Skip to content

Commit 13d1e16

Browse files
docs(hcp-vault-secrets): deprecation notice (#199)
## Description <!-- Briefly describe what this PR does and why --> add deprecation notice and migration guidance to README ## Type of Change - [ ] New module - [ ] Bug fix - [ ] Feature/enhancement - [ ] Documentation - [X] Other ## Module Information <!-- Delete this section if not applicable --> **Path:** `registry/coder/modules/hcp-vault-secrets` **New version:** `v1.0.8` **Breaking change:** [ ] Yes [X] No ## Testing & Validation - [X] Tests pass (`bun test`) - [X] Code formatted (`bun run fmt`) - [NA] Changes tested locally ## Related Issues <!-- Link related issues or write "None" if not applicable --> None
1 parent 0a3c9b0 commit 13d1e16

File tree

1 file changed

+17
-4
lines changed
  • registry/coder/modules/hcp-vault-secrets

1 file changed

+17
-4
lines changed

registry/coder/modules/hcp-vault-secrets/README.md

Lines changed: 17 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -10,12 +10,25 @@ tags: [integration, vault, hashicorp, hvs]
1010

1111
# HCP Vault Secrets
1212

13+
> [!WARNING]
14+
> **⚠️ DEPRECATED: HCP Vault Secrets is being sunset**
15+
>
16+
> HashiCorp has announced that HCP Vault Secrets will no longer be available for purchase by new customers after **June 30th, 2025**. This module will stop working when HCP Vault Secrets is fully discontinued.
17+
>
18+
> **Use these Coder registry modules instead:**
19+
>
20+
> - **[vault-token](https://registry.coder.com/modules/vault-token)** - Connect to Vault using access tokens
21+
> - **[vault-jwt](https://registry.coder.com/modules/vault-jwt)** - Connect to Vault using JWT/OIDC authentication
22+
> - **[vault-github](https://registry.coder.com/modules/vault-github)** - Connect to Vault using GitHub authentication
23+
>
24+
> These modules work with both self-hosted Vault and HCP Vault Dedicated. For migration help, see the [official HashiCorp announcement](https://developer.hashicorp.com/hcp/docs/vault-secrets/end-of-sale-announcement).
25+
1326
This module lets you fetch all or selective secrets from a [HCP Vault Secrets](https://developer.hashicorp.com/hcp/docs/vault-secrets) app into your [Coder](https://coder.com) workspaces. It makes use of the [`hcp_vault_secrets_app`](https://registry.terraform.io/providers/hashicorp/hcp/latest/docs/data-sources/vault_secrets_app) data source from the [HCP provider](https://registry.terraform.io/providers/hashicorp/hcp/latest).
1427

1528
```tf
1629
module "vault" {
1730
source = "registry.coder.com/coder/hcp-vault-secrets/coder"
18-
version = "1.0.7"
31+
version = "1.0.8"
1932
agent_id = coder_agent.example.id
2033
app_name = "demo-app"
2134
project_id = "aaa-bbb-ccc"
@@ -41,7 +54,7 @@ To fetch all secrets from the HCP Vault Secrets app, skip the `secrets` input.
4154
```tf
4255
module "vault" {
4356
source = "registry.coder.com/coder/hcp-vault-secrets/coder"
44-
version = "1.0.7"
57+
version = "1.0.8"
4558
agent_id = coder_agent.example.id
4659
app_name = "demo-app"
4760
project_id = "aaa-bbb-ccc"
@@ -55,7 +68,7 @@ To fetch selective secrets from the HCP Vault Secrets app, set the `secrets` inp
5568
```tf
5669
module "vault" {
5770
source = "registry.coder.com/coder/hcp-vault-secrets/coder"
58-
version = "1.0.7"
71+
version = "1.0.8"
5972
agent_id = coder_agent.example.id
6073
app_name = "demo-app"
6174
project_id = "aaa-bbb-ccc"
@@ -70,7 +83,7 @@ Set `client_id` and `client_secret` as module inputs.
7083
```tf
7184
module "vault" {
7285
source = "registry.coder.com/coder/hcp-vault-secrets/coder"
73-
version = "1.0.7"
86+
version = "1.0.8"
7487
agent_id = coder_agent.example.id
7588
app_name = "demo-app"
7689
project_id = "aaa-bbb-ccc"

0 commit comments

Comments
 (0)