terraform-provider-vault icon indicating copy to clipboard operation
terraform-provider-vault copied to clipboard

[New]: Ephemeral types and write-only support

Open drewmullen opened this issue 7 months ago • 4 comments
trafficstars

Description

Running list of all the requested enhancements for provider ephemerality. If one is missing, please comment below and ill add to the list. Thank you for kicking this issue off @xeivieni & @freddo3000 https://github.com/hashicorp/terraform-provider-vault/issues/2373#issue-2706016101

Ephemeral retrieves

These are data source like ephemeral resources that only retrieve secret info

  • [ ] vault_generic_secret
  • [ ] vault_aws_access_credentials
  • [ ] vault_aws_static_credentials
  • [ ] vault_azure_access_credentials
  • [ ] vault_kv_secret
  • [ ] vault_kv_secrets_list
  • [x] vault_kv_secret_v2
  • [ ] vault_kv_secrets_list_v2
  • [ ] vault_kv_subkeys_v2
  • [ ] vault_ldap_dynamic_credentials
  • [ ] vault_ldap_static_credentials
  • [ ] vault_nomad_access_token
  • [ ] vault_transform_decode
  • [ ] vault_transit_decrypt
  • [ ] vault_ad_access_credentials
  • [ ] vault_identity_oidc_client_creds
  • [ ] vault_kubernetes_service_account_token
  • [ ] vault_transform_decode
  • [ ] vault_transit_decrypt
  • [x] vault_database_secret

Ephemeral creates

These are resource like ephemeral resources that create and returns secret info

  • [ ] vault_generic_endpoint
  • [ ] vault_generic_secret
  • [ ] vault_pki_secret_backend_cert
  • [ ] vault_token
  • [ ] vault_approle_auth_backend_login
  • [ ] vault_aws_auth_backend_login
  • [ ] vault_pki_secret_backend_acme_eab
  • [ ] vault_pki_secret_backend_cert
  • [ ] vault_pki_secret_backend_intermediate_cert_request
  • [ ] vault_pki_secret_backend_sign
  • [ ] vault_ssh_secret_backend_sign
  • [ ] vault_transform_encode
  • [ ] vault_transit_encrypt
  • [ ] vault_transit_sign

Write-only

These are existing resources that need write-only support because they receive secret information from another source (variable or other resource/ds)

  • [ ] vault_terraform_cloud_secret_backend: issue link
  • [ ] vault_ad_secret_backend
  • [ ] vault_ldap_secret_backend_library_set
  • [ ] vault_alicloud_auth_backend_role
  • [ ] vault_aws_auth_backend_client
  • [ ] vault_aws_secret_backend
  • [ ] vault_azure_auth_backend_config
  • [ ] vault_azure_secret_backend
  • [ ] vault_consul_secret_backend
  • [x] vault_database_secret_backend_connection
  • [ ] vault_database_secret_backend_role
  • [ ] vault_database_secret_backend_static_role
  • [ ] vault_gcp_auth_backend
  • [x] vault_gcp_secret_backend
  • [ ] vault_jwt_auth_backend
  • [ ] vault_jwt_auth_backend_role: issue link
  • [ ] vault_kubernetes_auth_backend_config
  • [ ] vault_kubernetes_secret_backend
  • [ ] vault_ldap_auth_backend
  • [ ] vault_ldap_secret_backend
  • [ ] vault_mongodbatlas_secret_backend
  • [ ] vault_nomad_secret_backend
  • [ ] vault_okta_auth_backend
  • [ ] vault_pki_secret_backend_config_ca
  • [ ] vault_pki_secret_backend_key
  • [ ] vault_rabbitmq_secret_backend
  • [ ] vault_ssh_secret_backend_ca
  • [x] vault_kv_secret_v2: issue link

Request to community:

In order to prioritize these ephemeral resources, we would appreciate help creating and voting on specific resource GitHub issues. Please look through the issues to see if a issue exists for the corresponding resource, if it does, vote on it.

Note: If you are an enterprise customers please also forward the issue to your account rep.

If an issue does not exist, please create one and include the following info (example):

  1. resource type and desired new type
  2. parameters that are sensitive
  3. sample shape of final hcl

Once complete please include the issue in a comment below and ill add it to the description

Potential Terraform Configuration


References

No response

Would you like to implement a fix?

None

drewmullen avatar Apr 18 '25 14:04 drewmullen