From 03de1c4b2114c215d2bfefe06d9bbf738f171bf1 Mon Sep 17 00:00:00 2001 From: Jeff Mitchell Date: Wed, 3 Nov 2021 14:52:11 -0400 Subject: [PATCH] Pass namespace to the Vault client (#1660) The namespace was plumbed all the way through the API but isn't actually set on the client when it is created. Fixes #1597 --- CHANGELOG.md | 3 +++ internal/credential/vault/vault.go | 4 ++++ 2 files changed, 7 insertions(+) diff --git a/CHANGELOG.md b/CHANGELOG.md index 28a28534d2..bd52f521c3 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -22,6 +22,9 @@ Canonical reference for changes, improvements, and bugfixes for Boundary. a missing mandated cipher suite of the HTTP/2 (`h2`) specification that could result in no shared cipher suites between the Boundary API listener and those clients. ([PR](https://github.com/hashicorp/boundary/pull/1637)) +* vault: Fix credential store support when using Vault namespaces + ([Issue](https://github.com/hashicorp/boundary/issues/1597), + [PR](https://github.com/hashicorp/boundary/pull/1660)) ## 0.6.2 (2021/09/27) diff --git a/internal/credential/vault/vault.go b/internal/credential/vault/vault.go index 9f29c6f957..0e2cc1addd 100644 --- a/internal/credential/vault/vault.go +++ b/internal/credential/vault/vault.go @@ -79,6 +79,10 @@ func newClient(c *clientConfig) (*client, error) { } vClient.SetToken(string(c.Token)) + if c.Namespace != "" { + vClient.SetNamespace(c.Namespace) + } + return &client{ cl: vClient, token: c.Token,