VAULT-38463: Addressing ldap pipeline failure (#8817) (#8911)

* VAULT-38463: Addressing ldap pipeline failure

* testing ldap tests

* testing ldap tests

* debugging ldap issue

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* debugging ldap failure

* debugging ldap failure

* debugging pipeline

* adding dependency for verify secrets

* removing extra code

* undo changes

* undo changes

Co-authored-by: Tin Vo <tintvo08@gmail.com>
This commit is contained in:
Vault Automation 2025-08-26 13:46:36 -06:00 committed by GitHub
parent ea954aabaf
commit 8d2cb89704
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
5 changed files with 10 additions and 3 deletions

View File

@ -197,7 +197,7 @@ jobs:
echo 'ENOS_VAR_vault_revision=${{ inputs.vault-revision }}'
echo 'ENOS_VAR_vault_upgrade_initial_version=${{ matrix.attributes.upgrade_initial_version }}'
echo 'ENOS_VAR_verify_aws_secrets_engine=false'
echo 'ENOS_VAR_verify_ldap_secrets_engine=false'
echo 'ENOS_VAR_verify_ldap_secrets_engine=true'
echo 'ENOS_VAR_verify_log_secrets=true'
} | tee -a "$GITHUB_ENV"
- uses: hashicorp/setup-terraform@b9cd54a3c349d3f38e8881555d616ced269862dd # v3.1.2

View File

@ -516,7 +516,8 @@ scenario "agent" {
description = global.description.verify_secrets_engines_create
module = module.vault_verify_secrets_engines_create
depends_on = [
step.verify_vault_unsealed
step.verify_vault_unsealed,
step.get_vault_cluster_ips
]
providers = {

View File

@ -747,6 +747,7 @@ scenario "dr_replication" {
hosts = step.create_primary_cluster_targets.hosts
ip_version = matrix.ip_version
integration_host_state = step.set_up_external_integration_target.state
ldap_enabled = false
leader_host = step.get_primary_cluster_ips.leader_host
ports = global.ports
ipv4_cidr = step.create_vpc.ipv4_cidr
@ -1154,6 +1155,7 @@ scenario "dr_replication" {
create_state = step.verify_secrets_engines_on_primary.state
hosts = step.get_secondary_cluster_ips.follower_hosts
ip_version = matrix.ip_version
ldap_enabled = false
vault_addr = step.create_secondary_cluster.api_addr_localhost
vault_edition = matrix.edition
vault_install_dir = global.vault_install_dir[matrix.artifact_type]
@ -1296,6 +1298,7 @@ scenario "dr_replication" {
create_state = step.verify_secrets_engines_on_primary.state
hosts = step.get_secondary_cluster_ips.follower_hosts
ip_version = matrix.ip_version
ldap_enabled = false
vault_addr = step.create_secondary_cluster.api_addr_localhost
vault_edition = matrix.edition
vault_install_dir = global.vault_install_dir[matrix.artifact_type]

View File

@ -769,6 +769,7 @@ scenario "pr_replication" {
hosts = step.create_primary_cluster_targets.hosts
ip_version = matrix.ip_version
integration_host_state = step.set_up_external_integration_target.state
ldap_enabled = false
leader_host = step.get_primary_cluster_ips.leader_host
ports = global.ports
ipv4_cidr = step.create_vpc.ipv4_cidr
@ -986,6 +987,7 @@ scenario "pr_replication" {
create_state = step.verify_secrets_engines_on_primary.state
hosts = step.get_secondary_cluster_ips.follower_hosts
ip_version = matrix.ip_version
ldap_enabled = false
vault_addr = step.create_secondary_cluster.api_addr_localhost
vault_edition = matrix.edition
vault_install_dir = global.vault_install_dir[matrix.artifact_type]

View File

@ -492,7 +492,8 @@ scenario "proxy" {
description = global.description.verify_secrets_engines_create
module = module.vault_verify_secrets_engines_create
depends_on = [
step.verify_vault_unsealed
step.verify_vault_unsealed,
step.get_vault_cluster_ips
]
providers = {