-
The patch function in hvac requires the `get` role capability in associated policy to run successfully, which shouldn't be the case. The `patch` capability should be enough to run the patch function(`…
-
-
**Environment:**
* Vault Version: 1.7.3
* Operating System/Architecture: Windows 10
**Vault Config File:**
```hcl
ui = true
#mlock = true
#disable_mlock = true
storage …
-
### Nomad version
Nomad v1.5.0
BuildDate 2023-03-01T10:11:42Z
Revision fc40c491cacec3d8ec3f2f98cd82b9068a50797c
### Operating system and Environment details
NAME="Oracle Linux Server"
VERS…
-
I have a successful connection to Vault. I have pulled passwords from the Vault inside the Build Steps successfully. But I can't use them inside of Build Features (Commit status publisher - GitLab - P…
-
Hi everyone! My use case is the following: I need to use the job-executor-service to connect to an application server in order to deploy a .war but credentials need to be fetched from a Vault. It woul…
-
### Terraform Version
Terraform v1.1.6
on darwin_amd64
Vault provider 3.3.1
### Affected Resource(s)
Please list the resources as a list, for example:
- vault_kubernetes_auth_backend_config
…
-
### Is there an existing issue for this?
- [X] I have searched the existing issues
### Community Note
* Please vote on this issue by adding a :thumbsup: [reaction](https://blog.github.com…
-
**What we want:**
- Protect sensitive information across Automate (similar to what we have done with LDAP in config.toml) - configuration files, secret storage places, etc.
- Obfuscate Chef Infra Se…
-
_This issue was originally opened by @barath1406 as hashicorp/terraform#26001. It was migrated here as a result of the [provider split](https://www.hashicorp.com/blog/upcoming-provider-changes-in-terr…
ghost updated
3 months ago