23045 Commits

Author SHA1 Message Date
hc-github-team-secure-vault-core
9c5d1a5cc6 Merge remote-tracking branch 'remotes/from/ce/main' 2026-03-25 18:15:40 +00:00
Vault Automation
6d5e4c863b
Backport enos(ldap): always verify base DN connection before setup into ce/main
Refactor our connection checking into a new LDAP module that is capable
of running a search and waiting for success. We now call this module
while setting up the integration host and before enabling the LDAP
secrets engine.

We also fix two race conditions in the Agent and HA Seal scenarios where
we might attempt to verify and/or test LDAP before the integration host
has been set up.

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: LT Carbonell <lt.carbonell@hashicorp.com>
2026-03-25 13:34:17 -04:00
hc-github-team-secure-vault-core
b19b1a0e30 Merge remote-tracking branch 'remotes/from/ce/main' 2026-03-25 16:23:01 +00:00
Vault Automation
ccbca205c9
VAULT-42443 Update alias API for external JWT entity binding (#13053) (#13384)
* wip

* crud and internal lookups working

* worked with bob on tests

* add and fix some tests

* update logical identity protobuf

* pass in empty issuer via scim and add test

* tidy tests and address linter

* VAULT-42443 Update alias API for external JWT entity binding

* test cleanup

* changes

* changelog

* update fix

* address feedback

* whoopsie

* fix stubs

* namespace guarding, more test

* further fix

* Fixes

* I'm dumb

---------

Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
Co-authored-by: davidadeleon <ddeleon@hashicorp.com>
2026-03-25 12:21:59 -04:00
hc-github-team-secure-vault-core
93fda182c1 Merge remote-tracking branch 'remotes/from/ce/main' 2026-03-25 15:23:03 +00:00
Vault Automation
de492d952e
VAULT-43102: Clear error for external child token create (#13376) (#13380)
VAULT-43102: Clear error for external child token create (#13376) (#13380)
2026-03-25 14:50:57 +00:00
Vault Automation
b8c81b84c8
External lazy materialization (#12909) (#13383)
* vault: lazily materialize external tokens

Implement stub-first auth flow to avoid token-store writes on read-only requests, materialize only on lease registration, cache materialized token IDs by fingerprint, and add coverage for standby/leader materialization behavior.



* vault: align lazy JWT materialization with main

Adjust standby materialization behavior to main branch APIs, keep lease-time forwarding conversion, and update enterprise tests to match current standby error paths.



* vault: align jwt lazy materialization follow-ups

Apply naming and test-practice follow-ups, document cache-size rationale, simplify stub-use gating, and add external JWT e2e/benchmark coverage that measures raft writes for passthrough vs leased flows.



* vault: sanitize jwt lazy materialization logs



* vault: move jwt stub audit labels to ent



* vault: keep ent token type in audit logs

Remove audit token_type override and jwt_stub audit labeling so enterprise JWT tokens are consistently reported as ent while preserving existing request handling behavior.



* vault: rename unpersisted JWT token state

Rename IsStub/JwtStub to IsUnpersisted/JwtUnpersisted and switch serialized key to jwt_unpersisted for clearer storage semantics.



* vault: use storage-backed JWT token naming

Rename JWT token persistence marker to IsStorageBacked/JwtStorageBacked and clarify docs that passthrough JWT requests may never write token state to storage.



* vault: address jwt token materialization regressions

Fix storage-backed checks for non-ent tokens, materialize JWTs for lookup endpoints, and add lookup-self regression coverage.



* vault: thread perf standby state into jwt materialization

Pass perf standby state through materializeEnterpriseTokenForLease call sites to avoid unsynchronized state reads in request handling paths.



* test: harden flaky enterprise timing checks

Increase timing tolerance in flaky CI tests without changing runtime behavior.



* test: document CI timing tolerance in flaky tests

Add comments clarifying widened waits are for CI scheduling jitter and asynchronous convergence, not behavior changes.



* vault: remove sensitive token logging

Drop clear-text token value from SSC token MAC mismatch debug logging and keep census test unchanged per request.



* vault: tighten request logging for security scan

Remove remaining error-derived logging fields in request handling token/JWT revoke paths to satisfy clear-text sensitive logging findings.



* vault: use typed no-rpc-client errors

Replace string-based no-rpc-client error matching with a dedicated error type and update perf-standby callsites to return it.



* test: harden perf-standby billing race assertions

Allow early active-node counts up to the number of standby operations before the eventual RPC delivery assertion, to avoid race-only CI flakes without changing behavior.



* revert: undo billing test race assertion changes

Revert the prior billing test hardening commit per user request to keep billing tests unchanged in PR #12909.



* vault: restore fetchCeilingPolicies after rebase

Re-add the enterprise fetchCeilingPolicies method from main that was dropped during rebase conflict resolution, fixing build failure in request_handling.go.



* vault: materialize JWT tokens for cubbyhole requests

Ensure enterprise JWT tokens are materialized for cubbyhole paths in addition to token lookup endpoints, preserving expected persisted token-entry behavior for cubbyhole-backed request flows and token-entry JWT tests.



* vault: restore JWT token headers on perf-standby forward



* tests: fix jwt passthrough profile setup



* vault: clarify forwarding helper docs



* vault: cover jwt standby token endpoint behavior



* vault: remove enterprise JWT wording in comments



* vault: preserve materialized token request identity



* vault: stabilize external JWT readonly raft assertion



* vault: address PR 12909 review feedback



* tests: remove redundant NewTestCluster lifecycle calls



* vault: sanitize request handling token error logs



* vault: remove sensitive error fields in ent token cleanup logs



* vault: restore IsJWT wording



* vault: migrate jwt materialization tests to NewTestCluster



* tests: skip external jwt benchmark in CI



* Run make fmt



* Address PR review feedback



* Remove benchmark CI skip



* Move JWT materialization tests to external suite



---------

Co-authored-by: Bianca <48203644+biazmoreira@users.noreply.github.com>
Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
2026-03-25 14:44:06 +00:00
hc-github-team-secure-vault-core
789c7c5c4a Merge remote-tracking branch 'remotes/from/ce/main' 2026-03-25 14:24:01 +00:00
Vault Automation
e018b0c436
Implement PKIPublicCA config parsing and handling (#12363) (#13368)
* Update config.go

* added validation and parsing

* tests

* move pki external config structs and validation into separate file

* update copywrite

* update configuration

* updates

* Moved tests to pki_external_config.go, comments, refactoring

* refactor

* add tests

* linter fix

* Consolidate to table tests

* consolidate to table tests

* remove APIVersion from PKIExternalCA

* added comments for explaining each struct

* Added ParsePKIExternalCA Test

* Update tests

* Added remaining constraints

* Added destination.template field

* changes

* Added validateListenerAddr

* refactor

* more comments

* changes

* Check for duplicates across blocks

* Make RSA bits a required field

* moved template to the top level

* added comment for test explanation

* move template to the top level

* Move pki config into pkiexternalca directory

* fix linting error

* move pkiconfig back into config folder

* fix failing unit tests

* added comments

* update to preserve order of templatePKIExternalCARefs

* Added comment descriptions for each struct member

* update to include warning

* bring in warning logger from upstream into the pki config parser

* Set default umask to 077

* added comments to each field in agent config

* execute tests in parallel

* combine tests into Validate

* Use assertion error func for tests

* assert error strings

* Removed warning for now

* removed normalization on values during validation

* added tests to ensure that user values are not overridden

* remove testparse

* Update command/agent/config/config.go



* change improvement to feature in changelog

* updated to add line number in error

* Added _ent suffix to files

* Implement CA manager for ACME-based workflows (#12827)

* Implement CA manager for ACME-based workflows

* refactor tests into table tests

* update with suggestions

* format

* fix challenge cleanup

* make fmt

* update with suggestions

* add _ent + build flags

* Add a runtime component for pkiexternalca (#12838)

* Implement CA manager for ACME-based workflows

* Add a runtime component for pkiexternalca

* make fmt

* refactor tests into table tests

* update with suggestions

* format

* fix challenge cleanup

* make fmt

* update with suggestions

* update with suggestions

* add _ent + build flags

* fix linters

* delete duplicate files

* fix changelog

* rename test files

* fix linter

* try to bypass false positive linter err

* fix

* Rename file

* fix linter

* fix linter

* remove go:build enterprise commends from _ent files

* update order statuses to use kebab case + fix scanner failures

* add missing order status

* Template Integration For pki_external_ca resources (#13069)

* Implement CA manager for ACME-based workflows

* Add a runtime component for pkiexternalca

* make fmt

* refactor tests into table tests

* update with suggestions

* initial commit

* fix test failure

* changes

* remove logger check

* remove redundant config by name check

* convert to table tests

* added comments

* updates

* Fix tests

* fix nil pointer issue

* move changes to _ent files

* remove ce duplicate files

* updates

* update template.go

* added changelog.txt

* create template_pem_ent_test.go

* added comment explanation

* update ca_manager_ent.go

* update changelog

* separate ce stubs into server_ce.go and common code into server.go

* Moved helper functions to bottom of test file. Added godocs.

* Make pkiExternalCA name required in template

* remove go:build enterprise commends from _ent files

* rename to template_pem_ent

* include ent tag in server_ent.go

* remove enterprise tag comment from server_ent.go

* create pki_external_config_ce.go

* update template_pem_ent_integration_test.go

* rename integration test

---------




---------

Co-authored-by: Jaired Jawed <jaired.jawed@hashicorp.com>
Co-authored-by: Ben Ash <32777270+benashz@users.noreply.github.com>
Co-authored-by: Zlaticanin <60530402+Zlaticanin@users.noreply.github.com>
Co-authored-by: Milena Zlaticanin <Milena.Zlaticanin@ibm.com>
2026-03-25 09:43:27 -04:00
hc-github-team-secure-vault-core
f53ac57a1b Merge remote-tracking branch 'remotes/from/ce/main' 2026-03-25 06:18:37 +00:00
Vault Automation
2c2068f3ca
[UI] [VAULT-43463] Update breacrumbs in remaining pages (#13347) (#13374)
* Update breacrumbs!

* OIDC breadcrumbs..

* Update label to scope(s)

* Fix failing tests!

* Add breadcrumbs to MFA

* Address feedback and fix breadcrumb bugs

* Remove console

* Fix failing tests!

Co-authored-by: Kianna <30884335+kiannaquach@users.noreply.github.com>
2026-03-24 22:43:16 -07:00
hc-github-team-secure-vault-core
55b5fde5af Merge remote-tracking branch 'remotes/from/ce/main' 2026-03-24 21:10:53 +00:00
Vault Automation
8400767dd6
[VAULT-41084]: identity: check and repair entity integrity (#12738) (#13304)
During Vault upgrades to version 1.19.x, customers encountered failures when restoring entities, groups, and aliases from storage. The issue manifested as errors indicating that an alias was already tied to a different entity, preventing successful cluster startup and unseal.

My investigation revealed a complex data integrity issue involving corrupted entity aliases. Multiple alias instances existed with identical identifying factors (namespace, mount accessor, and name) but different alias IDs and different `merged_from_canonical_ids` values. Some aliases referenced entity IDs that no longer existed in storage (orphaned references from previous entity merges). And we even saw duplicate instances of the same aliases in the entity.

During entity restoration, the system would come across the dangling alias and persist it (because it couldn't be found by factors), then encounter valid aliases for the same mount/name combination but fail because the lookup by factors matched the already-persisted dangling alias.

This corruption likely originated from bugs in older Vault versions where entity merging didn't properly clean up all alias references.

Before my changes, when loading entities during upgrade or unseal, Vault would fail immediately upon detecting alias conflicts. There was no attempt was made to repair corrupted entity state and clusters could not successfully unseal.

Now we automatically detect and attempt to repair corrupted entities. We check for nil aliases, dangling aliases (pointing to non-existent entities), and duplicate alias instances (same alias ID appearing multiple times).

When repairing we remove any nil aliases from the entity, re-associates dangling aliases to the correct entity, rename dangling duplicate aliases to prevent them from becoming the canonical source during reload, and removes duplicate instances of the same alias.

NOTE: This code does not modify how we handle same-case alias duplicates. Customers will still need to resolve those after startup by deleting or merging the aliases before activating the identity de-duplication flag.

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2026-03-24 15:06:57 -06:00
hc-github-team-secure-vault-core
9d6f86ee99 Merge remote-tracking branch 'remotes/from/ce/main' api/auth/userpass/v0.12.0 api/auth/gcp/v0.12.0 api/auth/kubernetes/v0.12.0 api/auth/approle/v0.12.0 api/auth/azure/v0.11.0 api/auth/ldap/v0.12.0 api/auth/aws/v0.12.0 2026-03-24 15:23:34 +00:00
Vault Automation
e33118cee2
[UI] [SECVULN] Underscore Version Update (#13325) (#13343)
* removes doctoc, jsdoc-to-markdown and jsonlint packages and removes underscore version override

* removes generate-docs script which uses removed docfy-md scipt

Co-authored-by: Jordan Reimer <zofskeez@gmail.com>
2026-03-24 15:00:47 +00:00
hc-github-team-secure-vault-core
407557ce87 Merge remote-tracking branch 'remotes/from/ce/main' 2026-03-24 12:10:53 +00:00
Vault Automation
825a0edc48
Backport VAULT-43198 [1b/7] JWT sys backend: Engine refactor into ce/main (#13300)
* VAULT-43198 [1b/7] JWT sys backend: Engine refactor (#12936)

* feat(jwt): add oauth-resource-server activation flag and bugfix

* refactor(jwt): rewrite JWT engine and expiration handling

* fix(test): update activation flags tests for oauth-resource-server

* fix(test): skip outdated jwt test in logical_ent_test.go

* fixes for broken tests (4)

* add activation flag tests

* moving out request handling changes

* fix linter errors

* merge

* cleanup comments and names

* cosmetic var name cleanup

* Move API paths and logical system files from 1c to 1b

* cleanup

* cleanup (2)

* cleanup (3)

* codeql fixes

* fix CreateTestConfigWithJWTAuthProfile using tests

* more codeql fixes

* Apply suggestions from code review

Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>

* comments

* comments (2)

* comments (3)

* comments (4)

* merges from main

* comments (5)

* failing tests

---------

Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>

* missing ent paths

---------

Co-authored-by: Arnab Chatterjee <arnab.chatterjee@hashicorp.com>
Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
2026-03-24 12:39:24 +01:00
hc-github-team-secure-vault-core
d747489fef Merge remote-tracking branch 'remotes/from/ce/main' 2026-03-24 11:15:30 +00:00
Vault Automation
9569be61c8
VAULT-43378: Fix authorization passthrough header condition (#13251) (#13337)
* fix authorization condition

* changelog

* move test

Co-authored-by: miagilepner <mia.epner@hashicorp.com>
2026-03-24 10:42:40 +00:00
hc-github-team-secure-vault-core
54ed7790d5 Merge remote-tracking branch 'remotes/from/ce/main' 2026-03-24 09:15:44 +00:00
Vault Automation
719dd6f506
Update vault-plugin-auth-cf to v0.23.0 (#13333) (#13334)
* Update vault-plugin-auth-cf to v0.23.0

* Add changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
2026-03-24 13:47:35 +05:30
hc-github-team-secure-vault-core
fe0dcfc07b Merge remote-tracking branch 'remotes/from/ce/main' 2026-03-24 06:18:56 +00:00
Vault Automation
d3bd7e6e30
VAULT-43456 - Updates region field for aws on secrets engines config page (#13322) (#13332)
* VAULT-43456 - updates region field for aws on secrets engines config page

* fixed co-pilot review comments

* fixed import

Co-authored-by: mohit-hashicorp <mohit.ojha@hashicorp.com>
2026-03-24 06:09:23 +00:00
hc-github-team-secure-vault-core
a69a356f36 Merge remote-tracking branch 'remotes/from/ce/main' 2026-03-23 21:09:19 +00:00
Vault Automation
5176344499
UI: Removing separate hds icon class causing alignment issue + fix toolbar link alignment (#13320) (#13323)
* removing separate hds icon class

* removing duplicate class, adding separate class to handle toolbar link misalignment

Co-authored-by: Dan Rivera <dan.rivera@hashicorp.com>
2026-03-23 20:45:22 +00:00
Vault Automation
98a1522357
Backport Check in checkout part 2 into ce/main (#13316)
* Check in checkout part 2 (#12001)

* Check in checkout part 2

* Linter error fix

* Linter error fix

* error fix

* Error fix

* Error fix

* PR review changes

* Linter bug fix

* Linter bug fix

* Bug fix

* Bug fix

* Bug fix

* PR review changes

* Enabling audit trail

* Enabling audit trail

* Enabling audit trail

* Enabling audit trail

* Enabling audit trail

* Enabling audit trail

* Code review changes

* Code review changes

* Code review changes

* Code review changes

* Code review changes

* ci: retrigger

* CI bug fix

* CI bug fix

* CI bug fix

* CI bug fix

* CI bug fix

* CI bug fix

* CI bug fix

* CI bug fix

* CI bug fix

* CI bug fix

* CI bug fix

* CI bug fix

* CI bug fix

* CI bug fix

* Code merge changes

* CI fix

* CI fix

* CI fix

* conflict issue

* Default for audit log

* Reverting ENOS_VAR_verify_ldap_secrets_engine to false

* Fix Merge conflict

* Upload-Issuer Compliance with Common Criteria. (#12101)

* Upload-Issuer Compliance with Common Criteria.

* Add Changelog.

* Update changelog/_12101.txt

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>

* Update builtin/logical/pki/storage_validate_imports_ent.go

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>

* PR-Review, add trap for deletion errors.

* Add test-doc referencing NIAP requirement.

---------

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>

* hooks(pre-push): handle ssh protocol prefix in git URLs (#12492)

* hooks(pre-push): handle ssh protocol prefix in git URLs

Handle optional URL prefix and suffixes when checking for enterprise.

Signed-off-by: Ryan Cragun <me@ryan.ec>

* Duplicate fix

* PR feedback changes

* Code Review changes

* Code Review changes

* PR review changes

* ttl Fix

* Removing all static role code frpm PR

* Removing spaces

---------

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Kajal Kusum <kajal.kusum@ibm.com>
Co-authored-by: Kit Haines <khaines@mit.edu>
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
Co-authored-by: Ryan Cragun <me@ryan.ec>

* temporarily disable flaky enos tests (#13045)

* temporarily disable ldap enos tests

* remove smoke_sdk from samples

---------

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: KajalKusum <kajal.kusum@hashicorp.com>
Co-authored-by: Kajal Kusum <kajal.kusum@ibm.com>
Co-authored-by: Kit Haines <khaines@mit.edu>
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
Co-authored-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Luis (LT) Carbonell <lt.carbonell@hashicorp.com>
2026-03-23 20:20:59 +00:00
hc-github-team-secure-vault-core
80cc999afd Merge remote-tracking branch 'remotes/from/ce/main' sdk/v0.25.0 2026-03-23 19:18:26 +00:00
Vault Automation
b6d3bb198d
Add LDAP root credential rollback test (#13241) (#13309)
* Add LDAP secrets engine blackbox tests

* Format

* format

* cleanup environment

* Install ldap-utils in CI for LDAP domain provisioning

* wrap in eventually

* debugging

* fix ip issues

* Add LDAP root credential rollback test

* refactor rollback tests to fix race conditions and improve reliability

* removed AI comment

---------

Co-authored-by: shettykshitij <kshitij.shetty@hashicorp.com>
Co-authored-by: LT Carbonell <ltcarbonell@pm.me>
Co-authored-by: Luis (LT) Carbonell <lt.carbonell@hashicorp.com>
2026-03-23 18:33:20 +00:00
hc-github-team-secure-vault-core
d43030648e Merge remote-tracking branch 'remotes/from/ce/main' api/v1.23.0 2026-03-23 15:20:01 +00:00
Vault Automation
a3bc0a3078
(enos): Add LDAP secrets engine blackbox tests to Plugin Scenario (#13072) (#13293)
* Add LDAP secrets engine blackbox tests

* Format

* format

* cleanup environment

* Install ldap-utils in CI for LDAP domain provisioning

* wrap in eventually

* debugging

* fix ip issues

Co-authored-by: Luis (LT) Carbonell <lt.carbonell@hashicorp.com>
2026-03-23 14:22:46 +00:00
hc-github-team-secure-vault-core
f8df53913c Merge remote-tracking branch 'remotes/from/ce/main' 2026-03-23 14:22:31 +00:00
Vault Automation
2b0ec25846
VAULT-43444 Addressed races in tests (#13278) (#13285)
* VAULT-43444 Addressed races in tests

* more cleanup

* make note better

Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
2026-03-23 09:32:03 -04:00
hc-github-team-secure-vault-core
a097d1fa36 Merge remote-tracking branch 'remotes/from/ce/main' 2026-03-20 23:05:48 +00:00
Vault Automation
7e587fd026
Update vault-plugin-auth-kubernetes to v0.24.1 (#13259) (#13287)
Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
2026-03-20 22:24:21 +00:00
Vault Automation
1331818193
UI: Fix namespace search showing empty state when namespaces exist (#13257) (#13286)
* updating verbiage and testing with new listtable replacement

* remove and fix empty state

* cleanup

* rename

Co-authored-by: Dan Rivera <dan.rivera@hashicorp.com>
2026-03-20 22:06:56 +00:00
hc-github-team-secure-vault-core
7b12feb2cb Merge remote-tracking branch 'remotes/from/ce/main' 2026-03-20 22:04:06 +00:00
Vault Automation
7d4395c412
Update vault-plugin-auth-jwt to v0.26.1 (#13242) (#13283)
Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
Co-authored-by: Cole Heinbaugh <cole.heinbaugh@ibm.com>
2026-03-20 21:40:19 +00:00
Vault Automation
6d4b615671
adds flag to fix chrome in ci (#13279) (#13282)
Co-authored-by: Jordan Reimer <zofskeez@gmail.com>
2026-03-20 21:06:39 +00:00
hc-github-team-secure-vault-core
c8927ec8a8 Merge remote-tracking branch 'remotes/from/ce/main' 2026-03-20 21:06:37 +00:00
Vault Automation
018cf3e891
bumps sass to latest version (#13267) (#13277)
Co-authored-by: Jordan Reimer <zofskeez@gmail.com>
2026-03-20 20:58:29 +00:00
Vault Automation
cb1fe89716
Backport Update vault-plugin-secrets-gcp to v0.24.0 into ce/main (#13276)
Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
Co-authored-by: Vinay Gopalan <vinay@hashicorp.com>
2026-03-20 20:47:47 +00:00
Vault Automation
f3084014d4
bumps webpack to latest (#13255) (#13261)
Co-authored-by: Jordan Reimer <zofskeez@gmail.com>
2026-03-20 20:21:19 +00:00
hc-github-team-secure-vault-core
fbf7f3bb12 Merge remote-tracking branch 'remotes/from/ce/main' 2026-03-20 20:05:24 +00:00
Vault Automation
16f98c11ce
[UI] Dismiss Wizards in Playwright Tests (#12699) (#12728)
* adds constants util for wizards and updates service to use WizardId type

* updates wizards to use WIZARD_ID_MAP values

* updates wizard tests to use the service for dismissal

* updates playwright setup to add all wizard ids as dismissed in localStorage

* removes wizard dismissal step from existing playwright tests

* fixes issues accessing owner in beforeEach hooks of namespaces acceptance tests

Co-authored-by: Jordan Reimer <zofskeez@gmail.com>
2026-03-20 15:51:44 -04:00
Vault Automation
a71afc9c53
Update vault-plugin-secrets-kv to v0.26.2 (#13264) (#13275)
Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
2026-03-20 19:38:34 +00:00
Vault Automation
8e3e783a44
Backport Update vault-plugin-secrets-openldap to v0.18.0 into ce/main (#13273)
Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
Co-authored-by: Vinay Gopalan <vinay@hashicorp.com>
2026-03-20 12:27:03 -07:00
Robert
a40b8dbe6c
update-azure-secrets-v0.25.0 (#13268) 2026-03-20 19:21:56 +00:00
hc-github-team-secure-vault-core
125754fd15 Merge remote-tracking branch 'remotes/from/ce/main' 2026-03-20 19:14:38 +00:00
Vault Automation
eb09f6ed3d
Update vault-plugin-secrets-ad to v0.22.1 (#13237) (#13256)
---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
Co-authored-by: Maithy Ton <github@maithyton.com>
2026-03-20 19:08:12 +00:00
Vault Automation
056ec7e94a
Update vault-plugin-auth-kerberos to v0.17.1 (#13245) (#13254)
Co-authored-by: hc-github-team-secure-vault-ecosystem <hc-github-team-secure-vault-ecosystem@users.noreply.github.com>
2026-03-20 18:30:34 +00:00