open-vault/CODEOWNERS
Line: 8: incorrect codeowner organization: hashicorp/vault-ecosystem Line: 8: no users/groups matched Line: 9: incorrect codeowner organization: hashicorp/vault-ecosystem Line: 9: no users/groups matched Line: 10: incorrect codeowner organization: hashicorp/vault-ecosystem Line: 10: no users/groups matched Line: 11: incorrect codeowner organization: hashicorp/vault-ecosystem Line: 11: no users/groups matched Line: 14: incorrect codeowner organization: hashicorp/vault-ecosystem Line: 14: no users/groups matched Line: 15: incorrect codeowner organization: hashicorp/vault-ecosystem Line: 15: no users/groups matched Line: 16: incorrect codeowner organization: hashicorp/vault-ecosystem Line: 16: no users/groups matched Line: 17: incorrect codeowner organization: hashicorp/vault-ecosystem Line: 17: no users/groups matched Line: 18: incorrect codeowner organization: hashicorp/vault-ecosystem Line: 18: no users/groups matched Line: 19: incorrect codeowner organization: hashicorp/vault-ecosystem Line: 19: no users/groups matched Line: 20: incorrect codeowner organization: hashicorp/vault-ecosystem Line: 20: no users/groups matched Line: 21: incorrect codeowner organization: hashicorp/vault-ecosystem Line: 21: no users/groups matched Line: 22: incorrect codeowner organization: hashicorp/vault-ecosystem Line: 22: no users/groups matched Line: 23: incorrect codeowner organization: hashicorp/vault-ecosystem Line: 23: no users/groups matched Line: 25: incorrect codeowner organization: hashicorp/vault-ecosystem Line: 25: no users/groups matched Line: 26: incorrect codeowner organization: hashicorp/vault-ecosystem Line: 26: no users/groups matched Line: 29: incorrect codeowner user: acahn Line: 29: no users/groups matched Line: 32: incorrect codeowner user: fairclothjm Line: 32: no users/groups matched Line: 33: incorrect codeowner user: fairclothjm Line: 33: no users/groups matched Line: 38: incorrect codeowner user: austingebauer Line: 38: no users/groups matched Line: 39: incorrect codeowner user: austingebauer Line: 39: no users/groups matched Line: 42: incorrect codeowner organization: hashicorp/release-engineering Line: 42: incorrect codeowner organization: hashicorp/github-secure-vault-core Line: 42: no users/groups matched Line: 43: incorrect codeowner organization: hashicorp/release-engineering Line: 43: incorrect codeowner organization: hashicorp/github-secure-vault-core Line: 43: no users/groups matched

44 lines
2.1 KiB
Plaintext

# Each line is a file pattern followed by one or more owners. Being an owner
# means those groups or individuals will be added as reviewers to PRs affecting
# those areas of the code.
#
# More on CODEOWNERS files: https://help.github.com/en/github/creating-cloning-and-archiving-repositories/about-code-owners
# Select Auth engines are owned by Ecosystem
/builtin/credential/aws/ @hashicorp/vault-ecosystem
/builtin/credential/github/ @hashicorp/vault-ecosystem
/builtin/credential/ldap/ @hashicorp/vault-ecosystem
/builtin/credential/okta/ @hashicorp/vault-ecosystem
# Secrets engines (pki, ssh, totp and transit omitted)
/builtin/logical/aws/ @hashicorp/vault-ecosystem
/builtin/logical/cassandra/ @hashicorp/vault-ecosystem
/builtin/logical/consul/ @hashicorp/vault-ecosystem
/builtin/logical/database/ @hashicorp/vault-ecosystem
/builtin/logical/mongodb/ @hashicorp/vault-ecosystem
/builtin/logical/mssql/ @hashicorp/vault-ecosystem
/builtin/logical/mysql/ @hashicorp/vault-ecosystem
/builtin/logical/nomad/ @hashicorp/vault-ecosystem
/builtin/logical/postgresql/ @hashicorp/vault-ecosystem
/builtin/logical/rabbitmq/ @hashicorp/vault-ecosystem
/plugins/ @hashicorp/vault-ecosystem
/vault/plugin_catalog.go @hashicorp/vault-ecosystem
/website/content/docs/plugin-portal.mdx @acahn
# Plugin docs
/website/content/docs/plugins/ @fairclothjm
/website/content/docs/upgrading/plugins.mdx @fairclothjm
# UI code related to Vault's JWT/OIDC auth method and OIDC provider.
# Changes to these files often require coordination with backend code,
# so stewards of the backend code are added below for notification.
/ui/app/components/auth-jwt.js @austingebauer
/ui/app/routes/vault/cluster/oidc-*.js @austingebauer
# Release config; service account is required for automation tooling.
/.release/ @hashicorp/release-engineering @hashicorp/github-secure-vault-core
/.github/workflows/build.yml @hashicorp/release-engineering @hashicorp/github-secure-vault-core