vault/CODEOWNERS
Line: 7: incorrect codeowner organization: hashicorp/vault Line: 7: no users/groups matched Line: 10: incorrect codeowner organization: hashicorp/vault-ecosystem Line: 10: no users/groups matched Line: 11: incorrect codeowner organization: hashicorp/vault-ecosystem Line: 11: no users/groups matched Line: 12: incorrect codeowner organization: hashicorp/vault-ecosystem Line: 12: no users/groups matched Line: 13: incorrect codeowner organization: hashicorp/vault-ecosystem Line: 13: no users/groups matched Line: 16: incorrect codeowner organization: hashicorp/vault-ecosystem Line: 16: no users/groups matched Line: 17: incorrect codeowner organization: hashicorp/vault-ecosystem Line: 17: no users/groups matched Line: 18: incorrect codeowner organization: hashicorp/vault-ecosystem Line: 18: no users/groups matched Line: 19: incorrect codeowner organization: hashicorp/vault-ecosystem Line: 19: no users/groups matched Line: 20: incorrect codeowner organization: hashicorp/vault-ecosystem Line: 20: no users/groups matched Line: 21: incorrect codeowner organization: hashicorp/vault-ecosystem Line: 21: no users/groups matched Line: 22: incorrect codeowner organization: hashicorp/vault-ecosystem Line: 22: no users/groups matched Line: 23: incorrect codeowner organization: hashicorp/vault-ecosystem Line: 23: no users/groups matched Line: 24: incorrect codeowner organization: hashicorp/vault-ecosystem Line: 24: no users/groups matched Line: 25: incorrect codeowner organization: hashicorp/vault-ecosystem Line: 25: no users/groups matched Line: 28: incorrect codeowner organization: hashicorp/vault-ecosystem Line: 28: no users/groups matched Line: 30: incorrect codeowner organization: hashicorp/vault-ecosystem Line: 30: no users/groups matched Line: 31: incorrect codeowner organization: hashicorp/vault-ecosystem Line: 31: no users/groups matched Line: 37: incorrect codeowner organization: hashicorp/web-presence Line: 37: no users/groups matched Line: 38: incorrect format Line: 39: incorrect format Line: 40: incorrect format Line: 44: incorrect codeowner organization: hashicorp/vault-education-approvers Line: 44: no users/groups matched Line: 45: incorrect codeowner organization: hashicorp/vault-education-approvers Line: 45: no users/groups matched Line: 46: incorrect codeowner organization: hashicorp/vault-education-approvers Line: 46: no users/groups matched Line: 47: incorrect codeowner organization: hashicorp/vault-education-approvers Line: 47: no users/groups matched Line: 48: incorrect codeowner organization: hashicorp/vault-education-approvers Line: 48: no users/groups matched Line: 51: incorrect codeowner organization: hashicorp/vault-ecosystem Line: 51: incorrect codeowner organization: hashicorp/vault-education-approvers Line: 51: no users/groups matched Line: 52: incorrect codeowner organization: hashicorp/vault-ecosystem Line: 52: incorrect codeowner organization: hashicorp/vault-education-approvers Line: 52: no users/groups matched Line: 54: incorrect codeowner organization: hashicorp/vault-ui Line: 54: no users/groups matched Line: 58: incorrect codeowner organization: hashicorp/vault-ui Line: 58: incorrect codeowner organization: hashicorp/vault-ecosystem Line: 58: no users/groups matched Line: 59: incorrect codeowner organization: hashicorp/vault-ui Line: 59: incorrect codeowner organization: hashicorp/vault-ecosystem Line: 59: no users/groups matched Line: 60: incorrect codeowner organization: hashicorp/vault-ui Line: 60: incorrect codeowner organization: hashicorp/vault-ecosystem Line: 60: no users/groups matched Line: 63: incorrect codeowner organization: hashicorp/github-secure-vault-core Line: 63: incorrect codeowner organization: hashicorp/team-vault-quality Line: 63: no users/groups matched Line: 64: incorrect codeowner organization: hashicorp/github-secure-vault-core Line: 64: incorrect codeowner organization: hashicorp/team-vault-quality Line: 64: no users/groups matched Line: 67: incorrect codeowner organization: hashicorp/team-vault-quality Line: 67: no users/groups matched Line: 68: incorrect codeowner organization: hashicorp/team-vault-quality Line: 68: no users/groups matched Line: 73: incorrect codeowner organization: hashicorp/vault-crypto Line: 73: no users/groups matched Line: 75: incorrect codeowner organization: hashicorp/vault-crypto Line: 75: no users/groups matched Line: 76: incorrect codeowner organization: hashicorp/vault-crypto Line: 76: no users/groups matched Line: 77: incorrect codeowner organization: hashicorp/vault-crypto Line: 77: no users/groups matched Line: 78: incorrect codeowner organization: hashicorp/vault-crypto Line: 78: incorrect codeowner organization: hashicorp/vault-education-approvers Line: 78: no users/groups matched Line: 79: incorrect codeowner organization: hashicorp/vault-crypto Line: 79: incorrect codeowner organization: hashicorp/vault-education-approvers Line: 79: no users/groups matched Line: 80: incorrect codeowner organization: hashicorp/vault-crypto Line: 80: no users/groups matched Line: 81: incorrect codeowner organization: hashicorp/vault-crypto Line: 81: incorrect codeowner organization: hashicorp/vault-education-approvers Line: 81: no users/groups matched Line: 82: incorrect codeowner organization: hashicorp/vault-crypto Line: 82: incorrect codeowner organization: hashicorp/vault-education-approvers Line: 82: no users/groups matched Line: 83: incorrect codeowner organization: hashicorp/vault-crypto Line: 83: no users/groups matched Line: 84: incorrect codeowner organization: hashicorp/vault-crypto Line: 84: incorrect codeowner organization: hashicorp/vault-education-approvers Line: 84: no users/groups matched Line: 85: incorrect codeowner organization: hashicorp/vault-crypto Line: 85: incorrect codeowner organization: hashicorp/vault-education-approvers Line: 85: no users/groups matched Line: 86: incorrect codeowner organization: hashicorp/vault-crypto Line: 86: no users/groups matched Line: 87: incorrect codeowner organization: hashicorp/vault-crypto Line: 87: incorrect codeowner organization: hashicorp/vault-education-approvers Line: 87: no users/groups matched Line: 88: incorrect codeowner organization: hashicorp/vault-crypto Line: 88: incorrect codeowner organization: hashicorp/vault-education-approvers Line: 88: no users/groups matched Line: 89: incorrect codeowner organization: hashicorp/vault-crypto Line: 89: no users/groups matched Line: 90: incorrect codeowner organization: hashicorp/vault-crypto Line: 90: no users/groups matched Line: 91: incorrect codeowner organization: hashicorp/vault-crypto Line: 91: no users/groups matched Line: 92: incorrect codeowner organization: hashicorp/vault-crypto Line: 92: no users/groups matched Line: 93: incorrect codeowner organization: hashicorp/vault-crypto Line: 93: no users/groups matched Line: 94: incorrect codeowner organization: hashicorp/vault-crypto Line: 94: no users/groups matched Line: 95: incorrect codeowner organization: hashicorp/vault-crypto Line: 95: no users/groups matched Line: 96: incorrect codeowner organization: hashicorp/vault-crypto Line: 96: no users/groups matched Line: 97: incorrect codeowner organization: hashicorp/vault-crypto Line: 97: no users/groups matched Line: 98: incorrect codeowner organization: hashicorp/vault-crypto Line: 98: no users/groups matched Line: 99: incorrect codeowner organization: hashicorp/vault-crypto Line: 99: no users/groups matched Line: 100: incorrect codeowner organization: hashicorp/vault-crypto Line: 100: no users/groups matched Line: 101: incorrect codeowner organization: hashicorp/vault-crypto Line: 101: no users/groups matched Line: 102: incorrect codeowner organization: hashicorp/vault-crypto Line: 102: incorrect codeowner organization: hashicorp/vault-education-approvers Line: 102: no users/groups matched Line: 103: incorrect codeowner organization: hashicorp/vault-crypto Line: 103: incorrect codeowner organization: hashicorp/vault-education-approvers Line: 103: no users/groups matched Line: 104: incorrect codeowner organization: hashicorp/vault-crypto Line: 104: incorrect codeowner organization: hashicorp/vault-education-approvers Line: 104: no users/groups matched Line: 105: incorrect codeowner organization: hashicorp/vault-crypto Line: 105: incorrect codeowner organization: hashicorp/vault-education-approvers Line: 105: no users/groups matched Line: 106: incorrect codeowner organization: hashicorp/vault-crypto Line: 106: incorrect codeowner organization: hashicorp/vault-education-approvers Line: 106: no users/groups matched Line: 107: incorrect codeowner organization: hashicorp/vault-crypto Line: 107: incorrect codeowner organization: hashicorp/vault-education-approvers Line: 107: no users/groups matched Line: 108: incorrect codeowner organization: hashicorp/vault-crypto Line: 108: incorrect codeowner organization: hashicorp/vault-education-approvers Line: 108: no users/groups matched Line: 109: incorrect codeowner organization: hashicorp/vault-crypto Line: 109: incorrect codeowner organization: hashicorp/vault-education-approvers Line: 109: no users/groups matched Line: 110: incorrect codeowner organization: hashicorp/vault-crypto Line: 110: incorrect codeowner organization: hashicorp/vault-education-approvers Line: 110: no users/groups matched Line: 111: incorrect codeowner organization: hashicorp/vault-ecosystem Line: 111: incorrect codeowner organization: hashicorp/vault-education-approvers Line: 111: no users/groups matched Line: 112: incorrect codeowner organization: hashicorp/vault-customer-engineering Line: 112: incorrect codeowner organization: hashicorp/vault-education-approvers Line: 112: no users/groups matched
claire bontempo 9832c90037
UI: Implement accessible auth form components (#30500)
* UI: Move `wrapped_token` login functionality to route (#30465)

* move token unwrap functionality to page component

* update mfa test

* remove wrapped_token logic from page component

* more cleanup to relocate unwrap logic

* move wrapped_token to route

* move unwrap tests to acceptance

* move mfa form back

* add some padding

* update mfa-form tests

* get param from params

* wait for auth form on back

* run rests

* UI: Add MFA support for SSO methods (#30489)

* initial implementation of mfa validation for sso methods

* update typescript interfaces

* add stopgap changes to auth service

* switch order backend is defined

* update login form for tests even though it will be deleted

* attempt to stabilize wrapped_query test

* =update login form test why not

* Update ui/app/components/auth/form/saml.ts

Co-authored-by: lane-wetmore <lane.wetmore@hashicorp.com>

---------

Co-authored-by: lane-wetmore <lane.wetmore@hashicorp.com>

* Move CSP error to page component (#30492)

* initial implementation of mfa validation for sso methods

* update typescript interfaces

* add stopgap changes to auth service

* switch order backend is defined

* update login form for tests even though it will be deleted

* attempt to stabilize wrapped_query test

* =update login form test why not

* move csp error to page component

* move csp error to page component

* Move fetching unauthenticated mounts to the route (#30509)

* rename namespace arg to namespaceQueryParam

* move fetch mounts to route

* add margin to sign in button spacing

* update selectors for oidc provider test

* add todo delete comments

* fix arg typo in test

* change method name

* fix args handling tab click

* remove tests that no longer relate to components functionality

* add tests for preselectedAuthType functionality

* move typescript interfaces, fix selector

* add await

* oops

* move format method down, make private

* move tab formatting to the route

* move to page object

* fix token unwrap aborting transition

* not sure what that is doing there..

* add comments

* rename to presetAuthType

* use did-insert instead

* UI: Implement `Auth::FormTemplate` (#30521)

* replace Auth::LoginForm with Auth::FormTemplate

* first round of test updates

* return null if mounts object is empty

* add comment and test for empty sys/internal/mounts data

* more test updates

* delete listing_visibility test, delete login-form component test

* update divs to Hds::Card::Container

* add overflow class

* remove unused getters

* move requesting stored auth type to page component

* fix typo

* Update ui/app/components/auth/form/oidc-jwt.ts

make comment make more sense

* small cleanup items, update imports

* Delete old auth components (#30527)

* delete old components

* update codeowners

* Update `with` query param functionality (#30537)

* update path input to type=hidden

* add test coverage

* update page test

* update auth route

* delete login form

* update ent test

* consolidate logic in getter

* add more comments

* more comments..

* rename selector

* refresh model as well

* redirect for invalid query params

* move unwrap to redirect

* only redirect on invalid query params

* add tests for query param

* test selector updates

* remove todos, update relevant ones with initials

* add changelog

---------

Co-authored-by: lane-wetmore <lane.wetmore@hashicorp.com>
2025-05-08 09:58:20 -07:00

112 lines
6.9 KiB
Text

# Each line is a file pattern followed by one or more owners. Being an owner
# means those groups or individuals will be added as reviewers to PRs affecting
# those areas of the code.
#
# More on CODEOWNERS files: https://help.github.com/en/github/creating-cloning-and-archiving-repositories/about-code-owners
# Default CODEOWNER primarily for contact purposes
* @hashicorp/vault
# Select Auth engines are owned by Ecosystem
/builtin/credential/aws/ @hashicorp/vault-ecosystem
/builtin/credential/github/ @hashicorp/vault-ecosystem
/builtin/credential/ldap/ @hashicorp/vault-ecosystem
/builtin/credential/okta/ @hashicorp/vault-ecosystem
# Secrets engines (pki, ssh, totp and transit omitted)
/builtin/logical/aws/ @hashicorp/vault-ecosystem
/builtin/logical/cassandra/ @hashicorp/vault-ecosystem
/builtin/logical/consul/ @hashicorp/vault-ecosystem
/builtin/logical/database/ @hashicorp/vault-ecosystem
/builtin/logical/mongodb/ @hashicorp/vault-ecosystem
/builtin/logical/mssql/ @hashicorp/vault-ecosystem
/builtin/logical/mysql/ @hashicorp/vault-ecosystem
/builtin/logical/nomad/ @hashicorp/vault-ecosystem
/builtin/logical/postgresql/ @hashicorp/vault-ecosystem
/builtin/logical/rabbitmq/ @hashicorp/vault-ecosystem
# Identity Integrations (OIDC, tokens)
/vault/identity_store_oidc* @hashicorp/vault-ecosystem
/plugins/ @hashicorp/vault-ecosystem
/vault/plugin_catalog.go @hashicorp/vault-ecosystem
# Content on developer.hashicorp.com
# Web presence gets notified of, and can approve changes to web tooling, but not content.
/website/ @hashicorp/web-presence
/website/data/
/website/public/
/website/content/
# Education gets notified of, and can approve changes to web content.
/website/data/ @hashicorp/vault-education-approvers
/website/public/ @hashicorp/vault-education-approvers
/website/content/ @hashicorp/vault-education-approvers
/website/templates/ @hashicorp/vault-education-approvers
/website/redirects.js @hashicorp/vault-education-approvers
# Plugin docs
/website/content/docs/plugins/ @hashicorp/vault-ecosystem @hashicorp/vault-education-approvers
/website/content/docs/upgrading/plugins.mdx @hashicorp/vault-ecosystem @hashicorp/vault-education-approvers
/ui/ @hashicorp/vault-ui
# UI code related to Vault's JWT/OIDC auth method and OIDC provider.
# Changes to these files often require coordination with backend code,
# so stewards of the backend code are added below for notification.
/ui/app/components/auth/form/oidc-jwt.ts @hashicorp/vault-ui @hashicorp/vault-ecosystem
/ui/app/components/auth/form/saml.ts @hashicorp/vault-ui @hashicorp/vault-ecosystem
/ui/app/routes/vault/cluster/oidc-*.js @hashicorp/vault-ui @hashicorp/vault-ecosystem
# Release config; service account is required for automation tooling.
/.release/ @hashicorp/github-secure-vault-core @hashicorp/team-vault-quality
/.github/workflows/build.yml @hashicorp/github-secure-vault-core @hashicorp/team-vault-quality
# Quality engineering
/.github/ @hashicorp/team-vault-quality
/enos/ @hashicorp/team-vault-quality
# Cryptosec
# Temporarily require the crypto team to approve Go updates as we need to make sure
# 1.24 doesn't make it onto release branches until the FIPS paperwork has been completed.
/.go-version @hashicorp/vault-crypto
/api/auth/cert/ @hashicorp/vault-crypto
/builtin/logical/pki/ @hashicorp/vault-crypto
/builtin/logical/pkiext/ @hashicorp/vault-crypto
/website/content/docs/secrets/pki/ @hashicorp/vault-crypto @hashicorp/vault-education-approvers
/website/content/api-docs/secret/pki.mdx @hashicorp/vault-crypto @hashicorp/vault-education-approvers
/builtin/credential/cert/ @hashicorp/vault-crypto
/website/content/docs/auth/cert.mdx @hashicorp/vault-crypto @hashicorp/vault-education-approvers
/website/content/api-docs/auth/cert.mdx @hashicorp/vault-crypto @hashicorp/vault-education-approvers
/builtin/logical/ssh/ @hashicorp/vault-crypto
/website/content/docs/secrets/ssh/ @hashicorp/vault-crypto @hashicorp/vault-education-approvers
/website/content/api-docs/secret/ssh.mdx @hashicorp/vault-crypto @hashicorp/vault-education-approvers
/builtin/logical/transit/ @hashicorp/vault-crypto
/website/content/docs/secrets/transit/ @hashicorp/vault-crypto @hashicorp/vault-education-approvers
/website/content/api-docs/secret/transit.mdx @hashicorp/vault-crypto @hashicorp/vault-education-approvers
/helper/random/ @hashicorp/vault-crypto
/sdk/helper/certutil/ @hashicorp/vault-crypto
/sdk/helper/cryptoutil/ @hashicorp/vault-crypto
/sdk/helper/kdf/ @hashicorp/vault-crypto
/sdk/helper/keysutil/ @hashicorp/vault-crypto
/sdk/helper/ocsp/ @hashicorp/vault-crypto
/sdk/helper/salt/ @hashicorp/vault-crypto
/sdk/helper/tlsutil/ @hashicorp/vault-crypto
/shamir/ @hashicorp/vault-crypto
/vault/barrier* @hashicorp/vault-crypto
/vault/managed_key* @hashicorp/vault-crypto
/vault/seal* @hashicorp/vault-crypto
/vault/seal/ @hashicorp/vault-crypto
/website/content/docs/configuration/seal/ @hashicorp/vault-crypto @hashicorp/vault-education-approvers
/website/content/docs/enterprise/sealwrap.mdx @hashicorp/vault-crypto @hashicorp/vault-education-approvers
/website/content/api-docs/system/sealwrap-rewrap.mdx @hashicorp/vault-crypto @hashicorp/vault-education-approvers
/website/content/docs/secrets/transform/ @hashicorp/vault-crypto @hashicorp/vault-education-approvers
/website/content/api-docs/secret/transform.mdx @hashicorp/vault-crypto @hashicorp/vault-education-approvers
/website/content/docs/secrets/kmip-profiles.mdx @hashicorp/vault-crypto @hashicorp/vault-education-approvers
/website/content/docs/secrets/kmip.mdx @hashicorp/vault-crypto @hashicorp/vault-education-approvers
/website/content/api-docs/secret/kmip.mdx @hashicorp/vault-crypto @hashicorp/vault-education-approvers
/website/content/docs/enterprise/fips/ @hashicorp/vault-crypto @hashicorp/vault-education-approvers
/website/content/docs/platform/k8s @hashicorp/vault-ecosystem @hashicorp/vault-education-approvers
/website/content/ @hashicorp/vault-customer-engineering @hashicorp/vault-education-approvers