-
Notifications
You must be signed in to change notification settings - Fork 54
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Supporting Tower 3.2.x #53
Comments
@jameswnl Thanks for capturing these notes. I would suggest adding an item in the Todo section for "will machine credential will keep the original ID". Also, I assume there is work to enable the UI to CRUD the new Vault credentials. From what I understand this is backend work, but you would know better. Another item, but maybe not a Todo here is to investigate custom credentials more so we can support types like Azure through this new feature. |
@jameswnl I think we have addressed all the areas here, if you agree I think we can close this issue. |
@gmcculloug I've added a todo to test the upgrade scenario and its impact on the converted/dropped credentials. |
This issue has been automatically marked as stale because it has not been updated for at least 6 months. If you can still reproduce this issue on the current release or on Thank you for all your contributions! |
Credentials
Major Changes
** For us, we'll create/update accordingly (have to test and confirm if the new machine credential will keep the original ID.
** Dropping azure classic and rackspace credential types manageiq#16936 and Dropping azure classic and rackspace credential types #58
** After upgrade, refresh will destroy them
** Vault
** Ansible Tower
** Insights
** rhev
** custom credential type (Custom credentials will not be managed by the V1 API)
Todo
ca file location
can only be done when move to consume from API V2Others
Azure classic
?)The text was updated successfully, but these errors were encountered: