Skip to content

Commit

Permalink
Merge pull request #119 from hashicorp/sync-public-and-internal-provider
Browse files Browse the repository at this point in the history
[auto] Sync with Public Provider
  • Loading branch information
aidan-mundy committed Sep 15, 2023
2 parents 55dcd84 + 77d12ab commit 56416ec
Show file tree
Hide file tree
Showing 17 changed files with 1,213 additions and 115 deletions.
4 changes: 4 additions & 0 deletions contributing/writing-tests.md
Original file line number Diff line number Diff line change
Expand Up @@ -67,6 +67,10 @@ write the regular expression.

For advanced developers, the acceptance testing framework accepts some additional environment variables that can be used to control Terraform CLI binary selection, logging, and other behaviors. See the [Extending Terraform documentation](https://www.terraform.io/docs/extend/testing/acceptance-tests/index.html#environment-variables) for more information.

```sh
export TF_LOG=...
```

## Writing an Acceptance Test

Terraform has a framework for writing acceptance tests which minimizes the
Expand Down
17 changes: 17 additions & 0 deletions docs/data-sources/vault_cluster.md
Original file line number Diff line number Diff line change
Expand Up @@ -70,7 +70,16 @@ Optional:

Read-Only:

- `cloudwatch_access_key_id` (String) CloudWatch access key ID for streaming audit logs
- `cloudwatch_group_name` (String) CloudWatch group name of the target log stream for audit logs
- `cloudwatch_region` (String) CloudWatch region for streaming audit logs
- `cloudwatch_secret_access_key` (String) CloudWatch secret access key for streaming audit logs
- `cloudwatch_stream_name` (String) CloudWatch stream name for the target log stream for audit logs
- `datadog_region` (String) Datadog region for streaming audit logs
- `elasticsearch_dataset` (String) ElasticSearch dataset for streaming audit logs
- `elasticsearch_endpoint` (String) ElasticSearch endpoint for streaming audit logs
- `elasticsearch_password` (String) ElasticSearch password for streaming audit logs
- `elasticsearch_user` (String) ElasticSearch user for streaming audit logs
- `grafana_endpoint` (String) Grafana endpoint for streaming audit logs
- `grafana_user` (String) Grafana user for streaming audit logs
- `splunk_hecendpoint` (String) Splunk endpoint for streaming audit logs
Expand All @@ -91,7 +100,15 @@ Read-Only:

Read-Only:

- `cloudwatch_access_key_id` (String) CloudWatch access key ID for streaming metrics
- `cloudwatch_namespace` (String) CloudWatch namespace for streaming metrics
- `cloudwatch_region` (String) CloudWatch region for streaming metrics
- `cloudwatch_secret_access_key` (String) CloudWatch secret access key for streaming metrics
- `datadog_region` (String) Datadog region for streaming metrics
- `elasticsearch_dataset` (String) ElasticSearch dataset for streaming metrics
- `elasticsearch_endpoint` (String) ElasticSearch endpoint for streaming metrics
- `elasticsearch_password` (String) ElasticSearch password for streaming metrics
- `elasticsearch_user` (String) ElasticSearch user for streaming metrics
- `grafana_endpoint` (String) Grafana endpoint for streaming metrics
- `grafana_user` (String) Grafana user for streaming metrics
- `splunk_hecendpoint` (String) Splunk endpoint for streaming metrics
40 changes: 40 additions & 0 deletions docs/data-sources/vault_plugin.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,40 @@
---
# generated by https://github.com/hashicorp/terraform-plugin-docs
page_title: "hcp_vault_plugin Data Source - terraform-provider-hcp"
subcategory: ""
description: |-
The Vault plugin data source provides information about an existing HCP Vault plugin
---

# hcp_vault_plugin (Data Source)

The Vault plugin data source provides information about an existing HCP Vault plugin



<!-- schema generated by tfplugindocs -->
## Schema

### Required

- `cluster_id` (String) The ID of the HCP Vault cluster.
- `plugin_name` (String) The name of the plugin - Valid options for plugin name - 'venafi-pki-backend'
- `plugin_type` (String) The type of the plugin - Valid options for plugin type - 'SECRET', 'AUTH', 'DATABASE'

### Optional

- `project_id` (String) The ID of the HCP project where the HCP Vault cluster is located.
If not specified, the project specified in the HCP Provider config block will be used, if configured.
If a project is not configured in the HCP Provider config block, the oldest project in the organization will be used.
- `timeouts` (Block, Optional) (see [below for nested schema](#nestedblock--timeouts))

### Read-Only

- `id` (String) The ID of this resource.

<a id="nestedblock--timeouts"></a>
### Nested Schema for `timeouts`

Optional:

- `default` (String)
23 changes: 23 additions & 0 deletions docs/resources/vault_cluster.md
Original file line number Diff line number Diff line change
Expand Up @@ -83,14 +83,26 @@ If a project is not configured in the HCP Provider config block, the oldest proj

Optional:

- `cloudwatch_access_key_id` (String) CloudWatch access key ID for streaming audit logs
- `cloudwatch_region` (String) CloudWatch region for streaming audit logs
- `cloudwatch_secret_access_key` (String, Sensitive) CloudWatch secret access key for streaming audit logs
- `datadog_api_key` (String, Sensitive) Datadog api key for streaming audit logs
- `datadog_region` (String) Datadog region for streaming audit logs
- `elasticsearch_endpoint` (String) ElasticSearch endpoint for streaming audit logs
- `elasticsearch_password` (String, Sensitive) ElasticSearch password for streaming audit logs
- `elasticsearch_user` (String) ElasticSearch user for streaming audit logs
- `grafana_endpoint` (String) Grafana endpoint for streaming audit logs
- `grafana_password` (String, Sensitive) Grafana password for streaming audit logs
- `grafana_user` (String) Grafana user for streaming audit logs
- `splunk_hecendpoint` (String) Splunk endpoint for streaming audit logs
- `splunk_token` (String, Sensitive) Splunk token for streaming audit logs

Read-Only:

- `cloudwatch_group_name` (String) CloudWatch group name of the target log stream for audit logs
- `cloudwatch_stream_name` (String) CloudWatch stream name for the target log stream for audit logs
- `elasticsearch_dataset` (String) ElasticSearch dataset for streaming audit logs


<a id="nestedblock--major_version_upgrade_config"></a>
### Nested Schema for `major_version_upgrade_config`
Expand All @@ -110,14 +122,25 @@ Optional:

Optional:

- `cloudwatch_access_key_id` (String) CloudWatch access key ID for streaming metrics
- `cloudwatch_region` (String) CloudWatch region for streaming metrics
- `cloudwatch_secret_access_key` (String, Sensitive) CloudWatch secret access key for streaming metrics
- `datadog_api_key` (String, Sensitive) Datadog api key for streaming metrics
- `datadog_region` (String) Datadog region for streaming metrics
- `elasticsearch_endpoint` (String) ElasticSearch endpoint for streaming metrics
- `elasticsearch_password` (String, Sensitive) ElasticSearch password for streaming metrics
- `elasticsearch_user` (String) ElasticSearch user for streaming metrics
- `grafana_endpoint` (String) Grafana endpoint for streaming metrics
- `grafana_password` (String, Sensitive) Grafana password for streaming metrics
- `grafana_user` (String) Grafana user for streaming metrics
- `splunk_hecendpoint` (String) Splunk endpoint for streaming metrics
- `splunk_token` (String, Sensitive) Splunk token for streaming metrics

Read-Only:

- `cloudwatch_namespace` (String) CloudWatch namespace for streaming metrics
- `elasticsearch_dataset` (String) ElasticSearch dataset for streaming metrics


<a id="nestedblock--timeouts"></a>
### Nested Schema for `timeouts`
Expand Down
40 changes: 40 additions & 0 deletions docs/resources/vault_plugin.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,40 @@
---
# generated by https://github.com/hashicorp/terraform-plugin-docs
page_title: "hcp_vault_plugin Resource - terraform-provider-hcp"
subcategory: ""
description: |-
The Vault plugin resource allows you to manage an HCP Vault plugin.
---

# hcp_vault_plugin (Resource)

The Vault plugin resource allows you to manage an HCP Vault plugin.



<!-- schema generated by tfplugindocs -->
## Schema

### Required

- `cluster_id` (String) The ID of the HCP Vault cluster.
- `plugin_name` (String) The name of the plugin - Valid options for plugin name - 'venafi-pki-backend'
- `plugin_type` (String) The type of the plugin - Valid options for plugin type - 'SECRET', 'AUTH', 'DATABASE'

### Optional

- `project_id` (String) The ID of the HCP project where the HCP Vault cluster is located.
If not specified, the project specified in the HCP Provider config block will be used, if configured.
If a project is not configured in the HCP Provider config block, the oldest project in the organization will be used.
- `timeouts` (Block, Optional) (see [below for nested schema](#nestedblock--timeouts))

### Read-Only

- `id` (String) The ID of this resource.

<a id="nestedblock--timeouts"></a>
### Nested Schema for `timeouts`

Optional:

- `default` (String)
24 changes: 12 additions & 12 deletions go.mod
Original file line number Diff line number Diff line change
Expand Up @@ -6,16 +6,16 @@ require (
github.com/cenkalti/backoff v2.2.1+incompatible
github.com/go-openapi/runtime v0.26.0
github.com/go-openapi/strfmt v0.21.7
github.com/google/uuid v1.3.0
github.com/google/uuid v1.3.1
github.com/hashicorp/go-cty v1.4.1-0.20200414143053-d3edf31b6320
github.com/hashicorp/go-uuid v1.0.3
github.com/hashicorp/go-version v1.6.0
github.com/hashicorp/hcp-sdk-go v0.59.0
github.com/hashicorp/hcp-sdk-go v0.61.0
github.com/hashicorp/terraform-plugin-docs v0.16.0
github.com/hashicorp/terraform-plugin-sdk/v2 v2.27.0
github.com/hashicorp/terraform-plugin-sdk/v2 v2.28.0
github.com/stretchr/testify v1.8.4
golang.org/x/exp v0.0.0-20230626212559-97b1e661b5df
google.golang.org/grpc v1.57.0
google.golang.org/grpc v1.58.0
)

require (
Expand Down Expand Up @@ -54,7 +54,7 @@ require (
github.com/hashicorp/logutils v1.0.0 // indirect
github.com/hashicorp/terraform-exec v0.18.1 // indirect
github.com/hashicorp/terraform-json v0.17.1 // indirect
github.com/hashicorp/terraform-plugin-go v0.16.0 // indirect
github.com/hashicorp/terraform-plugin-go v0.18.0 // indirect
github.com/hashicorp/terraform-plugin-log v0.9.0 // indirect
github.com/hashicorp/terraform-registry-address v0.2.1 // indirect
github.com/hashicorp/terraform-svchost v0.1.1 // indirect
Expand Down Expand Up @@ -89,15 +89,15 @@ require (
go.mongodb.org/mongo-driver v1.11.7 // indirect
go.opentelemetry.io/otel v1.14.0 // indirect
go.opentelemetry.io/otel/trace v1.14.0 // indirect
golang.org/x/crypto v0.10.0 // indirect
golang.org/x/crypto v0.12.0 // indirect
golang.org/x/mod v0.11.0 // indirect
golang.org/x/net v0.11.0 // indirect
golang.org/x/oauth2 v0.7.0 // indirect
golang.org/x/sys v0.9.0 // indirect
golang.org/x/text v0.11.0 // indirect
golang.org/x/net v0.12.0 // indirect
golang.org/x/oauth2 v0.10.0 // indirect
golang.org/x/sys v0.11.0 // indirect
golang.org/x/text v0.12.0 // indirect
google.golang.org/appengine v1.6.7 // indirect
google.golang.org/genproto/googleapis/rpc v0.0.0-20230525234030-28d5490b6b19 // indirect
google.golang.org/protobuf v1.30.0 // indirect
google.golang.org/genproto/googleapis/rpc v0.0.0-20230711160842-782d3b101e98 // indirect
google.golang.org/protobuf v1.31.0 // indirect
gopkg.in/yaml.v2 v2.4.0 // indirect
gopkg.in/yaml.v3 v3.0.1 // indirect
)
Loading

0 comments on commit 56416ec

Please sign in to comment.