generated from hashicorp/terraform-provider-scaffolding
-
Notifications
You must be signed in to change notification settings - Fork 56
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
7 changed files
with
201 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,73 @@ | ||
--- | ||
# generated by https://github.com/hashicorp/terraform-plugin-docs | ||
page_title: "boundary_credential_library_vault Resource - terraform-provider-boundary" | ||
subcategory: "" | ||
description: |- | ||
The credential library for Vault resource allows you to configure a Boundary credential library for Vault. | ||
--- | ||
|
||
# boundary_credential_library_vault (Resource) | ||
|
||
The credential library for Vault resource allows you to configure a Boundary credential library for Vault. | ||
|
||
## Example Usage | ||
|
||
```terraform | ||
resource "boundary_scope" "org" { | ||
name = "organization_one" | ||
description = "My first scope!" | ||
scope_id = "global" | ||
auto_create_admin_role = true | ||
auto_create_default_role = true | ||
} | ||
resource "boundary_scope" "project" { | ||
name = "project_one" | ||
description = "My first scope!" | ||
scope_id = boundary_scope.org.id | ||
auto_create_admin_role = true | ||
} | ||
resource "boundary_credential_store_vault" "example" { | ||
name = "vault_store" | ||
description = "My first Vault credential store!" | ||
address = "http://localhost:55001" | ||
token = "s.0ufRo6XEGU2jOqnIr7OlFYP5" | ||
scope_id = boundary_scope.project.id | ||
} | ||
resource "boundary_credential_library_vault" "example" { | ||
name = "vault_library" | ||
description = "My first Vault credential library!" | ||
credential_store_id = boundary_credential_store_vault.example.id | ||
vault_path = "database/creds/opened" | ||
http_method = "GET" | ||
} | ||
``` | ||
|
||
<!-- schema generated by tfplugindocs --> | ||
## Schema | ||
|
||
### Required | ||
|
||
- **credential_store_id** (String) The ID of the credential store that this library belongs to. | ||
- **vault_path** (String) The Vault path to query | ||
|
||
### Optional | ||
|
||
- **description** (String) The Vault credential library description. | ||
- **http_method** (String) The HTTP method to use when contacting Vault | ||
- **http_request_body** (String) The raw string to use in HTTP request to Vault | ||
- **name** (String) The Vault credential library name. Defaults to the resource name. | ||
|
||
### Read-Only | ||
|
||
- **id** (String) The ID of the Vault credential library. | ||
|
||
## Import | ||
|
||
Import is supported using the following syntax: | ||
|
||
```shell | ||
terraform import boundary_credential_library_vault.foo <my-id> | ||
``` |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,72 @@ | ||
--- | ||
# generated by https://github.com/hashicorp/terraform-plugin-docs | ||
page_title: "boundary_credential_store_vault Resource - terraform-provider-boundary" | ||
subcategory: "" | ||
description: |- | ||
The credential store for Vault resource allows you to configure a Boundary credential store for Vault. | ||
--- | ||
|
||
# boundary_credential_store_vault (Resource) | ||
|
||
The credential store for Vault resource allows you to configure a Boundary credential store for Vault. | ||
|
||
## Example Usage | ||
|
||
```terraform | ||
resource "boundary_scope" "org" { | ||
name = "organization_one" | ||
description = "My first scope!" | ||
scope_id = "global" | ||
auto_create_admin_role = true | ||
auto_create_default_role = true | ||
} | ||
resource "boundary_scope" "project" { | ||
name = "project_one" | ||
description = "My first scope!" | ||
scope_id = boundary_scope.org.id | ||
auto_create_admin_role = true | ||
} | ||
resource "boundary_credential_store_vault" "example" { | ||
name = "vault_store" | ||
description = "My first Vault credential store!" | ||
address = "http://localhost:55001" | ||
token = "s.0ufRo6XEGU2jOqnIr7OlFYP5" | ||
scope_id = boundary_scope.project.id | ||
} | ||
``` | ||
|
||
<!-- schema generated by tfplugindocs --> | ||
## Schema | ||
|
||
### Required | ||
|
||
- **address** (String) The address to Vault server | ||
- **scope_id** (String) The scope for this credential store | ||
- **token** (String) The Vault token | ||
|
||
### Optional | ||
|
||
- **ca_cert** (String) The Vault CA certificate to use | ||
- **client_certificate** (String) The Vault client certificate | ||
- **client_certificate_key** (String) The Vault client certificate key | ||
- **description** (String) The Vault credential store description. | ||
- **name** (String) The Vault credential store name. Defaults to the resource name. | ||
- **namespace** (String) The namespace within Vault to use | ||
- **tls_server_name** (String) The Vault TLS server name | ||
- **tls_skip_verify** (Boolean) Whether or not to skip TLS verification | ||
|
||
### Read-Only | ||
|
||
- **client_certificate_key_hmac** (String) The Vault client certificate key hmac | ||
- **id** (String) The ID of the Vault credential store. | ||
- **token_hmac** (String) The Vault token hmac | ||
|
||
## Import | ||
|
||
Import is supported using the following syntax: | ||
|
||
```shell | ||
terraform import boundary_credential_store_vault.foo <my-id> | ||
``` |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1 @@ | ||
terraform import boundary_credential_library_vault.foo <my-id> |
30 changes: 30 additions & 0 deletions
30
examples/resources/boundary_credential_library_vault/resource.tf
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,30 @@ | ||
resource "boundary_scope" "org" { | ||
name = "organization_one" | ||
description = "My first scope!" | ||
scope_id = "global" | ||
auto_create_admin_role = true | ||
auto_create_default_role = true | ||
} | ||
|
||
resource "boundary_scope" "project" { | ||
name = "project_one" | ||
description = "My first scope!" | ||
scope_id = boundary_scope.org.id | ||
auto_create_admin_role = true | ||
} | ||
|
||
resource "boundary_credential_store_vault" "example" { | ||
name = "vault_store" | ||
description = "My first Vault credential store!" | ||
address = "http://localhost:55001" | ||
token = "s.0ufRo6XEGU2jOqnIr7OlFYP5" | ||
scope_id = boundary_scope.project.id | ||
} | ||
|
||
resource "boundary_credential_library_vault" "example" { | ||
name = "vault_library" | ||
description = "My first Vault credential library!" | ||
credential_store_id = boundary_credential_store_vault.example.id | ||
vault_path = "database/creds/opened" | ||
http_method = "GET" | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1 @@ | ||
terraform import boundary_credential_store_vault.foo <my-id> |
22 changes: 22 additions & 0 deletions
22
examples/resources/boundary_credential_store_vault/resource.tf
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,22 @@ | ||
resource "boundary_scope" "org" { | ||
name = "organization_one" | ||
description = "My first scope!" | ||
scope_id = "global" | ||
auto_create_admin_role = true | ||
auto_create_default_role = true | ||
} | ||
|
||
resource "boundary_scope" "project" { | ||
name = "project_one" | ||
description = "My first scope!" | ||
scope_id = boundary_scope.org.id | ||
auto_create_admin_role = true | ||
} | ||
|
||
resource "boundary_credential_store_vault" "example" { | ||
name = "vault_store" | ||
description = "My first Vault credential store!" | ||
address = "http://localhost:55001" | ||
token = "s.0ufRo6XEGU2jOqnIr7OlFYP5" | ||
scope_id = boundary_scope.project.id | ||
} |