-
Notifications
You must be signed in to change notification settings - Fork 556
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
deprecate ad secret resources #1837
deprecate ad secret resources #1837
Conversation
Previously, when any auth_login was configured with provider.namespace, the login would not be done in the correct namespace. This was a big problem for HCP Vault users, since the default namespace for on an HCP Vault cluster is admin. * Only set the parent client's namespace once.
Should the merge branch be |
Yeah that makes sense. I was meaning to ask you when you thought we should merge this so thanks for the answer! You were reading my mind! |
The commits got weird when changing the base of this PR and merging main did not help so I am closing. This PR is superseded by #1837 |
This PR marks the ad secret resources as deprecated.
The Active Directory (AD) secrets engine has been deprecated as of the Vault 1.13 release. See the deprecation table: https://developer.hashicorp.com/vault/docs/deprecation
With the upcoming LDAP secrets resources we can mark these resources as deprecated and follow our deprecation process which broadly involves: