Commit graph

22069 commits

Author SHA1 Message Date
Vault Automation
49974cb486
security: handle false positive OSV vulns in UBI images (#11436) (#11437)
Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-12-17 13:16:28 -07:00
Vault Automation
4900cbfe1a
[UI] Ember Data Migration - Kubernetes Overview/Cleanup (#11430) (#11435)
* converts kubernetes overview page component to ts

* converts kubernetes role index controller to ts

* updates kubernetes overview to use api service

* removes store service from kubernetes engine

* removes kubernetes models, adapters and serializers

* removes unused types

* updates removed type references

* removes fetch-secrets-config decorator

Co-authored-by: Jordan Reimer <zofskeez@gmail.com>
2025-12-17 17:26:50 +00:00
Vault Automation
366e77bac5
UI: Convert file policy-form to typescript (#11368) (#11434)
* convert file to typescript

* remove unused util

* add support for nested options

* move automation snippets outside of builder component

* update snippet utils

* Revert "remove unused util"

This reverts commit bcb53271e63dd1fc3d2f735d7f7fcc54e5e31988.

* render automation snippets for only acl policy types

* cleanup old args

* add default arg for formatEot

* make tfvp formatters easier to follow, maybe?

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>
2025-12-17 17:20:19 +00:00
Vault Automation
304ba958fe
[UI] Ember Data Migration - Kubernetes Roles (#11403) (#11419)
* enables typescript in kubernetes engine

* adds api service to kubernetes engine

* removes mounts handler from kubernetes mirage handler

* adds kubernetes application route to handle withConfig decorator check

* updates usage of application model in kubernetes engine

* updates kubernetes configuration route to use api service fetched config

* adds kubernetes config form class

* updates error route backend references to secretsEngine

* updates kubernetes configure workflow to use api service and form class

* fixes tests

* converts kubernetes index route to ts

* adds capabilities service to kubernetes engine

* updates kubernetes roles view to use api service

* converts kubernetes role details component to ts

* updates kubernetes role details route to use api service

* reverts kubernetes mirage handler change

* converts kubernetes role index route to ts

* updates kubernetes generate credentials workflow to use api service

* converts kubernetes role edit and create routes to ts

* converts kubernetes create-and-edit component to ts

* adds form class for kubernetes role

* updates kubernetes create and edit routes to use api service and form class

* fixes tests

Co-authored-by: Jordan Reimer <zofskeez@gmail.com>
2025-12-16 23:13:18 +00:00
Vault Automation
2bc8a58cfd
[UI] Ember Data Migration - Kubernetes Config (#11358) (#11401)
* enables typescript in kubernetes engine

* adds api service to kubernetes engine

* removes mounts handler from kubernetes mirage handler

* adds kubernetes application route to handle withConfig decorator check

* updates usage of application model in kubernetes engine

* updates kubernetes configuration route to use api service fetched config

* adds kubernetes config form class

* updates error route backend references to secretsEngine

* updates kubernetes configure workflow to use api service and form class

* fixes tests

* reverts kubernetes mirage handler change

* updates type for inferredState in kubernetes config page component

* removes commented out form field in kubernetes config form

Co-authored-by: Jordan Reimer <zofskeez@gmail.com>
2025-12-16 19:24:27 +00:00
Vault Automation
d5c5a3f1a8
mend: reintroduce mend scanner but request amd64 runners and update pinned actions (#11386) (#11387)
Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-12-16 18:36:22 +00:00
Vault Automation
cebee05e90
lint: don't check out the repository twice (#11360) (#11376)
Fix an incompatibility where we check out the repository with
checkout@v6 and then attempt to check it out again at checkout@v5 in the
set-product-version action.

* update enos directory to trigger lint

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-12-15 16:45:27 -07:00
Vault Automation
f7accefc40
VAULT-38917: adding verify prod release binaries in release procedure yaml (#10937) (#11200)
* adding verify prod release binaries in release procedure yaml

* adding verify prod release binaries in release procedure yaml

* fixing lint

* fixing lint

* fixing lint

* fixing lint

* fixing lint

* fixing lint

* adding list binary versions

* adding list binary

* adding list binary

* adding unit tests

* adding comments to tests and scripts

* adding comments to tests and scripts

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* fixing conflicts

* testing pipeline

* update verification logic

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* adding slack notification

* adding slack notification

* adding slack notification

* adding slack notification

* adding slack notification

* adding slack notification

* adding slack notification

* adding slack notification

* adding slack notification

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* testing pipeline

* addressing comment

Co-authored-by: Tin Vo <tintvo08@gmail.com>
2025-12-15 13:53:00 -08:00
Vault Automation
56de87a0c8
UI: Implement visual policy builder (#11250) (#11367)
* replace Hds::Reveal with Hds::Accordion

* adjust spacing to render in Hds::Form component

* fix spacing in policy-example

* cleanup form-section class usage

* implement visual builder in create policy form

* hide visual editor in search select modal

* use general selectors, alphabetize form/field selectors

* update test coverage to check for visual policy editor

* reorganzie tests by module

* add saving functionality for visual editor

* refactor event handling methods

* refactor component so parent manages stanzas

* move snippets to automation-snippets tab component

* polish up policy diff modal

* refactor arg to be isCompact

* update test coverage and export new component

* rearrange methods to make diff easier

* small cleanup, abc vars and remove unneeded change

* add lanuage and update test coverage

* update comment

* fix form hierarchy

* fix modal spacing;

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>
2025-12-15 20:42:13 +00:00
Vault Automation
f7c646ceff
reference aws-account-id instead of fetching it again (#11330) (#11352)
Co-authored-by: Josh Black <raskchanky@gmail.com>
2025-12-15 11:37:30 -08:00
Vault Automation
f9bb8aa7d4
Enforce Checks on Chain in Common Criteria Mode (#10915) (#11251)
* Add Disable-Time-Check flag, and also respect common criteria when doing so.

* Switch to EnableTimeChecks to not change default behavior.

* Check Common Criteria Flag Before Disabling Verification.

* Add Changelog.

* Update builtin/logical/pki/issuing/cert_verify_ent.go



* Update changelog/_10915.txt



* PR feedback.

* Merge-fix

* Test case requested by PR review.

---------

Co-authored-by: Kit Haines <khaines@mit.edu>
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2025-12-15 14:08:43 -05:00
Vault Automation
e78aea2ec1
Correctly set signature bits. (#10700) (#10977)
* Correctly set signature bits.

* All the other places that accidentally conflate issuer and issued key.

* Update builtin/logical/pki/path_roles.go



* PR Feedback.

* Add changelog.

* Test and validate keybits in a single call

* License header.

* Add/combine validate and get default hashbits calls.

* Actually set keyBits on the role.

* Fix storage test, switch to defaultOrValue.

* fix storage test.

* Update error return for linter.

* Look at underlaying key type not type which might include "managedKeyType" for ca-issuer.

* Update expected role values, and convert between PublicAlgorithm and KeyType internally.

* Move the ec to ecdsa transformation to helper functions.  More consistant usage.

* Speed improvement to testing - pregenerate CA bundles and CSR.

* Add go test doc.

* Fix issue with web-merge.

* Error wrapping error now warnings aren't errors.

* PR feedback - move ecdsa support to subfunctions.

---------

Co-authored-by: Kit Haines <khaines@mit.edu>
Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2025-12-15 14:08:17 -05:00
Vault Automation
b4db60b6c8
Vault 40239/perf secondary approle periodic tidy (#10794) (#10939)
* Adding logic to run tidy on local secret IDs only for perf secondaries

* Modifying periodic tidy to run on local mounts

* Updating changelog for fix in VAULT-40239

Co-authored-by: Sean Ellefson <sellefson@hashicorp.com>
2025-12-15 11:34:21 -07:00
Vault Automation
41bc535dc9
sdk/rotation: Prevent rotation attempts on read-only storage (#10762) (#11156)
* sdk/rotation: Prevent rotation attempts on read-only storage

Rotation is a write operation that mutates both Vault's storage
and an external resource. Attempting this on a read-only node
(like in a performance secondary cluster) will fail.

This check preempts the rotation to prevent a split-brain scenario
where the external credential is changed but Vault's storage
cannot be updated.

* changelog

* fix failing test

Co-authored-by: John-Michael Faircloth <fairclothjm@users.noreply.github.com>
2025-12-15 10:47:28 -06:00
Vault Automation
6c2f2a84ee
VAULT-40506: Disable custom JSON limit parsing on ClusterListener (#10848) (#11075)
* add test for issue

* add bool to disable json limit parsing

* clean up tests

* fix godoc

* restore previous clustering setup

* add nil check for VaultNodeConfig

* add changelog

* move docker test to appropriate directory to allow testing in CI

---------

Co-authored-by: davidadeleon <56207066+davidadeleon@users.noreply.github.com>
Co-authored-by: davidadeleon <ddeleon@hashicorp.com>
2025-12-12 17:23:36 -05:00
Vault Automation
b03ed9cf7f
Fix panic during secondary enablement (#11289) (#11291) 2025-12-12 21:23:40 +00:00
Vault Automation
0a52566ccc
Correct misleading godoc re DisplayAttrs.Value. (#11189) (#11227) 2025-12-12 21:00:07 +00:00
Violet Hynes
ff1d4da453
Manual CE backport VAULT-41128 ensure alias name is not logged in observations (#11296) (#11300)
* VAULT-41128 ensure alias name is not logged in observations (#11296)

* VAULT-41128 ensure alias name is not logged in observations

* feedback

* whoops
2025-12-12 20:25:20 +00:00
Vault Automation
be193ec3ab
VAULT-41147 add policy observations to Vault (#11205) (#11229)
Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
2025-12-12 20:24:41 +00:00
Vault Automation
fbbb559ca6
VAULT-41153 correct emission of token create observations (#11302) (#11312)
* VAULT-41153 correct emission of token create observations

* make fmt

* mount info

Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
2025-12-12 20:19:04 +00:00
Vault Automation
1934f2698c
UI: Updating non-ember engines to utilize new config tune flow (#10853) (#11236)
* removing flags

* small changes

* fixes

* move things back

* utilizing aftermodel w mods, testing aws

* fix ssh tests

* fixing aws and azure

* fix gcp

* fix test and flip kv

* fix kv2 tests

* adding model to fix tests

* updates and removals

* fix tests

* no showing empty state, redirect to plugin settings after config save

* test fixes

* update subtitle to include namepsace, fix test

* removing index, replacing with general settings, updates

* updates and fix tests

* more test fixes

* wif tests

* updates to nav tests

* update tests and cleanup configuration logic

* add todos

* fix remaining tests, add nav test to gcp

* test tweak

* address todos, test update

* Update ui/app/routes/vault/cluster/secrets/backend/configuration/plugin-settings.ts



* I love prettier so much

---------

Co-authored-by: Dan Rivera <dan.rivera@hashicorp.com>
Co-authored-by: claire bontempo <cbontempo@hashicorp.com>
Co-authored-by: Shannon Roberts (Beagin) <beagins@users.noreply.github.com>
2025-12-12 11:23:32 -08:00
Vault Automation
be2cb06f8c
Backport refactor dependencies and removes disallowed vault imports from builtin Okta auth into ce/main (#11295)
* refactor dependencies and removes disallowed vault imports from builtin Okta auth (#10965)

* move SkipUnlessEnvVarsSet from vault/helper/testhelpers/ to vault/sdk/helper/testhelpers

* use unittest framework from vault-testing-stepwise module in place of sdk/logical

* refactor SkipUnlessEnvVarsSet() and NewAssertAuthPoliciesFunc() to sdk

* bump docker API version to 1.44 matching 2f33549

---------

Co-authored-by: Thy Ton <maithytonn@gmail.com>
2025-12-12 13:20:57 -06:00
Vault Automation
50c9fd55e5
Workaround backport for docker 29 ce main (#11177)
Co-authored-by: LT Carbonell <lt.carbonell@hashicorp.com>
2025-12-12 19:13:57 +00:00
Vault Automation
06068fb8eb
removes ember data models, adapaters and serializers for sync (#11026) (#11195)
Co-authored-by: Jordan Reimer <zofskeez@gmail.com>
2025-12-12 11:00:10 -07:00
Vault Automation
c5b3edc0e4
UI: Add general wizard component (#11136) (#11252)
* add general wizard component

* add copyright headers

* remove header, improve submit block conditional logic, add integration tests

Co-authored-by: lane-wetmore <lane.wetmore@hashicorp.com>
2025-12-12 11:14:00 -06:00
Vault Automation
7bf7bf39fe
Resolve glob and js-yaml security vulnerabilities (#11271) (#11314)
* remove unused packages

* patch vulnerable versions of glob and js-yaml SECVULN-33202

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>
2025-12-12 09:08:46 -08:00
Vault Automation
fdacc28522
[UI] Ember Data Migration - LDAP Overview/Cleanup (#11255) (#11297)
* removes withConfig decorator and moves check to application route

* updates backendModel references in ldap engine to secretsEngine

* adds ldap config form class

* updates ldap config type in application route

* updates ldap configure and configuration routes to use api service

* adds capabilities service to ldap engine

* updates ldap mirage handler and scenario

* adds ldap capabilities constants and helper for fetching capabilities for roles

* updates ldap roles view to use api service

* updates ldap role details view to use api service

* updates ldap role create/edit views to use api service and form classes

* updates ldap role subdirectory view to use api service

* updates ldap role credentials view to use api service

* updates ldap libraries list views to use api service

* updates ldap library details view to use api service

* updates ldap library details accounts view to use api service

* updates ldap library details accounts check out view to use api service

* updates ldap library details configuration view to use api service

* updates ldap library create/edit workflows to use api service and form class

* fixes lint errors

* updates ldap overview to use api service

* updates ldap overview tests

* removes store and pagination services from ldap engine

* removes ldap related ember data files

* updates path_to_library var casing

Co-authored-by: Jordan Reimer <zofskeez@gmail.com>
2025-12-11 18:37:17 +00:00
vinay-gopalan
3c99c68600
Backport #11277 to ce/main (#11282) 2025-12-10 15:46:49 -06:00
Vault Automation
2e0f2f1646
[UI] Ember Data Migration - LDAP Library (#11254) (#11260)
* removes withConfig decorator and moves check to application route

* updates backendModel references in ldap engine to secretsEngine

* adds ldap config form class

* updates ldap config type in application route

* updates ldap configure and configuration routes to use api service

* adds capabilities service to ldap engine

* updates ldap mirage handler and scenario

* adds ldap capabilities constants and helper for fetching capabilities for roles

* updates ldap roles view to use api service

* updates ldap role details view to use api service

* updates ldap role create/edit views to use api service and form classes

* updates ldap role subdirectory view to use api service

* updates ldap role credentials view to use api service

* updates ldap libraries list views to use api service

* updates ldap library details view to use api service

* updates ldap library details accounts view to use api service

* updates ldap library details accounts check out view to use api service

* updates ldap library details configuration view to use api service

* updates ldap library create/edit workflows to use api service and form class

* fixes lint errors

* removes errant log

Co-authored-by: Jordan Reimer <zofskeez@gmail.com>
2025-12-10 10:38:40 -07:00
Vault Automation
00133872a2
Remove envelope encryption protos (#11041) (#11264)
* remove envelope encryption protos

* remove references from buf.yaml

* add back accidental delete

Co-authored-by: Rachel Culpepper <84159930+rculpepper@users.noreply.github.com>
2025-12-10 17:04:35 +00:00
Vault Automation
80a5800c16
[UI] Ember Data Migration - LDAP Roles (#11196) (#11249)
* removes withConfig decorator and moves check to application route

* updates backendModel references in ldap engine to secretsEngine

* adds ldap config form class

* updates ldap config type in application route

* updates ldap configure and configuration routes to use api service

* adds capabilities service to ldap engine

* updates ldap mirage handler and scenario

* adds ldap capabilities constants and helper for fetching capabilities for roles

* updates ldap roles view to use api service

* updates ldap role details view to use api service

* updates ldap role create/edit views to use api service and form classes

* updates ldap role subdirectory view to use api service

* updates ldap role credentials view to use api service

Co-authored-by: Jordan Reimer <zofskeez@gmail.com>
2025-12-09 17:26:04 +00:00
Vault Automation
78a4ea458f
replace vault-logo-spinner inline styles (#11234) (#11235)
Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>
2025-12-08 13:32:57 -08:00
Vault Automation
9bc8a5074a
Vault-27794 : Update unsync as successful when destination no longer exists in secret sync (#10951) (#11218)
* VAULT-27794 - Secret sync bypassing errors while deleting a Vercel destination

* VAULT-27794 - Update unsync as successful when destination no longer exists

* VAULT-27794 - Added changelog and tests

* VAULT-27794 - Added changelog and tests

* VAULT-27794 - Comments updated

* VAULT-27794 - Updated code chanes as per review comments

* VAULT-27794 - Updated code chanes as per review comments

* Update changelog/_10951.txt



---------

Co-authored-by: santoshhashicorp <santosh.yelamarthi@hashicorp.com>
Co-authored-by: John-Michael Faircloth <fairclothjm@users.noreply.github.com>
2025-12-08 12:20:56 +05:30
Vault Automation
63bbbd163b
UI: Build policy generator (#10985) (#11209)
* wip policy stanza builder

* Implement add and delete new stanza functionality

* refactor to use Set()

* make copy updates, add callback functionality to pass policy to parent

* move policy formatter to util, add test coverage

* =separate acl-policy component into two smaller components, add automation snippets

* reorganize utils, add test coverage

* finish rename

* reduce scope of builder

* fix spacing

* add a ns test, remove unused spacing var

* rename arg

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>
2025-12-05 22:28:39 +00:00
Vault Automation
c34e25fb76
[UI] Ember Data Migration - LDAP Config (#11048) (#11194)
* removes withConfig decorator and moves check to application route

* updates backendModel references in ldap engine to secretsEngine

* adds ldap config form class

* updates ldap config type in application route

* updates ldap configure and configuration routes to use api service

Co-authored-by: Jordan Reimer <zofskeez@gmail.com>
2025-12-05 17:43:38 +00:00
Vault Automation
cfc130b40b
VAULT-28518 : added force-delete flag in secret sync (#10990) (#11180)
* added force-delete flag in secret sync

* added tests for force-delete destination flag

* added changelog

* updated test

* updated description

* updated force-delete flag

* updated changelog

* updated tests for force_delete

* Update changelog/_10990.txt



---------

Co-authored-by: suraj-simha <suraj.s@hashicorp.com>
Co-authored-by: Suraj-S <suraj.s4@ibm.com>
Co-authored-by: John-Michael Faircloth <fairclothjm@users.noreply.github.com>
2025-12-05 12:42:22 +05:30
akshya96
6c6777ef5c
Backport Fix adding additional public keys for tests in ent into ce/main (#11146)
* resolving conflicts for backport

* remove ent file
2025-12-04 11:44:25 -08:00
Vault Automation
782f19d644
actions: add fallback ondemand runners types (#11142) (#11149)
One feature of ondemand self-hosted runners is that we don't contend
with other repositories for self-hosted runners. The penalty for using
ondemand is that there are no hot runner pools, so provisioning time
is usually around 30 second but in worst can hit the two minutes mark.
These numbers rely on immediately capacity in the default region
(us-west-2). Every once in a while we see runner provisioning times for
ondemand CI runners go into the tens of minutes, presumably due to
capacity issues. Instead of waiting around for a runner that will
fulfill our single instance type, we'll add a few fallback types we can
attempt if we hit a capacity snag on our preferred machine.

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-12-04 16:37:07 +00:00
Vault Automation
950d85a1dd
[UI][VAULT-40925]: PKI page headers (#11081) (#11148)
* Sign cerficate page header

* Generate certificates page header

* Role edit page header

* Role details page header

* Role create page header

* configure create and generate intemediate page headers

* generate root page header

* Pki issuer and tidy page headers

* More PKI page headers

* Update more pki page headers!

* Update PkiPageHeader component

* Pki error page header

* Fix page header title tests

Co-authored-by: Kianna <30884335+kiannaquach@users.noreply.github.com>
2025-12-04 16:00:06 +00:00
Vault Automation
2fca81e3c2
Backport Re-use kmip integ tests into ce/main (#11147)
* no-op commit

* Re-use kmip integ tests (#11050)

---------

Co-authored-by: Nick Cabatoff <ncabatoff@hashicorp.com>
2025-12-04 09:15:29 -05:00
Vault Automation
93a339547f
fix additional keys type in ce stubs (#11114) (#11145)
Co-authored-by: akshya96 <87045294+akshya96@users.noreply.github.com>
2025-12-03 17:02:19 -08:00
Vault Automation
13154a7337
adding handler to close frame on esc & maintain focus on original element (#11121) (#11134)
Co-authored-by: Dan Rivera <dan.rivera@hashicorp.com>
2025-12-03 21:54:18 +00:00
Vault Automation
ad0a5656b4
release: make the CE branch of 1.20 inactive (#11116) (#11123)
1.21 is the current active CE branch. Make the CE 1.20 branch inactive
so that we no longer backport changes to it.

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-12-03 21:16:23 +00:00
Vault Automation
ea2c22beab
go: bump Go to 1.25.5 (#11112) (#11118)
* go: bump Go to 1.25.5
* update changelog

Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-12-03 20:38:22 +00:00
Vault Automation
e6072b50e5
[UI] Ember Data Migration - PKI Overview/Cleanup (#11024) (#11117)
* removes store query from pki config route

* updates pki overview route to use api service

* removes remaining references to store in pki tests

* removes unused store service injections in pki components

* removes store dependency from pki engine

* removes ember data related unit tests for pki

* removes pki ember data models, adapters and serializers

* removes unused pagination service injections in config-ui, kv, pki and sync engines

* removes unused store service injections from pki engine

* updates dashboard quick-actions-card component to fetch options using api service

* removes path-help test using pki model

Co-authored-by: Jordan Reimer <zofskeez@gmail.com>
2025-12-03 20:37:20 +00:00
Vault Automation
0e13196509
UI: Clarifies warning alert for string list input when a comma is intentional (#11046) (#11099)
* clarify warning message for scenarios where a comma is intentional

* add test

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>
2025-12-03 10:23:29 -08:00
Vault Automation
8172cf232f
actions: pin to latest actions (#11057) (#11069)
Signed-off-by: Ryan Cragun <me@ryan.ec>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-12-03 18:15:05 +00:00
Vault Automation
dc1288eac7
VAULT-41153 Token create observations (#11036) (#11084)
* WIP

* wip

* VAULT-41153 token create observations

Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
2025-12-03 16:17:03 +00:00
Vault Automation
643ed25952
VAULT-24240: Reject delete destination request if sync is disabled (#11013) (#11062)
* reject destination delete request if sync is disabled

* add changelog

* removed duplicate code, moved error message to separate designated file

* constructing error on a new line for readability

---------

Co-authored-by: Arjun K S <arjun.ks@hashicorp.com>
Co-authored-by: Arjun K S <Arjun.KS@ibm.com>
2025-12-03 21:10:13 +05:30
Vault Automation
cae5303ed9
[UI][VAULT-40924]: update remaining ldap page headers (#11042) (#11094)
* VAULT-40924 update remaining ldap page headers

* Fix failing tests!

* Add dropdown to LDAP libary details page header

* Fix libraries fix and add roles dropdown

* Update tests

* Apply suggestions from code review



* Fix failing tests.

---------

Co-authored-by: Kianna <30884335+kiannaquach@users.noreply.github.com>
Co-authored-by: lane-wetmore <lane.wetmore@hashicorp.com>
2025-12-02 22:18:21 -08:00