1
0
Commit Graph

26 Commits

Author SHA1 Message Date
f33fd378bb remove cassandra 2024-07-01 12:23:25 +03:00
6afd5d71a4 remove aws/s3/dynamodb 2024-07-01 02:47:12 +03:00
fa5905d965 remove mssql 2024-07-01 02:42:41 +03:00
d2b88afbdf remove mongodb/mongodbatlas 2024-07-01 02:33:09 +03:00
hc-github-team-secure-vault-core
ed50414edc
backport of commit 10c16ccbcb13fbb0dab56fd7b11b4fdb41609436 (#20875)
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2023-05-31 13:16:25 +00:00
Yoko Hyakuna
e4a45efd99
Change the codeowner for docs PRs (#20779) 2023-05-25 09:23:31 -07:00
Alexander Scheel
d584e25c65
Add cryptosec as codeowners to relevant docs (#19070)
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-02-14 10:48:16 -05:00
Yoko Hyakuna
71e8665def
Replace the docs codeowner (#18790) 2023-01-23 10:02:21 -08:00
Scott Miller
13f3c2ffa3
Capture cryptosec responsibilities in CODEOWNERS (#18338)
* Capture cryptosec responsibilities in CODEOWNERS

* ->vault-crypto

* moooore
2022-12-15 12:11:43 -06:00
Ryan Cragun
206db2f529
[QT-436] Pseudo random artifact test scenarios (#18056)
Introducing a new approach to testing Vault artifacts before merge
and after merge/notorization/signing. Rather than run a few static
scenarios across the artifacts, we now have the ability to run a
pseudo random sample of scenarios across many different build artifacts.

We've added 20 possible scenarios for the AMD64 and ARM64 binary
bundles, which we've broken into five test groups. On any given push to
a pull request branch, we will now choose a random test group and
execute its corresponding scenarios against the resulting build
artifacts. This gives us greater test coverage but lets us split the
verification across many different pull requests.

The post-merge release testing pipeline behaves in a similar fashion,
however, the artifacts that we use for testing have been notarized and
signed prior to testing. We've also reduce the number of groups so that
we run more scenarios after merge to a release branch.

We intend to take what we've learned building this in Github Actions and
roll it into an easier to use feature that is native to Enos. Until then,
we'll have to manually add scenarios to each matrix file and manually
number the test group. It's important to note that Github requires every
matrix to include at least one vector, so every artifact that is being
tested must include a single scenario in order for all workflows to pass
and thus satisfy branch merge requirements.

* Add support for different artifact types to enos-run
* Add support for different runner type to enos-run
* Add arm64 scenarios to build matrix
* Expand build matrices to include different variants
* Update Consul versions in Enos scenarios and matrices
* Refactor enos-run environment
* Add minimum version filtering support to enos-run. This allows us to
  automatically exclude scenarios that require a more recent version of
  Vault
* Add maximum version filtering support to enos-run. This allows us to
  automatically exclude scenarios that require an older version of
  Vault
* Fix Node 12 deprecation warnings
* Rename enos-verify-stable to enos-release-testing-oss
* Convert artifactory matrix into enos-release-testing-oss matrices
* Add all Vault editions to Enos scenario matrices
* Fix verify version with complex Vault edition metadata
* Rename the crt-builder to ci-helper
* Add more version helpers to ci-helper and Makefile
* Update CODEOWNERS for quality team
* Add support for filtering matrices by group and version constraints
* Add support for pseudo random test scenario execution

Signed-off-by: Ryan Cragun <me@ryan.ec>
2022-12-12 13:46:04 -07:00
tjperry07
986f42678b
Update CODEOWNERS (#18245)
Hi, I'm the new Vault Tech Writer! Adding myself for docs content. 👋🏾
2022-12-06 11:49:14 -08:00
Yoko Hyakuna
f1eac162b9
Remove Loann from the docs codeowner list (#17513) 2022-10-12 13:59:32 -07:00
Violet Hynes
7e83693056
Remove Ecosystem as a code owner of Vault Agent (#16977) 2022-09-01 12:58:57 -04:00
modrake
395356af8a
add codeowners to protect release dirs (#15711) 2022-06-06 15:06:49 -07:00
John-Michael Faircloth
50afd00b0b
Update CODEOWNERS (#15097) 2022-04-20 09:47:26 -05:00
John-Michael Faircloth
d7793c57ee
Update CODEOWNERS (#15095) 2022-04-19 14:45:17 -05:00
Calvin Leung Huang
37c3967989
Update CODEOWNERS (#15031) 2022-04-13 15:19:21 -07:00
Jim Kalafut
436040a248
Revert "Remove docs changes from CODEOWNERS" (#14442)
It was determined that it would be better to have these changes alert
the docs team. Additional guidance is in place to not approve docs+code
PRs ahead of code review.

This reverts commit 6d16840f60.
2022-03-10 11:21:35 -08:00
Jim Kalafut
6d16840f60
Remove docs changes from CODEOWNERS 2022-01-11 12:09:50 -08:00
Austin Gebauer
4b7baff283
Updates codeowners for OIDC coordination with UI (#13522) 2022-01-03 11:10:22 -08:00
Jim Kalafut
a0830b1b33
Update CODEOWNERS (#13091) 2021-11-09 06:02:54 -08:00
Jim Kalafut
c97e44e372
Update CODEOWNERS 2021-10-26 08:19:23 -07:00
Jim Kalafut
c5a224c694
Update CODEOWNERS (#12695)
Route plugin portal changes to `acahn` as well.
2021-09-30 12:51:47 -07:00
Jim Kalafut
b992210f26
Update CODEOWNERS (#12521)
Ensure tech writers are aware of docs changes.
2021-09-08 15:39:07 -07:00
Jim Kalafut
9e66901630
Update CODEOWNERS (#11720) 2021-05-27 20:36:46 -07:00
Jim Kalafut
62d79e7d87
Initial list for CODEOWNERS (#11682) 2021-05-24 11:14:22 -07:00