openstack.identity.Ec2CredentialV3
Explore with Pulumi AI
Manages a V3 EC2 Credential resource within OpenStack Keystone. EC2 credentials in OpenStack are used to access S3 compatible Swift/RadosGW endpoints or to authenticate against Keystone.
Note: All arguments including the EC2 credential access key and secret will be stored in the raw state as plain-text. Read more about sensitive data in state.
Example Usage
EC2 credential in current project scope
import * as pulumi from "@pulumi/pulumi";
import * as openstack from "@pulumi/openstack";
const ec2Key1 = new openstack.identity.Ec2CredentialV3("ec2_key1", {});
import pulumi
import pulumi_openstack as openstack
ec2_key1 = openstack.identity.Ec2CredentialV3("ec2_key1")
package main
import (
"github.com/pulumi/pulumi-openstack/sdk/v4/go/openstack/identity"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := identity.NewEc2CredentialV3(ctx, "ec2_key1", nil)
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using OpenStack = Pulumi.OpenStack;
return await Deployment.RunAsync(() =>
{
var ec2Key1 = new OpenStack.Identity.Ec2CredentialV3("ec2_key1");
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.openstack.identity.Ec2CredentialV3;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var ec2Key1 = new Ec2CredentialV3("ec2Key1");
}
}
resources:
ec2Key1:
type: openstack:identity:Ec2CredentialV3
name: ec2_key1
EC2 credential in pre-defined project scope
This allows administrative users to create EC2 credentials for a scope different from the current auth scope.
import * as pulumi from "@pulumi/pulumi";
import * as openstack from "@pulumi/openstack";
const ec2Key1 = new openstack.identity.Ec2CredentialV3("ec2_key1", {projectId: "f7ac731cc11f40efbc03a9f9e1d1d21f"});
import pulumi
import pulumi_openstack as openstack
ec2_key1 = openstack.identity.Ec2CredentialV3("ec2_key1", project_id="f7ac731cc11f40efbc03a9f9e1d1d21f")
package main
import (
"github.com/pulumi/pulumi-openstack/sdk/v4/go/openstack/identity"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := identity.NewEc2CredentialV3(ctx, "ec2_key1", &identity.Ec2CredentialV3Args{
ProjectId: pulumi.String("f7ac731cc11f40efbc03a9f9e1d1d21f"),
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using OpenStack = Pulumi.OpenStack;
return await Deployment.RunAsync(() =>
{
var ec2Key1 = new OpenStack.Identity.Ec2CredentialV3("ec2_key1", new()
{
ProjectId = "f7ac731cc11f40efbc03a9f9e1d1d21f",
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.openstack.identity.Ec2CredentialV3;
import com.pulumi.openstack.identity.Ec2CredentialV3Args;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var ec2Key1 = new Ec2CredentialV3("ec2Key1", Ec2CredentialV3Args.builder()
.projectId("f7ac731cc11f40efbc03a9f9e1d1d21f")
.build());
}
}
resources:
ec2Key1:
type: openstack:identity:Ec2CredentialV3
name: ec2_key1
properties:
projectId: f7ac731cc11f40efbc03a9f9e1d1d21f
Create Ec2CredentialV3 Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new Ec2CredentialV3(name: string, args?: Ec2CredentialV3Args, opts?: CustomResourceOptions);
@overload
def Ec2CredentialV3(resource_name: str,
args: Optional[Ec2CredentialV3Args] = None,
opts: Optional[ResourceOptions] = None)
@overload
def Ec2CredentialV3(resource_name: str,
opts: Optional[ResourceOptions] = None,
project_id: Optional[str] = None,
region: Optional[str] = None,
user_id: Optional[str] = None)
func NewEc2CredentialV3(ctx *Context, name string, args *Ec2CredentialV3Args, opts ...ResourceOption) (*Ec2CredentialV3, error)
public Ec2CredentialV3(string name, Ec2CredentialV3Args? args = null, CustomResourceOptions? opts = null)
public Ec2CredentialV3(String name, Ec2CredentialV3Args args)
public Ec2CredentialV3(String name, Ec2CredentialV3Args args, CustomResourceOptions options)
type: openstack:identity:Ec2CredentialV3
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args Ec2CredentialV3Args
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args Ec2CredentialV3Args
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args Ec2CredentialV3Args
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args Ec2CredentialV3Args
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args Ec2CredentialV3Args
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var ec2CredentialV3Resource = new OpenStack.Identity.Ec2CredentialV3("ec2CredentialV3Resource", new()
{
ProjectId = "string",
Region = "string",
UserId = "string",
});
example, err := identity.NewEc2CredentialV3(ctx, "ec2CredentialV3Resource", &identity.Ec2CredentialV3Args{
ProjectId: pulumi.String("string"),
Region: pulumi.String("string"),
UserId: pulumi.String("string"),
})
var ec2CredentialV3Resource = new Ec2CredentialV3("ec2CredentialV3Resource", Ec2CredentialV3Args.builder()
.projectId("string")
.region("string")
.userId("string")
.build());
ec2_credential_v3_resource = openstack.identity.Ec2CredentialV3("ec2CredentialV3Resource",
project_id="string",
region="string",
user_id="string")
const ec2CredentialV3Resource = new openstack.identity.Ec2CredentialV3("ec2CredentialV3Resource", {
projectId: "string",
region: "string",
userId: "string",
});
type: openstack:identity:Ec2CredentialV3
properties:
projectId: string
region: string
userId: string
Ec2CredentialV3 Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
The Ec2CredentialV3 resource accepts the following input properties:
- Project
Id string - The ID of the project the EC2 credential is created for and that authentication requests using this EC2 credential will be scoped to. Only administrative users can specify a project ID different from the current auth scope.
- Region string
- The region in which to obtain the V3 Keystone client.
If omitted, the
region
argument of the provider is used. Changing this creates a new EC2 credential. - User
Id string - The ID of the user the EC2 credential is created for. Only administrative users can specify a user ID different from the current auth scope.
- Project
Id string - The ID of the project the EC2 credential is created for and that authentication requests using this EC2 credential will be scoped to. Only administrative users can specify a project ID different from the current auth scope.
- Region string
- The region in which to obtain the V3 Keystone client.
If omitted, the
region
argument of the provider is used. Changing this creates a new EC2 credential. - User
Id string - The ID of the user the EC2 credential is created for. Only administrative users can specify a user ID different from the current auth scope.
- project
Id String - The ID of the project the EC2 credential is created for and that authentication requests using this EC2 credential will be scoped to. Only administrative users can specify a project ID different from the current auth scope.
- region String
- The region in which to obtain the V3 Keystone client.
If omitted, the
region
argument of the provider is used. Changing this creates a new EC2 credential. - user
Id String - The ID of the user the EC2 credential is created for. Only administrative users can specify a user ID different from the current auth scope.
- project
Id string - The ID of the project the EC2 credential is created for and that authentication requests using this EC2 credential will be scoped to. Only administrative users can specify a project ID different from the current auth scope.
- region string
- The region in which to obtain the V3 Keystone client.
If omitted, the
region
argument of the provider is used. Changing this creates a new EC2 credential. - user
Id string - The ID of the user the EC2 credential is created for. Only administrative users can specify a user ID different from the current auth scope.
- project_
id str - The ID of the project the EC2 credential is created for and that authentication requests using this EC2 credential will be scoped to. Only administrative users can specify a project ID different from the current auth scope.
- region str
- The region in which to obtain the V3 Keystone client.
If omitted, the
region
argument of the provider is used. Changing this creates a new EC2 credential. - user_
id str - The ID of the user the EC2 credential is created for. Only administrative users can specify a user ID different from the current auth scope.
- project
Id String - The ID of the project the EC2 credential is created for and that authentication requests using this EC2 credential will be scoped to. Only administrative users can specify a project ID different from the current auth scope.
- region String
- The region in which to obtain the V3 Keystone client.
If omitted, the
region
argument of the provider is used. Changing this creates a new EC2 credential. - user
Id String - The ID of the user the EC2 credential is created for. Only administrative users can specify a user ID different from the current auth scope.
Outputs
All input properties are implicitly available as output properties. Additionally, the Ec2CredentialV3 resource produces the following output properties:
Look up Existing Ec2CredentialV3 Resource
Get an existing Ec2CredentialV3 resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: Ec2CredentialV3State, opts?: CustomResourceOptions): Ec2CredentialV3
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
access: Optional[str] = None,
project_id: Optional[str] = None,
region: Optional[str] = None,
secret: Optional[str] = None,
trust_id: Optional[str] = None,
user_id: Optional[str] = None) -> Ec2CredentialV3
func GetEc2CredentialV3(ctx *Context, name string, id IDInput, state *Ec2CredentialV3State, opts ...ResourceOption) (*Ec2CredentialV3, error)
public static Ec2CredentialV3 Get(string name, Input<string> id, Ec2CredentialV3State? state, CustomResourceOptions? opts = null)
public static Ec2CredentialV3 get(String name, Output<String> id, Ec2CredentialV3State state, CustomResourceOptions options)
Resource lookup is not supported in YAML
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Access string
- contains an EC2 credential access UUID
- Project
Id string - The ID of the project the EC2 credential is created for and that authentication requests using this EC2 credential will be scoped to. Only administrative users can specify a project ID different from the current auth scope.
- Region string
- The region in which to obtain the V3 Keystone client.
If omitted, the
region
argument of the provider is used. Changing this creates a new EC2 credential. - Secret string
- contains an EC2 credential secret UUID
- Trust
Id string - contains an EC2 credential trust ID scope
- User
Id string - The ID of the user the EC2 credential is created for. Only administrative users can specify a user ID different from the current auth scope.
- Access string
- contains an EC2 credential access UUID
- Project
Id string - The ID of the project the EC2 credential is created for and that authentication requests using this EC2 credential will be scoped to. Only administrative users can specify a project ID different from the current auth scope.
- Region string
- The region in which to obtain the V3 Keystone client.
If omitted, the
region
argument of the provider is used. Changing this creates a new EC2 credential. - Secret string
- contains an EC2 credential secret UUID
- Trust
Id string - contains an EC2 credential trust ID scope
- User
Id string - The ID of the user the EC2 credential is created for. Only administrative users can specify a user ID different from the current auth scope.
- access String
- contains an EC2 credential access UUID
- project
Id String - The ID of the project the EC2 credential is created for and that authentication requests using this EC2 credential will be scoped to. Only administrative users can specify a project ID different from the current auth scope.
- region String
- The region in which to obtain the V3 Keystone client.
If omitted, the
region
argument of the provider is used. Changing this creates a new EC2 credential. - secret String
- contains an EC2 credential secret UUID
- trust
Id String - contains an EC2 credential trust ID scope
- user
Id String - The ID of the user the EC2 credential is created for. Only administrative users can specify a user ID different from the current auth scope.
- access string
- contains an EC2 credential access UUID
- project
Id string - The ID of the project the EC2 credential is created for and that authentication requests using this EC2 credential will be scoped to. Only administrative users can specify a project ID different from the current auth scope.
- region string
- The region in which to obtain the V3 Keystone client.
If omitted, the
region
argument of the provider is used. Changing this creates a new EC2 credential. - secret string
- contains an EC2 credential secret UUID
- trust
Id string - contains an EC2 credential trust ID scope
- user
Id string - The ID of the user the EC2 credential is created for. Only administrative users can specify a user ID different from the current auth scope.
- access str
- contains an EC2 credential access UUID
- project_
id str - The ID of the project the EC2 credential is created for and that authentication requests using this EC2 credential will be scoped to. Only administrative users can specify a project ID different from the current auth scope.
- region str
- The region in which to obtain the V3 Keystone client.
If omitted, the
region
argument of the provider is used. Changing this creates a new EC2 credential. - secret str
- contains an EC2 credential secret UUID
- trust_
id str - contains an EC2 credential trust ID scope
- user_
id str - The ID of the user the EC2 credential is created for. Only administrative users can specify a user ID different from the current auth scope.
- access String
- contains an EC2 credential access UUID
- project
Id String - The ID of the project the EC2 credential is created for and that authentication requests using this EC2 credential will be scoped to. Only administrative users can specify a project ID different from the current auth scope.
- region String
- The region in which to obtain the V3 Keystone client.
If omitted, the
region
argument of the provider is used. Changing this creates a new EC2 credential. - secret String
- contains an EC2 credential secret UUID
- trust
Id String - contains an EC2 credential trust ID scope
- user
Id String - The ID of the user the EC2 credential is created for. Only administrative users can specify a user ID different from the current auth scope.
Import
EC2 Credentials can be imported using the access
, e.g.
$ pulumi import openstack:identity/ec2CredentialV3:Ec2CredentialV3 ec2_cred_1 2d0ac4a2f81b4b0f9513ee49e780647d
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- OpenStack pulumi/pulumi-openstack
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
openstack
Terraform Provider.