Closed faseyiks closed 1 year ago
* path is already in use at secrets/ad/<redacted>/
The Terraform-specific error that you're getting looks to be different and unrelated from the other error that you're observing. The error above usually means that there's already an engine enabled in that same path.
* cannot set password_policy and either length or formatter
We fixed an issue that's now available in Vault 1.11.1 where the engine was not correctly disregarding length
(or formatter
) if password_policy
was provided. Can you give this a try after updating the Vault server(s) to 1.11.1?
There should also be a fix coming in the terraform provider, in 3.9.0. :)
Related fix to the Vault Provider fix which makes password_policy
conflict with length
and formatter
https://github.com/hashicorp/terraform-provider-vault/pull/1557
@faseyiks you may want to try a terraform import
if you want to bring a non-terraform managed Vault resource into your state.
See https://registry.terraform.io/providers/hashicorp/vault/latest/docs/resources/ad_secret_backend#import for more details.
Hello @faseyiks 👋 Were you able to test this again after the update? Can you please confirm if this is still an issue for you? Thank you!
I'm going to go ahead and close this issue as completed for now. Please feel free to re-open it if you need. Thanks!
Describe the bug I am currently facing a situation where the resource definition above is failing when I use terraform to configure AD secret engine with the error
So I tried to then create the configuration using Vault CLI. I succeeded but similarly experienced the following
The two errors are conflicting. When
length
is set to a number higher than 0, you get error that both cannot be set. But if you do not set length then it doesn't work at all and say you need to set eitherlength
orformatter
. Would this be why it is not working with Terraform because bothlength
andformatter
are not set in the terraform files because the documentation says they are deprecated.To Reproduce Steps to reproduce the behavior:
vault write ...
vault login....
Expected behavior Expected behaviour should be that
Environment:
vault status
):vault version
):Vault v1.11.1 (0f634755745f4adf62ec0723a0b93d6dce5bc33e), built 2022-07-19T20:16:47Z1
Vault server configuration file(s):
Additional context Terraform is OSS