-
Notifications
You must be signed in to change notification settings - Fork 156
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add support for ACL policies #480
Conversation
Needs hvac >= 2.1.0 |
@@ -133,7 +133,7 @@ def hashivault_write(module): | |||
returned_data = client.secrets.kv.v2.create_or_update_secret(mount_point=mount_point, cas=cas, | |||
path=secret, secret=write_data) | |||
else: | |||
returned_data = client.write(secret_path, **write_data) | |||
returned_data = client.write_data(secret_path, **write_data) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Was this required for hvac 2?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yes it's a breaking change of 2.0.0 : https://github.com/hvac/hvac/blob/main/CHANGELOG.md#200
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
merged that, might fix this
@@ -133,7 +133,7 @@ def hashivault_write(module): | |||
returned_data = client.secrets.kv.v2.create_or_update_secret(mount_point=mount_point, cas=cas, | |||
path=secret, secret=write_data) | |||
else: | |||
returned_data = client.write(secret_path, **write_data) | |||
returned_data = client.write_data(secret_path, **write_data) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@@ -133,7 +133,7 @@ def hashivault_write(module): | |||
returned_data = client.secrets.kv.v2.create_or_update_secret(mount_point=mount_point, cas=cas, | |||
path=secret, secret=write_data) | |||
else: | |||
returned_data = client.write(secret_path, **write_data) | |||
returned_data = client.write_data(secret_path, **write_data) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks like get bogus policy is failing now for some reason |
@TerryHowe I fixed the test, as hvac returns an InvalidPath exception if the ACL policy doesn't exist :
|
This and jwt modules release in 5.3.0 |
Fixes: #476