Browse Source

Updates to AAD and date update (#4512)

* AAD to Microsoft Entra ID for consistency

Signed-off-by: sneakernuts <671942+sneakernuts@users.noreply.github.com>

* 2024 to 2025

Signed-off-by: sneakernuts <671942+sneakernuts@users.noreply.github.com>

---------

Signed-off-by: sneakernuts <671942+sneakernuts@users.noreply.github.com>
sneakernuts 1 year ago
parent
commit
b4e7802a09

+ 2 - 2
docs/api/generator/acr.md

@@ -26,8 +26,8 @@ You can scope tokens to a particular repository using `spec.scope`.
 
 ## Scope
 
-First, an Azure Active Directory access token is obtained with the desired authentication method.
-This AAD access token will be used to authenticate against ACR to issue a refresh token or access token.
+First, a Microsoft Entra ID access token is obtained with the desired authentication method.
+This Microsoft Entra ID access token will be used to authenticate against ACR to issue a refresh token or access token.
 If `spec.scope` if it is defined it obtains an ACR access token. If  `spec.scope` is missing it obtains an ACR refresh token:
 
 - access tokens are scoped to a specific repository or action (pull,push)

+ 1 - 1
docs/snippets/generator-acr.yaml

@@ -11,7 +11,7 @@ spec:
   scope: "repository:foo:pull,push"
 
   # Specify Azure cloud type, defaults to PublicCloud.
-  # This is used for authenticating with Azure Active Directory.
+  # This is used for authenticating with Microsoft Entra ID.
   # available options: PublicCloud, USGovernmentCloud, ChinaCloud, GermanCloud
   environmentType: "PublicCloud"
 

+ 2 - 2
hack/api-docs/mkdocs.yml

@@ -38,8 +38,8 @@ plugins:
   - macros:
       include_dir: docs/snippets
 copyright: |
-  &copy; 2024 The external-secrets Authors.<br/>
-  &copy; 2024 The Linux Foundation. All rights reserved.<br/><br/>
+  &copy; 2025 The external-secrets Authors.<br/>
+  &copy; 2025 The Linux Foundation. All rights reserved.<br/><br/>
   The Linux Foundation has registered trademarks and uses trademarks.<br/>
   For a list of trademarks of The Linux Foundation, please see our <a href="https://www.linuxfoundation.org/trademark-usage/">Trademark Usage page</a>.
 extra:

+ 2 - 2
pkg/generator/acr/acr.go

@@ -64,8 +64,8 @@ const (
 )
 
 // Generate generates a token that can be used to authenticate against Azure Container Registry.
-// First, an Azure Active Directory access token is obtained with the desired authentication method.
-// This AAD access token will be used to authenticate against ACR.
+// First, a Microsoft Entra ID access token is obtained with the desired authentication method.
+// This Microsoft Entra ID access token will be used to authenticate against ACR.
 // Depending on the generator spec it generates an ACR access token or an ACR refresh token.
 // * access tokens are scoped to a specific repository or action (pull,push)
 // * refresh tokens can are scoped to whatever policy is attached to the identity that creates the acr refresh token

+ 1 - 1
terraform/azure/key-vault/variables.tf

@@ -16,7 +16,7 @@ variable "tenant_id" {
 }
 variable "client_object_id" {
   type        = string
-  description = "The object ID of a user, service principal or security group in the Azure Active Directory tenant for the vault"
+  description = "The object ID of a user, service principal or security group in the Microsoft Entra ID tenant for the vault"
 }
 variable "eso_sp_object_id" {
   type        = string