition = matrix.edition
|
||||
vault_install_dir = global.vault_install_dir[matrix.artifact_type]
|
||||
|
@ -769,6 +769,7 @@ scenario "pr_replication" {
|
||||
hosts = step.create_primary_cluster_targets.hosts
|
||||
ip_version = matrix.ip_version
|
||||
integration_host_state = step.set_up_external_integration_target.state
|
||||
ldap_enabled = false
|
||||
leader_host = step.get_primary_cluster_ips.leader_host
|
||||
ports = global.ports
|
||||
ipv4_cidr = step.create_vpc.ipv4_cidr
|
||||
@ -986,6 +987,7 @@ scenario "pr_replication" {
|
||||
create_state = step.verify_secrets_engines_on_primary.state
|
||||
hosts = step.get_secondary_cluster_ips.follower_hosts
|
||||
ip_version = matrix.ip_version
|
||||
ldap_enabled = false
|
||||
vault_addr = step.create_secondary_cluster.api_addr_localhost
|
||||
vault_edition = matrix.edition
|
||||
vault_install_dir = global.vault_install_dir[matrix.artifact_type]
|
||||
|
@ -492,7 +492,8 @@ scenario "proxy" {
|
||||
description = global.description.verify_secrets_engines_create
|
||||
module = module.vault_verify_secrets_engines_create
|
||||
depends_on = [
|
||||
step.verify_vault_unsealed
|
||||
step.verify_vault_unsealed,
|
||||
step.get_vault_cluster_ips
|
||||
]
|
||||
|
||||
providers = {
|
||||
|
Loading…
x
Reference in New Issue
Block a user