552 Commits

Author SHA1 Message Date
Vault Automation
a3bc0a3078
(enos): Add LDAP secrets engine blackbox tests to Plugin Scenario (#13072) (#13293)
* Add LDAP secrets engine blackbox tests

* Format

* format

* cleanup environment

* Install ldap-utils in CI for LDAP domain provisioning

* wrap in eventually

* debugging

* fix ip issues

Co-authored-by: Luis (LT) Carbonell <lt.carbonell@hashicorp.com>
2026-03-23 14:22:46 +00:00
Vault Automation
f666016862
actions: update actions to the latest versions (#13056) (#13143)
- actions/cache => v5.0.4
  Dep updates

- actions/download-artifact => v8.0.1
  Support for CJK characters

- dorny/paths-filter => v4.0.1
  Node 24, support for merge queues

- hashicorp/action-setup-enos => v1.52
  Security release for downstream vuln

- pnpm/action-setup => v5.0.0
  Node 24, support for native caching

- slackapi/slack-github-action => v3.0.1
  Node 24, lots of internal dep updates, ability to run Slack commands

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2026-03-19 15:51:50 +00:00
Vault Automation
1a57de40bd
Backport Fill out Secret Engine Tests into ce/main (#12927)
* no-op commit

* Fill out Secret Engine Tests (#12287)

* reorg some tests

* split tests out

* fix test

* test cleanup

* make ldap work

* formatting

* whitespace

* Make KMIP work

* Activate smoke_sdk scenarios

* Add gotestsum

* tryagain

* fix go path install

* add debugging

* more debug

* shrug emoji

* Remove debug and increase timeout

* syntax

* help with polling

* disable stepdown test for now

* Update vault/external_tests/blackbox/secrets_ldap_test.go

Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>

* Update sdk/helper/testcluster/blackbox/session_raft.go

Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>

* Update enos/modules/verify_secrets_engines/modules/create/auth.tf

Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>

* Update enos/modules/vault_run_blackbox_test/scripts/run-test.sh

Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>

* Update enos/modules/vault_run_blackbox_test/main.tf

Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>

* arm fix

* gotestsum

* timing

* try this

* try this

* handle when these already exist

* ---

---------

Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>

* Cant run smoke_sdk in ce (#12931)

---------

Co-authored-by: Luis (LT) Carbonell <lt.carbonell@hashicorp.com>
Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
2026-03-12 12:00:59 -04:00
Vault Automation
aedb2da1ff
use is_ent_branch (#12672) (#12685)
Co-authored-by: Matthew Irish <39469+meirish@users.noreply.github.com>
2026-03-11 08:23:31 -05:00
Vault Automation
383e2267ed
Fix GitHub Actions expression evaluation error in build workflow (#12884) (#12901)
* Fix GitHub Actions expression evaluation error in build workflow

- Add hcp-setup job with explicit step-by-step parameter validation
- Replace problematic inline expressions with debuggable logic steps
- Use proper fallback values (0 instead of '') for number type inputs
- Resolve 'Unexpected value' error on scheduled runs
- Maintain existing workflow logic and conditional behavior
- Add clear logging for troubleshooting parameter resolution

* Fix type conversion for pull-request number in build workflow

- Use fromJSON() to convert string output to number type
- Resolves type mismatch error in reusable workflow input

Co-authored-by: Luis (LT) Carbonell <lt.carbonell@hashicorp.com>
2026-03-10 21:04:36 +00:00
Vault Automation
48925d76fb
Fix conditional to use new tool (#12836) (#12866)
* Fix conditional to use new tool

* use event name instead

Co-authored-by: Luis (LT) Carbonell <lt.carbonell@hashicorp.com>
2026-03-10 12:04:06 -06:00
Vault Automation
aa10cc0e4a
cloud: automatically trigger custom image test when changing the hcp testing toolchain (#12654) (#12664)
* actions: pull in gotestsum when executing the cloud scenario
* cloud: add 'hcp' changed-file group and trigger cloud scenario when the files change
* slightly simplify expression

---------

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2026-03-09 16:46:35 -06:00
Vault Automation
ab5b314c95
actions: pin actions to the latest versions (#12772) (#12793)
- docker/setup-buildx-action v3.12.0 => v4.0.0
  Node 24 upgrade, switch to ESM, some deprecated inputs have been
  removed.
- docker/build-push-action v6.19.2 => v7.0.0
  Node 24 upgrade, switch to ESM, some deprecated envs have been
  removed.
- actions/setup-node v6.2.0 => v6.3.0
  Bug fixes, internal dep updates, support for parsing `devEngines`.
- action-setup-enos v1.50 => v1.51
  Use enos 0.0.36

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2026-03-09 12:36:53 -06:00
Vault Automation
a2978a63f2
Fix HCP workflow expression evaluation and add test option (#12759) (#12833)
Co-authored-by: Luis (LT) Carbonell <lt.carbonell@hashicorp.com>
2026-03-09 15:49:32 +00:00
Vault Automation
617b5e8571
Fix nightly hcp build error (#12731) (#12732)
Co-authored-by: Luis (LT) Carbonell <lt.carbonell@hashicorp.com>
2026-03-05 19:13:05 -05:00
Vault Automation
ce5dd467f2
set is_ent_branch=false when on the CE branch (#12698) (#12717)
Co-authored-by: Matthew Irish <39469+meirish@users.noreply.github.com>
2026-03-05 12:45:38 -06:00
Vault Automation
ba786ab759
Add schedule to hcp runs (#12636) (#12655)
* Add schedule to hcp runs

* formatting

Co-authored-by: Luis (LT) Carbonell <lt.carbonell@hashicorp.com>
2026-03-03 00:20:36 +00:00
Vault Automation
3d420fec98
actions: bump actions to latest version (#12630)
Bump our action version pins to the latest versions.

- actions/checkout v6.0.1 => v6.0.2
  Tag handling improvements

- actions/download-artifact v7.0.0 => v8.0.0
  Supports automatic detection of unzipping based on Content-Type
  Enforces digest checking
  Uses ES modules

- actions/setup-go v6.2.0 => v6.3.0
  Uses go.mod for default module caching (which we don't use)
  Fixes to download URL

- actions/upload-artifact v6.0.0 => v7.0.0
  Supports disabling automatic archiving
  Uses ES modules

- aws-actions/configure-aws-credentials v5.1.1 => v6.0.0
  Uses Node 24

- browser-actions/setup-chrome v2.1.0 => v2.1.1
  Bug fix for Node runtime version

- docker/build-push-action v6.18.0 => v6.19.2
  Internal dep updates and auth support for different Github servers.

- hashicorp/setup-terraform v3.1.2 => v4.0.0
  Uses Node 24

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2026-03-02 17:48:49 -05:00
Vault Automation
a3859d67e3
Backport rework UI CI workflow to partition JS tests into ce/main (#12515)
* rework UI CI workflow to partition JS tests (#11967)

* add setup-pnpm action

* remove reading vault keys from vault server output

* update ci workflow to build app and go binary first, then run tests in partitions

* fix errant tests

* address PR feedback

* Apply suggestions from code review

Co-authored-by: Ryan Cragun <me@ryan.ec>

* more feedback changes

* restore test-helper.js

* restore auth test helpers

* check in ui/tests/helpers/vault-keys.js

* use v7 of download-artifact action

* make test-ui reusable workflow

* add status job

---------

Co-authored-by: Ryan Cragun <me@ryan.ec>

* update new UI tests to run CE tests on the CE branch (#12537)

---------

Co-authored-by: Matthew Irish <39469+meirish@users.noreply.github.com>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2026-02-27 12:19:47 -06:00
Vault Automation
61b6ae14e5
[VAULT-40147] pipeline: add pipeline.hcl with changed_files (#12302) (#12408)
The `pipeline` utility started as collection of small CLI utilities that we found useful for the Vault CI/CD pipeline. Rather than engineering complex bash scripts in YAML blocks, instead, we could build small, reusable, testable actions and integrate the into a single binary. No more copying and pasting loads of bash from YAML, instead we can copy a single command and run the same thing locally that we can in CI.

As we've continued to invest in the utilities capability, it's become clear that other CI pipelines would benefit from the same functionality that we've been building. This change represents the first significant work to make the utility truly generic in a HashiCorp repo that utilizes CRT sense. Once all the Vault specifics have been extracted we hope to move the utility out of the repo and make it available everywhere.

The primary change here is to move our changed file grouping configuration out of the `changed` package entirely. Instead of checkers that are written as Go code, we have created a new configuration file for the `pipeline` utility called `pipeline.hcl` While there are certainly other things that will eventually be configurable here, the only thing we've added support for is `changed_files`, which allows configuring how to match a given changed files path to a group name.

The DSL is fairly simple:

```hcl
changed_files {
  // One or more groups can be defined
  group "group_name_label" {
    // Zero or more ignore blocks can be defined
    ignore {
      base_dir         = []
      base_name        = []
      base_name_prefix = []
      contains         = []
      extension        = []
      file             = []
    }

    // One or more match blocks can be defined
    match {
      base_dir         = []
      base_name        = []
      base_name_prefix = []
      contains         = []
      extension        = []
      file             = []
    }
  }
}
```

For example,
```hcl
// Create a changed_files block where we can define our changed files groups
changed_files {

  // Group blocks take one label which is the name of the group
  group "app" {

    // Groups can ignore based on some criteria.
    ignore {

      // In this instance, we'll ignore any file that begins with
      // tools/pipeline. All paths will be relative to the git repository
      // root directory. The joinpath() function is here to support paths
      // that are agnostic to the operating systems path separator. While
      // it's unlikely that you'll need them, several cty stdlib functions
      // are available.
      base_dir = [joinpath("tools", "pipeline")]
    }

    // Groups must define at least one match block.
    match {
      // This will match any file with the .go extension (except for
      // those that will be excluded with our ignore directive aboe
      extension = [".go"]
    }

    // Groups can contain more than one match block. If any of the match
    // blocks meet their criteria the group will be associated with the
    // changed file
    match {
      base_name = ["go.mod", "go.sum"]
    }

    // If groups have more than one attribute set, each attribute group
    // must match in order for the match.
    match {
      // Here we only match files that contain "raft_autopilot" in the
      // path with the .go extension
      extension = [".go"]
      contains  = ["raft_autopilot"]
    }
  }

  group "autopilot" {
    // Ignore blocks have the same attributes as match blocks
    match {
      // The base directory.
      base_dir = [
        "changelog",
        joinpath("tools", "codechecker"),
      ]
      // The base of the file
      base_name = ["README.md"]
      // A prefix string match on a files name.
      base_name_prefix = ["buf."]
      // Any string match in the files full path
      contains = [
        "-ce",
        "_ce",
        "-oss",
        "_oss",
      ]
      // The file's extension
      extension = [
        ".hcl",
        ".md",
        ".sh",
        ".yaml",
        ".yml",
      ]
      // An exact file match
      file = [
        # These exist on CE branches to please Github Actions.
        joinpath(".github", "workflows", "build-artifacts-ent.yml"),
        joinpath(".github", "workflows", "backport-automation-ent.yml"),
      ]
    }
  }
}
```

The default location of the config is `.release/pipeline.hcl`. All of our prior checks have been migrated to the DSL file present in this change.

  - We had several commands that used the changed files groups that were built into the library. This change requires us to instead load the configuration from the file and use the user defined groupings.

  - Several commands now take some part of that configuration in the request type. When possible we use the version parsed by the root command and verify in the request body rather than attempt to load the configuration.

  - We also refactor the loading and parsing of `.release/versions.hcl` in the same manner. Now we automatically parse the file in the default locations relative to the git repo root.

  - Our root command now has two new flags `--pipeline-config` and `--versions-config` which allow specifying a default location for each file. Commands which previously accepted flags or args to configure the versions file have been updated to use the global root flags instead. We've also removed the previous implementation that would recursively search backwards from the working directory to find the `versions.hcl` file. Instead we only support loading the file from the default location relative to the Git repo root.

  - All instances of changed `pipeline` command invocations have been update to support the new auto-loading of configuration.

  - A new configuration sub-command with validation exists to quickly validate a configuration file. `pipeline config validate`

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2026-02-23 10:51:31 -08:00
Vault Automation
f3695579ac
IBM license and config reloads (#12058) (#12251)
* adding ibm tests for ent files

* adding debug commands

* adding code changes

* adding reload tests

* remove settings.json

* remove ryboe q

* changing isHashicorpLicense to isIBMLicense and moving DiagnoseCheckLicenseGeneration to core_util_common.go

* fix test

* reverting non-license related tests

* reverting non-license related tests

* removing hashicorp license test

* modify reload server_ent_test.go

* change ibm-license paths

* adding census reload server test

* moving LicensingEntitlementSelectionConfig to core_util_common.go

* add EntReloadLicenseAndConfig to stubs

* fix operator diagnose bug

* move bug fix into ce and ent files

* add more ibm test cases

* Update command/command_testonly/server_testonly_ent_test.go



* address comments

* make fmt

---------

Co-authored-by: akshya96 <87045294+akshya96@users.noreply.github.com>
Co-authored-by: Jenny Deng <jenny.deng@hashicorp.com>
2026-02-06 15:19:44 -08:00
Vault Automation
bb106f1bef
Add blackbox testing SDK (#11210) (#12245)
* rough draft

* add some stuff for dynamic secrets

* add some more helpers and sample tests

* new helpers, new tests, refactoring

* Add Basic Smoke SDK Scenario (#11678)

* Add simple test for stepdown election

* Add a smoke_sdk scenario

* add script to run tests locally

* fix up a few things

* VAULT-39746 - Add Tests to Smoke SDK and Cloud Scenarios (#11795)

* Add some go verification steps in enos sdk test run script

* formatting

* Add a smoke_sdk scenario userpass secret engine create test (#11808)

* Add a smoke_sdk scenario userpass secret engine create test

* Add the some additional tests

* Add Smoke tests to Cloud Scenario (#11876)

* Add a smoke_sdk scenario userpass secret engine create test

* Add the some additional tests

* Add smoke testing to cloud

* Add test results to output and test filtering

* comment

* fix test

* fix the smoke scenario

* Address some various feedback

* missed cleanup

* remove node count dependency in the tests

* Fix test perms

* Adjust the testing and clean them up a bit

* formatting

* fmt

* fmt2

* more fmt

* formatting

* tryagain

* remove the docker/hcp divide

* use the SHA as ID

* adjust perms

* Add transit test

* skip blackbox testing in test-go

* copywrite

* Apply suggestion from @brewgator

* Add godoc

* grep cleanup

---------

Co-authored-by: Josh Black <raskchanky@gmail.com>
Co-authored-by: Luis (LT) Carbonell <lt.carbonell@hashicorp.com>
2026-02-06 21:36:29 +00:00
Vault Automation
b3f173756d
actions: pin to latest actions (#12144) (#12146)
Update to the latest actions. The primary motivation here is to get the
latest action-setup-enos.

  - actions/cache => v5.0.3: security patches
  - actions/checkout => v6.0.2: small fixes to git user-agent and tag
    fetching
  - hashicorp/action-setup-enos => v1.50: security patches

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2026-02-03 22:39:49 +00:00
Vault Automation
c2034cb08a
actions: pin to latest actions (#12060) (#12069)
- actions/checkout -> v6.0.2: some minor changes around setting the
  ACTIONS_ORCHESTRATION_ID and some fixes to `fetch-tags`.
- actions/setup-python -> v6.2.0: Node 24 compat

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2026-01-29 10:07:15 -08:00
Vault Automation
3a108ea88e
Backport [VAULT-41857] pipeline(find-artifact): add support for finding artifacts from branches into ce/main (#11971)
* [VAULT-41857] pipeline(find-artifact): add support for finding artifacts from branches (#11799)

Add support for finding matching workflow artifacts from branches rather than PRs. This allows us to trigger custom HCP image builds from a branch rather than an PR. It also enables us to build and test the HCP image on a scheduled nightly cadence, which we've also enabled.

As part of these changes I also added support for specifying which environment you want to test and threaded it through the cloud scenario now that there are multiple variants. We also make the testing workflow workflow_dispatch-able so that we can trigger HVD testing for any custom image in any environment without building a new image.

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2026-01-26 22:27:10 +00:00
Vault Automation
5d36ecf565
Set up Copilot instructions entrypoint (#11946) (#11951)
Create copilot-instructions.md for the Copilot agent
to automatically apply instructions.
Remove instructions for missing specific/ folder.
Add code comment instructions for better commenting patterns and
naming conventions.

Co-authored-by: Angelo Cordon <angelo.cordon@hashicorp.com>
2026-01-26 12:01:59 -08:00
Vault Automation
921ea64aba
Adjust CODEOWNERS for copilot-related files (#11949) (#11959)
Set copilot instructions code ownership to wider Vault team.

Co-authored-by: Angelo Cordon <angelo.cordon@hashicorp.com>
2026-01-23 15:12:35 -08:00
Vault Automation
aa1349f5a5
actions(runners): add backup self-hosted runner types (#11884) (#11937)
* actions(runners): add backup self-hosted runner types

We've previously added backup runner types for various self-hosted
runners but were not exhaustive. This change adds at least one backup
instance type to each specified on-demand runner type.

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2026-01-23 21:12:52 +00:00
Vault Automation
e745f92bc5
actions: pin to latest actions (#11818) (#11909)
- actions/cache -> v5.0.2: A bugfix around not retrying cache entries on
  429s.
- actions/setup-go -> v6.2.0: NodeJS bump and internal actions/cache
  bump. We don't use the caching in setup-go so this ought to have no
  impact for us.
- actions/setup-node -> v6.2.0: internal bump of actions/cache.
- pnpm/action-setup -> v4.2.0: Adds support for .npmrc file.

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2026-01-22 20:38:08 +00:00
Vault Automation
964ab5a9b4
Backport VAULT-41683: fix false postiive failure notification into ce/main (#11621)
Sometimes our CI slack message outputs the wrong information, most
notably the data race failure when only UI tests run but the UI tests
fail. In an effort to fix this false positive I noticed that there are
several error cases we didn't consider when creating the notification.
Now we only report which failures were detected in the message.

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2026-01-12 22:09:44 +00:00
Vault Automation
d0e7118fd1
Remove chrome pin CI (#11670) (#11680)
* remove chrome pin

* restart ci test run

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>
2026-01-09 12:43:29 -08:00
Vault Automation
12e793039a
[UI] - migrate to pnpm for JS package management (#11651) (#11661)
* move from yarn to pnpm for package management

* remove lodash.template patch override

* remove .yarn folder

* update GHA to use pnpm

* add @babel/plugin-proposal-decorators

* remove .yarnrc.yml

* add lock file to copywrite ignore

* add @codemirror/view as a dep for its types

* use more strict setting about peerDeps

* address some peerDep issues with ember-power-select and ember-basic-dropdown

* enable TS compilation for the kubernetes engine

* enable TS compilation in kv engine

* ignore workspace file

* use new headless mode in CI

* update enos CI scenarios

* add qs and express resolutions

* run 'pnpm up glob' and 'pnpm up js-yaml' to upgrade those packages

* run 'pnpm up preact' because posthog-js had a vulnerable install. see https://github.com/advisories/GHSA-36hm-qxxp-pg3

* add work around for browser timeout errors in test

* update other references of yarn to pnpm

Co-authored-by: Matthew Irish <39469+meirish@users.noreply.github.com>
2026-01-09 11:45:14 -06:00
Vault Automation
174f387aef
[VAULT-33083] UI: followup pr to update helper syntax to follow best practices (#11493) (#11557)
* [VAULT-33083] UI: followup pr to update helper syntax to follow best practices

* fix test failures

Co-authored-by: Shannon Roberts (Beagin) <beagins@users.noreply.github.com>
2026-01-05 13:12:43 -08:00
Vault Automation
354216300a
Remove esoteric builds (#11528) (#11559)
* Remove esoteric builds

Builds we want gone:
- NetBSD (386/amd64/arm)
- OpenBSD (386/amd64/arm)
- Solaris
- FreeBSD (arm)
- Linux (arm)

* trying to make the linter happy

Co-authored-by: Josh Black <raskchanky@gmail.com>
2025-12-29 22:38:56 +00:00
Vault Automation
af3ffa051e
UI: Ember copilot instruction updates (#11491) (#11501)
* [VAULT-33083] UI: Updating ember copilot instructions to avoid using mixins and use utility functions instead

* add github instruction to avoid unnecessary exports

* add copilot test instructions so that test files should only test repository-specific logic. test coverage should not test framework or external library functionality.

Co-authored-by: Shannon Roberts (Beagin) <beagins@users.noreply.github.com>
2025-12-29 14:16:00 -07:00
Vault Automation
e7965c8bdf
[VAULT-41294] docker: build OCI container images (#11545) (#11549)
This change does a few things that might not be obvious:

- We stop requesting the previous runner image. This will result in us
  using Docker 29 instead of 28. With this comes changes in our
  container build system, most notably that container images are now
  exported as OCI images. Every container runtime that we support also
  supports OCI images so this ought to have no meaningful impact to
  downstream users. One noticeable change is that the image layers are
  now compressed so the final image size on disk will be considerably
  smaller than before.

- Upgrade `hashicorp/action-setup-enos` to the latest version. This is not
  strictly required for this change but as we just released a new version of
  the CLI it makes sense to update it here. We should also note that recently
  we released a new version of `terraform-provider-enos` which contains
  necessary for this change as our docker and kind resources needed to be
  updated handle OCI and Docker exported images. Previously they relied on
  files that existed only in Docker images.

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-12-29 10:58:02 -08:00
Vault Automation
7b470708ac
[VAULT-41521] enos(ec2_infor): update scenario base images (#11508) (#11533)
Update the base images for all scenarios:

- RHEL: upgrade base image for 10 to 10.1
- RHEL: upgrade base image for 9 to 9.7
- SLES: upgrade base image for 15 to 15.7
- SLES: add SLES 16.0 to the matrix
- OpenSUSE: remove OpenSUSE Leap from the matrix

I ended up removing OpenSUSE because the images that we were on were rarely updated and that resulted in very slow scenarios because of package upgrades. Also, despite the latest release being in October I didn't find any public cloud images produced for the new version of Leap. We can consider adding it back later but I'm comfortable just leaving SLES 15 and 16 in there for that test coverage.

I also ended up fixing a bug in our integration host setup where we'd provision three nodes instead of one. That ought to result in many fewer instance provisions per scenario. I also had to make a few small tweaks in how we detected whether or not SELinux is enabled, as the prior implementation did not work for SLES 16.

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-12-22 14:17:51 -07:00
Vault Automation
59b23f628f
use 'stable' instead of .go-version for the security scanner (#11374) (#11463)
* use 'stable' instead of .go-version for the security scanner

if we don't do this, the security scanner might not run because it's
using a different version of Go than what we have on whatever release
branch this is running on.

* update branches the scanner runs on

Co-authored-by: Josh Black <raskchanky@gmail.com>
2025-12-19 15:45:41 -08:00
Vault Automation
d25f12d943
pipeline: pin actions to latest versions (#11453) (#11458)
None of these appear to have any changes in behavior we ought to be
concerned with.

- actions/cache: https://github.com/actions/cache/releases/tag/v5.0.1
  Upgrade to Node 24

- actions/upload-artifact: https://github.com/actions/upload-artifact/releases/tag/v6.0.0
  Upgrade to Node 24

- actions/checkout: https://github.com/actions/checkout/releases/tag/v6.0.1
  Bug fix for persisted-credentials changes in 6

- actions/setup-node: https://github.com/actions/setup-node/releases/tag/v6.1.0
  Updates internal actions and removes always-auth config

- actions/download-artifact: https://github.com/actions/download-artifact/releases/tag/v7.0.0
  Upgrade to Node 24

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-12-18 13:19:23 -07:00
Vault Automation
d5c5a3f1a8
mend: reintroduce mend scanner but request amd64 runners and update pinned actions (#11386) (#11387)
Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-12-16 18:36:22 +00:00
Vault Automation
cebee05e90
lint: don't check out the repository twice (#11360) (#11376)
Fix an incompatibility where we check out the repository with
checkout@v6 and then attempt to check it out again at checkout@v5 in the
set-product-version action.

* update enos directory to trigger lint

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-12-15 16:45:27 -07:00
Vault Automation
f7accefc40
VAULT-38917: adding verify prod release binaries in release procedure yaml (#10937) (#11200)
* adding verify prod release binaries in release procedure yaml

* adding verify prod release binaries in release procedure yaml

* fixing lint

* fixing lint

* fixing lint

* fixing lint

* fixing lint

* fixing lint

* adding list binary versions

* adding list binary

* adding list binary

* adding unit tests

* adding comments to tests and scripts

* adding comments to tests and scripts

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* fixing conflicts

* testing pipeline

* update verification logic

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* adding slack notification

* adding slack notification

* adding slack notification

* adding slack notification

* adding slack notification

* adding slack notification

* adding slack notification

* adding slack notification

* adding slack notification

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* addressing comment

Co-authored-by: Tin Vo <tintvo08@gmail.com>
2025-12-15 13:53:00 -08:00
Vault Automation
f7c646ceff
reference aws-account-id instead of fetching it again (#11330) (#11352)
Co-authored-by: Josh Black <raskchanky@gmail.com>
2025-12-15 11:37:30 -08:00
Vault Automation
50c9fd55e5
Workaround backport for docker 29 ce main (#11177)
Co-authored-by: LT Carbonell <lt.carbonell@hashicorp.com>
2025-12-12 19:13:57 +00:00
Vault Automation
782f19d644
actions: add fallback ondemand runners types (#11142) (#11149)
One feature of ondemand self-hosted runners is that we don't contend
with other repositories for self-hosted runners. The penalty for using
ondemand is that there are no hot runner pools, so provisioning time
is usually around 30 second but in worst can hit the two minutes mark.
These numbers rely on immediately capacity in the default region
(us-west-2). Every once in a while we see runner provisioning times for
ondemand CI runners go into the tens of minutes, presumably due to
capacity issues. Instead of waiting around for a runner that will
fulfill our single instance type, we'll add a few fallback types we can
attempt if we hit a capacity snag on our preferred machine.

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-12-04 16:37:07 +00:00
Vault Automation
8172cf232f
actions: pin to latest actions (#11057) (#11069)
Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-12-03 18:15:05 +00:00
Vault Automation
14e7e827a8
actions: remove ent go.mod handling (#10655) (#10668)
Co-authored-by: John-Michael Faircloth <fairclothjm@users.noreply.github.com>
2025-11-10 13:17:52 -05:00
Vault Automation
4b24481e2d
ci(slack): remove trailing character and normalize emoji (#10583) (#10594)
This was started to remove a trailing " that would show up when UI tests
failed. Since I was here I normalized our emoji to use `flashing-light`
instead of `rotating_light` because the former is rendered better in the
new Slack instance.

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-11-05 18:32:50 +00:00
Vault Automation
da6122ce5f
Backport actions(setup-enos): update action-setup-enos to pull in enos 0.0.34 into ce/main (#10572)
* actions(setup-enos): update action-setup-enos to pull in enos 0.0.34 (#10561)

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-11-04 15:22:59 -07:00
Vault Automation
89347f9705
install sqlc before building vcm (#10232) (#10531)
* install sqlc before building vcm

* make a meaningless change to trigger CI

* turn off the go.work file

* remove test comment

Co-authored-by: Josh Black <raskchanky@gmail.com>
2025-11-03 23:04:35 +00:00
Vault Automation
66dad8d0fa
actions(slack): quote yaml strings that start with ':' (#10477) (#10485)
Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-10-29 14:47:33 -07:00
Vault Automation
2c95f73ca7
[VAULT-40166] go: check go.mod drift on changes to ce/branches
When a pull request is created against a CE branch and it has changed any files in the `gotoolchain` group we'll automatically trigger the diff for every Go module file in the repo against the equivalent in the corresponding enterprise branch. If there's a delta in like configuration it will automatically fail the `build/ce-checks` job. It will also write a complete explanation of the diff to the step output and also to the `build/ce-checks` job step summary.

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-10-28 13:26:46 -06:00
Vault Automation
e6c710aef4
actions: pin to latest actions (#10407) (#10417)
Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-10-27 17:46:04 -06:00
Vault Automation
0c6c13dd38
license: update headers to IBM Corp. (#10229) (#10233)
* license: update headers to IBM Corp.
* `make proto`
* update offset because source file changed

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-10-21 15:20:20 -06:00
Vault Automation
4ccdc69cad
[VAULT-40033] Migrate Slack notifications to ibm-hashicorp workspace (#10205) (#10207)
Migrate all slack notifications to the `ibm-hashicorp` workspace. This
required creating three new `incoming-webhook` configurations which are
capable of posting into three different Slack channels, depending on the
workflow.

As they all use the `incoming-webhook` event, many of our integrations
had to be migrated from `chat.postMessage` and those changes are
reflected here.

Of note, there are lots of changes to the `release-procedure-ent`
workflow as it has by far the most uses of the Slack integrations. In
some cases it was to appease `actionlint` issues, in others I made small
idiomatic tweaks. I translated all of the payload messages to YAML
instead of JSON, which fits better into our existing workflows and also
because most of the payload messages were invalid JSON all together.

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-10-20 09:48:01 -06:00