-
Notifications
You must be signed in to change notification settings - Fork 50
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. Weβll occasionally send you account related emails.
Already on GitHub? Sign in to your account
HCPE-955: Vault resources #97
Conversation
stub out vault cluster CRUD and add timeouts add vault cluster resource schema add vault cluster admin token resource stub add vault cluster resource schema and CRUD stubs add created_at to vault cluster
output admin_token -> token so not redundant drop answered questions drop update add Read function for admin_token drop max_lease_ttl and move namespace to computed outputs tier can only be dev currently, so change to computed output fix tests initial_vault_version -> min_vault_version
add GetVaultClusterByID helper add CreateVaultCluster helper add DeleteVaultCluster helper add CreateVaultClusterAdminToken helper
into new input package to be shared across resources
add resourceVaultClusterCreate and setVaultClusterResourceData add resourceVaultClusterRead add resourceVaultClusterDelete
HCPE-980: Vault cluster resource
and update test
fix import
gen docs
add resourceVaultClusterAdminTokenCreate add resourceVaultClusterAdminTokenRead & Delete
update comments + change delete behavior
fix description add resource template + example .tf gen doc add adminTokenExpiry drop min_version from test tf regen docs
instead of calling Create, which entangled those two functions
58fd325
to
7d0bf5b
Compare
This resource saves a single admin token per Vault cluster and auto-refreshes the token when it is about to expire. | ||
Destroying this resource *does not* invalidate the admin token. | ||
|
||
~> **Known Issue** An admin token may be generated during a `terraform plan` if the current token is expiring. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Nice tips π
|
||
# Resource `hcp_vault_cluster_admin_token` | ||
|
||
~> **Important Security Notice** The admin token generated by this resource will |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is there a similar problem with Consul tokens @bcmdarroch ? π€
I thought it was encrypted.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It is but not in all cases: https://www.terraform.io/docs/language/state/sensitive-data.html
EPT-77 Change Code Owners to EPT Pod
π οΈ Description
Feature branch for the Vault resources:
hcp_vault_cluster
andhcp_vault_cluster_admin_token
π π β¨ποΈ Acceptance tests
Output from acceptance testing: