49 Commits

Author SHA1 Message Date
Vault Automation
0c6c13dd38
license: update headers to IBM Corp. (#10229) (#10233)
* license: update headers to IBM Corp.
* `make proto`
* update offset because source file changed

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-10-21 15:20:20 -06:00
Vault Automation
5091c88bb9
release: update notification slack channel (#10213) (#10214)
Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-10-17 14:31:39 -06:00
Vault Automation
30b713e8e1
updating the manifest to add v1.21.x (#9856) (#9859)
Co-authored-by: ericjones <eric.jones@hashicorp.com>
Co-authored-by: Tony Wittinger <anwittin@users.noreply.github.com>
2025-10-07 16:05:20 -06:00
Vault Automation
df7bd0e8c2
SMRE-733: Updates post-install text to properly reflect the updated IPLA blurb (#9331) (#9486)
* Updates post-install text to properly reflect the updated IPLA blurb

* Adds changelog for SMRE-733

Co-authored-by: ethel-hashicorp <ethel.evans@hashicorp.com>
2025-09-23 11:16:01 -06:00
Vault Automation
8a89a1c862
Upgrade to CRT schema 2 to fix crt-report-dispatch event (#8572) (#8809)
Co-authored-by: james-warren0 <95658341+james-warren0@users.noreply.github.com>
2025-08-22 11:16:52 -06:00
ej-hashi
37e707b270
updated the versions.hcl file for 1.20 (#31151)
Co-authored-by: Eric Jones <cirej2013@gmail.com>
2025-07-01 09:41:58 -07:00
Steven Clark
863d22555b
Disable 1.19.x for CE backports (#30928) 2025-06-10 11:02:51 -04:00
davidadeleon
dad218cba2
re-enable 1.19.x as ce_active (#30895)
* re-enable 1.19.x as ce_active

* add 1.17.x back

* set 1.17.x ce_active to false

---------

Co-authored-by: davidadeleon <ddeleon@hashicorp.com>
2025-06-06 14:33:56 -04:00
ej-hashi
34d202611a
Adding 1.20.x and removing 1.17.x from versions.hcl (#30873)
Co-authored-by: Eric Jones <cirej2013@gmail.com>
2025-06-05 15:09:18 -07:00
Kent Gruber
0e4dfe8ba7
Refactor release security scan config (#30597) 2025-05-23 11:22:19 -06:00
Ryan Cragun
3e9f84e666
[VAULT-36202] pipeline(releases): add releases list active-versions command (#30658)
While working on VAULT-34829 it became apparent that if our new backporter
could know which branches are active and which CE counterparts are active
then we could completely omit the need for `ce` backport labels and instead
automatically backport to corresponding CE branches that are active.

To facilitate that we can re-use our `.release/versions.hcl` file as it is
the current source of truth for our present backport assistant workflow.

Here we add a new `pipeline releases list versions` command that is capable
of decoding that file and optionally displaying it. It will be used in the
next PR that fully implements VAULT-34829.

As part of this work we refactors `pipeline releases` to include a new `list`
sub-command and moved both `list-active-versions` and `versions` to it.

We also include a few small fixes that were noticed:
  - `.release/verions.hcl` was not up-to-date
  - Our cached dynamic config was not getting recreated when the pipeline
    tool changed. That has been fixed so now dynamic config should always
    get recreated when the pipeline binary changes
  - We now initialize a git client when using the `github` sub-command.
    This will be used in more forthcoming work
  - Update our changed file detection to resolve some incorrect groupings
  - Add some additional changed file helpers that we be used in forthcoming
    work

Signed-off-by: Ryan Cragun <me@ryan.ec>
2025-05-20 11:10:24 -06:00
Ryan Cragun
446a0cc517
security(scanner): Suppress CVE-2024-58251 until a new Alpine image is available (#30358)
Signed-off-by: Ryan Cragun <me@ryan.ec>
2025-04-23 15:31:05 -06:00
Ryan Cragun
9859b06401
VAULT-35615 security(scanner): suppress CVE-2025-46394 (#30350)
An upstream CVE in busybox is tripping the security scanner:
https://github.com/hashicorp/crt-workflows-common/actions/runs/14623987904/job/41031896870#step:9:16

Since this will require a new version of Alpine we can’t do much except
suppress it until a new version has been released with Busybox >= 1.38

We’re already rolling on the latest Alpine 3 so we ought to get the fix
as soon as it’s released and available, but this will unbreak the
pipeline until then.

Signed-off-by: Ryan Cragun <me@ryan.ec>
2025-04-23 13:43:33 -06:00
Mark Collao
8522652c56
VAULT-33401 - update security-scan.hcl (#29230)
* update security-scan.hcl

* Update .release/security-scan.hcl

Co-authored-by: Theron Voran <tvoran@users.noreply.github.com>

---------

Co-authored-by: Theron Voran <tvoran@users.noreply.github.com>
2025-02-21 10:59:24 -08:00
davidadeleon
751ee0da39
add 1.19.x (#29565)
Co-authored-by: davidadeleon <ddeleon@hashicorp.com>
2025-02-12 00:28:22 +00:00
Tom Chwojko-Frank
b753cc50d5
Updating the active version to 1.18.x (#28693)
* Updating the active version to 1.18.x

* Removed 1.15.x
2024-10-11 14:49:54 -07:00
Steven Clark
4a1cddf2d5
Update the backport assistant release versions adding 1.18.x (#28344) 2024-09-10 20:44:17 +00:00
Steven Clark
566aaa661a
Update versions.hcl in prep for 1.17 release (#27381)
- With the upcoming 1.17 release, mark previous CE branches
   as no longer active, and drop the 1.14 branch from the list
   of active branches
2024-06-06 15:22:21 +00:00
Peter Wilson
bc4918ca43
update release version manifest (#27205)
* update release version manifest
2024-05-23 19:42:14 +00:00
claire labry
3c28e9dd1f
SMRE/BPA Onboarding LTS (#27053)
* onboard to use backport-assistant with lts support

* add active releases manifest file

* fix CE active release versions

* update manifest and backport files for 0.4.1 bpa version

* remove BACKPORT_LABEL_TEMPLATE

* remove extra container;

* seperate backport.yml files

---------

Co-authored-by: Jeanne Franco <jeanne.franco@hashicorp.com>
2024-05-20 10:05:52 -05:00
Sam Salisbury
ebaddedd55
release: add config to trigger SBOM creation (#25330) 2024-02-23 13:49:00 -07:00
l-with
934efb9177
add LimitCORE=0 to vault.service (#23272)
* add LimitCORE=0

* add changelog
2023-11-01 15:57:52 -04:00
Sarah Thompson
a9a4b0b9ff
Onboard Vault to CRT version bump automation (#18311)
* adding new version bump refactoring

* address comments

* remove changes used for testing

* add the version bump event!

* fix local enos scenarios

* remove unnecessary local get_local_metadata steps from scenarios
* add version base, pre, and meta to the get_local_metadata module
* use the get_local_metadata module in the local builder for version
  metadata
* update the version verifier to always require a build date

Signed-off-by: Ryan Cragun <me@ryan.ec>

* Update to embed the base version from the VERSION file directly into version.go.
This ensures that any go tests can use the same (valid) version as CI and so can local builds and local enos runs.
We still want to be able to set a default metadata value in version_base.go as this is not something that we set in the VERSION file - we pass this in as an ldflag in CI (matters more for ENT but we want to keep these files in sync across repos).

* update comment

* fixing bad merge

* removing actions-go-build as it won't work with the latest go caching changes

* fix logic for getting version in enos-lint.yml

* fix version number

* removing unneeded module

---------

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Claire <claire@hashicorp.com>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2023-09-06 17:08:48 +01:00
Tanmay Pereira Naik
2269369229
docs: Update outdated vaultproject.io/docs/ links (#22162)
Signed-off-by: Tanmay Pereira Naik <59953366+tanmay-pnaik@users.noreply.github.com>
Co-authored-by: Brian Shumate <brianshumate@users.noreply.github.com>
2023-08-15 12:59:34 -04:00
hashicorp-copywrite[bot]
0b12cdcfd1
[COMPLIANCE] License changes (#22290)
* Adding explicit MPL license for sub-package.

This directory and its subdirectories (packages) contain files licensed with the MPLv2 `LICENSE` file in this directory and are intentionally licensed separately from the BSL `LICENSE` file at the root of this repository.

* Adding explicit MPL license for sub-package.

This directory and its subdirectories (packages) contain files licensed with the MPLv2 `LICENSE` file in this directory and are intentionally licensed separately from the BSL `LICENSE` file at the root of this repository.

* Updating the license from MPL to Business Source License.

Going forward, this project will be licensed under the Business Source License v1.1. Please see our blog post for more details at https://hashi.co/bsl-blog, FAQ at www.hashicorp.com/licensing-faq, and details of the license at www.hashicorp.com/bsl.

* add missing license headers

* Update copyright file headers to BUS-1.1

* Fix test that expected exact offset on hcl file

---------

Co-authored-by: hashicorp-copywrite[bot] <110428419+hashicorp-copywrite[bot]@users.noreply.github.com>
Co-authored-by: Sarah Thompson <sthompson@hashicorp.com>
Co-authored-by: Brian Kassouf <bkassouf@hashicorp.com>
2023-08-10 18:14:03 -07:00
Sarah Thompson
a2993878f1
Onboard Vault to the prepare workflow. (#21011)
* Onboard Vault to the prepare workflow.

* remove after testing

* no message

* remove changes used for testing

* adding back comma - so as not to introduce unnecessary merge conflicts
2023-06-14 12:12:09 +01:00
Hamid Ghaf
e55c18ed12
adding copyright header (#19555)
* adding copyright header

* fix fmt and a test
2023-03-15 09:00:52 -07:00
Ryan Cragun
206db2f529
[QT-436] Pseudo random artifact test scenarios (#18056)
Introducing a new approach to testing Vault artifacts before merge
and after merge/notorization/signing. Rather than run a few static
scenarios across the artifacts, we now have the ability to run a
pseudo random sample of scenarios across many different build artifacts.

We've added 20 possible scenarios for the AMD64 and ARM64 binary
bundles, which we've broken into five test groups. On any given push to
a pull request branch, we will now choose a random test group and
execute its corresponding scenarios against the resulting build
artifacts. This gives us greater test coverage but lets us split the
verification across many different pull requests.

The post-merge release testing pipeline behaves in a similar fashion,
however, the artifacts that we use for testing have been notarized and
signed prior to testing. We've also reduce the number of groups so that
we run more scenarios after merge to a release branch.

We intend to take what we've learned building this in Github Actions and
roll it into an easier to use feature that is native to Enos. Until then,
we'll have to manually add scenarios to each matrix file and manually
number the test group. It's important to note that Github requires every
matrix to include at least one vector, so every artifact that is being
tested must include a single scenario in order for all workflows to pass
and thus satisfy branch merge requirements.

* Add support for different artifact types to enos-run
* Add support for different runner type to enos-run
* Add arm64 scenarios to build matrix
* Expand build matrices to include different variants
* Update Consul versions in Enos scenarios and matrices
* Refactor enos-run environment
* Add minimum version filtering support to enos-run. This allows us to
  automatically exclude scenarios that require a more recent version of
  Vault
* Add maximum version filtering support to enos-run. This allows us to
  automatically exclude scenarios that require an older version of
  Vault
* Fix Node 12 deprecation warnings
* Rename enos-verify-stable to enos-release-testing-oss
* Convert artifactory matrix into enos-release-testing-oss matrices
* Add all Vault editions to Enos scenario matrices
* Fix verify version with complex Vault edition metadata
* Rename the crt-builder to ci-helper
* Add more version helpers to ci-helper and Makefile
* Update CODEOWNERS for quality team
* Add support for filtering matrices by group and version constraints
* Add support for pseudo random test scenario execution

Signed-off-by: Ryan Cragun <me@ryan.ec>
2022-12-12 13:46:04 -07:00
Jaymala
925a2b094f
Add Artifactory build to the matrix (#17353)
* Add Artifactory build to the matrix

Signed-off-by: Jaymala Sinha <jaymala@hashicorp.com>

* Update test scenarios

Signed-off-by: Jaymala Sinha <jaymala@hashicorp.com>

* Fix Terraform format

Signed-off-by: Jaymala Sinha <jaymala@hashicorp.com>

* Updates with verification

Signed-off-by: Jaymala Sinha <jaymala@hashicorp.com>

* Integrate variables from CRT inputs

Signed-off-by: Jaymala Sinha <jaymala@hashicorp.com>

* Latest update to add Artifactory support

Signed-off-by: Jaymala Sinha <jaymala@hashicorp.com>

* Address review feedback

Signed-off-by: Jaymala Sinha <jaymala@hashicorp.com>

* Enable Enos run in CRT workflow

Signed-off-by: Jaymala Sinha <jaymala@hashicorp.com>

* Remove unused variables

Signed-off-by: Jaymala Sinha <jaymala@hashicorp.com>

* Update Artifactory module

Signed-off-by: Jaymala Sinha <jaymala@hashicorp.com>

* Address review feedback

Signed-off-by: Jaymala Sinha <jaymala@hashicorp.com>

Signed-off-by: Jaymala Sinha <jaymala@hashicorp.com>
2022-10-17 19:47:37 -04:00
Mariano Asselborn
978ab54602
Enable Iron Bank integration (#17482) 2022-10-11 10:25:58 -04:00
Meggie
05997054cf
Updating the release slack channel (#16949)
* Updating the release slack channel.

* Updating comment too
2022-08-31 13:55:24 -04:00
claire labry
b8a706b122
add a note clarifying to leave website event in oss only (#16687) 2022-08-11 14:41:15 -05:00
Michele Degges
c687f2564a
[CI-only] Use pattern matching for release_branches (#16375)
Pattern matching was [recently added](https://github.com/hashicorp/crt-orchestrator/pull/51) so that teams no longer have to explicitly list every branch that should trigger the CRT pipeline. This simplifies release preparation- anytime a new release branch is created, it will produce releasable artifacts and exercise the full pipeline.
2022-08-10 11:25:10 -07:00
claire labry
7d0f0b2a3a
introduces the post publish website event (#16328) 2022-08-08 16:51:03 +01:00
Chris Capurso
9f1488d2a5
Prep for 1.12 (#15612)
* set sdk version to 1.12.0

* remove 1.7.x and add 1.11.x branches in ci.hcl
2022-05-25 16:18:41 -04:00
Alexander Scheel
bddfb9d446
Fix value of VAULT_DISABLE_FILE_PERMISSIONS_CHECK (#15438)
This variable doesn't use ParseBool and thus strictly requires "true" as
the value.

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2022-05-17 09:43:01 -04:00
Alexander Scheel
dc98295e4c
UBI Containerfile - CRT Enablement (#15272)
* Copy UBI Dockerfile into Vault

This Dockerfile was modeled off of the existing Alpine Dockerfile (in
this repo) and the external Dockerfile from the docker-vault repo:

> https://github.com/hashicorp/docker-vault/blob/master/ubi/Dockerfile

We also import the UBI-specific docker-entrypoint.sh, as certain
RHEL/Alpine changes (like interpreter) require a separate entry script.

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add UBI build to CRT pipeline

Also adds workflow_dispatch to the CRT pipeline, to allow manually
triggering CRT from PRs, when desired.

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Update Dockerfile

Co-authored-by: Sam Salisbury <samsalisbury@gmail.com>

* Update Dockerfile

Co-authored-by: Sam Salisbury <samsalisbury@gmail.com>

* Update Dockerfile

Co-authored-by: Sam Salisbury <samsalisbury@gmail.com>

* Update Dockerfile

* Update Dockerfile

* Update build.yml

Allow for both push to arbitrary branch plus workflow dispatch, per Newsletter article.

Co-authored-by: Sam Salisbury <samsalisbury@gmail.com>
2022-05-13 11:21:15 -04:00
Jeanne Angeles Franco
6f0f54a251
Add release metadata config key (#15270) 2022-05-03 20:34:29 -07:00
Michele Degges
2225b34b02
[RelAPI Onboarding] Add release API metadata file (#14679)
👋  This PR adds a `.release/release-metadata.hcl` file to the repo. This contains static metadata that will be processed and sent as part of the payload in RelAPI POST requests, which will be sent when staging and production releases are triggered.  

This can be merged now, but will not have any effect until after the RelAPI launch. This will need to be backported to all active release branches, as well. Similar additions are being added across all projects that publish to releases.hashicorp.com.
2022-03-24 18:30:52 -07:00
Michele Degges
220067b03c
Temporarily turn nvd sec scanning off (#14466) 2022-03-14 10:06:06 -07:00
Ricky Grassmuck
b09f3c0148
Set service type to notify in systemd unit. (#14385)
Updates the systemd service shipped with Linux packages to `Type=notify`
2022-03-09 08:13:45 -05:00
Hridoy Roy
a5837493d5
update ci.hcl to remove 1.6.x and add in 1.10.x (#14310) 2022-02-28 15:58:42 -08:00
Sarah Thompson
66261434cc
Adding promotion and post publish events to the ci.hcl. (#14128) 2022-02-25 17:12:16 +00:00
mickael-hc
64a8f9aeff
Remove --privileged recommendation from entrypoint script message (#14027)
The use of the `--privileged` [flag](https://docs.docker.com/engine/reference/commandline/run/#options) is not recommended, as it does not adhere to the principle of least privilege.
2022-02-18 16:52:21 -05:00
Sarah Thompson
b0aab7a056
Turning off binary secret scanning to allow builds to be processed until https://github.com/hashicorp/security-scanner/issues/166 is addressed. (#13920) 2022-02-07 15:31:18 +00:00
hghaf099
5ff51c1c9e
turning go modules to false until jwt cve issue fixed (#13888) 2022-02-03 13:57:47 -05:00
claire labry
935b12a1f9
add security-scan for CRT (#13627)
* add security-scan

* updating the alpine version

* clean up

* update the alpine version to be more prescriptive
2022-01-31 11:35:25 -05:00
Michele Degges
b9ecffb4c4
Fix for main: Add vault revision to --version cmd (#13428) 2021-12-15 11:38:20 -08:00
claire labry
1bec99602c
adding CRT to main branch (#13088)
* adding CRT to main branch

* cleanup

* um i dont know how that got removed but heres the fix

* add vault.service

Co-authored-by: Kyle Penfound <kpenfound11@gmail.com>
2021-12-06 11:06:22 -05:00