openstack.identity.Ec2CredentialV3
Explore with Pulumi AI
Import
EC2 Credentials can be imported using the access
, e.g.
$ pulumi import openstack:identity/ec2CredentialV3:Ec2CredentialV3 ec2_cred_1 2d0ac4a2f81b4b0f9513ee49e780647d
Example Usage
EC2 credential in current project scope
using System.Collections.Generic;
using Pulumi;
using OpenStack = Pulumi.OpenStack;
return await Deployment.RunAsync(() =>
{
var ec2Key1 = new OpenStack.Identity.Ec2CredentialV3("ec2Key1");
});
package main
import (
"github.com/pulumi/pulumi-openstack/sdk/v3/go/openstack/identity"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := identity.NewEc2CredentialV3(ctx, "ec2Key1", nil)
if err != nil {
return err
}
return nil
})
}
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.openstack.identity.Ec2CredentialV3;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var ec2Key1 = new Ec2CredentialV3("ec2Key1");
}
}
import pulumi
import pulumi_openstack as openstack
ec2_key1 = openstack.identity.Ec2CredentialV3("ec2Key1")
import * as pulumi from "@pulumi/pulumi";
import * as openstack from "@pulumi/openstack";
const ec2Key1 = new openstack.identity.Ec2CredentialV3("ec2Key1", {});
resources:
ec2Key1:
type: openstack:identity:Ec2CredentialV3
EC2 credential in pre-defined project scope
using System.Collections.Generic;
using Pulumi;
using OpenStack = Pulumi.OpenStack;
return await Deployment.RunAsync(() =>
{
var ec2Key1 = new OpenStack.Identity.Ec2CredentialV3("ec2Key1", new()
{
ProjectId = "f7ac731cc11f40efbc03a9f9e1d1d21f",
});
});
package main
import (
"github.com/pulumi/pulumi-openstack/sdk/v3/go/openstack/identity"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := identity.NewEc2CredentialV3(ctx, "ec2Key1", &identity.Ec2CredentialV3Args{
ProjectId: pulumi.String("f7ac731cc11f40efbc03a9f9e1d1d21f"),
})
if err != nil {
return err
}
return nil
})
}
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.openstack.identity.Ec2CredentialV3;
import com.pulumi.openstack.identity.Ec2CredentialV3Args;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var ec2Key1 = new Ec2CredentialV3("ec2Key1", Ec2CredentialV3Args.builder()
.projectId("f7ac731cc11f40efbc03a9f9e1d1d21f")
.build());
}
}
import pulumi
import pulumi_openstack as openstack
ec2_key1 = openstack.identity.Ec2CredentialV3("ec2Key1", project_id="f7ac731cc11f40efbc03a9f9e1d1d21f")
import * as pulumi from "@pulumi/pulumi";
import * as openstack from "@pulumi/openstack";
const ec2Key1 = new openstack.identity.Ec2CredentialV3("ec2Key1", {projectId: "f7ac731cc11f40efbc03a9f9e1d1d21f"});
resources:
ec2Key1:
type: openstack:identity:Ec2CredentialV3
properties:
projectId: f7ac731cc11f40efbc03a9f9e1d1d21f
Create Ec2CredentialV3 Resource
new Ec2CredentialV3(name: string, args?: Ec2CredentialV3Args, opts?: CustomResourceOptions);
@overload
def Ec2CredentialV3(resource_name: str,
opts: Optional[ResourceOptions] = None,
project_id: Optional[str] = None,
region: Optional[str] = None,
user_id: Optional[str] = None)
@overload
def Ec2CredentialV3(resource_name: str,
args: Optional[Ec2CredentialV3Args] = None,
opts: Optional[ResourceOptions] = None)
func NewEc2CredentialV3(ctx *Context, name string, args *Ec2CredentialV3Args, opts ...ResourceOption) (*Ec2CredentialV3, error)
public Ec2CredentialV3(string name, Ec2CredentialV3Args? args = null, CustomResourceOptions? opts = null)
public Ec2CredentialV3(String name, Ec2CredentialV3Args args)
public Ec2CredentialV3(String name, Ec2CredentialV3Args args, CustomResourceOptions options)
type: openstack:identity:Ec2CredentialV3
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args Ec2CredentialV3Args
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args Ec2CredentialV3Args
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args Ec2CredentialV3Args
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args Ec2CredentialV3Args
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args Ec2CredentialV3Args
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Ec2CredentialV3 Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
The Ec2CredentialV3 resource accepts the following input properties:
- Project
Id string The ID of the project the EC2 credential is created for and that authentication requests using this EC2 credential will be scoped to. Only administrative users can specify a project ID different from the current auth scope.
- Region string
The region in which to obtain the V3 Keystone client. If omitted, the
region
argument of the provider is used. Changing this creates a new EC2 credential.- User
Id string The ID of the user the EC2 credential is created for. Only administrative users can specify a user ID different from the current auth scope.
- Project
Id string The ID of the project the EC2 credential is created for and that authentication requests using this EC2 credential will be scoped to. Only administrative users can specify a project ID different from the current auth scope.
- Region string
The region in which to obtain the V3 Keystone client. If omitted, the
region
argument of the provider is used. Changing this creates a new EC2 credential.- User
Id string The ID of the user the EC2 credential is created for. Only administrative users can specify a user ID different from the current auth scope.
- project
Id String The ID of the project the EC2 credential is created for and that authentication requests using this EC2 credential will be scoped to. Only administrative users can specify a project ID different from the current auth scope.
- region String
The region in which to obtain the V3 Keystone client. If omitted, the
region
argument of the provider is used. Changing this creates a new EC2 credential.- user
Id String The ID of the user the EC2 credential is created for. Only administrative users can specify a user ID different from the current auth scope.
- project
Id string The ID of the project the EC2 credential is created for and that authentication requests using this EC2 credential will be scoped to. Only administrative users can specify a project ID different from the current auth scope.
- region string
The region in which to obtain the V3 Keystone client. If omitted, the
region
argument of the provider is used. Changing this creates a new EC2 credential.- user
Id string The ID of the user the EC2 credential is created for. Only administrative users can specify a user ID different from the current auth scope.
- project_
id str The ID of the project the EC2 credential is created for and that authentication requests using this EC2 credential will be scoped to. Only administrative users can specify a project ID different from the current auth scope.
- region str
The region in which to obtain the V3 Keystone client. If omitted, the
region
argument of the provider is used. Changing this creates a new EC2 credential.- user_
id str The ID of the user the EC2 credential is created for. Only administrative users can specify a user ID different from the current auth scope.
- project
Id String The ID of the project the EC2 credential is created for and that authentication requests using this EC2 credential will be scoped to. Only administrative users can specify a project ID different from the current auth scope.
- region String
The region in which to obtain the V3 Keystone client. If omitted, the
region
argument of the provider is used. Changing this creates a new EC2 credential.- user
Id String The ID of the user the EC2 credential is created for. Only administrative users can specify a user ID different from the current auth scope.
Outputs
All input properties are implicitly available as output properties. Additionally, the Ec2CredentialV3 resource produces the following output properties:
Look up Existing Ec2CredentialV3 Resource
Get an existing Ec2CredentialV3 resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: Ec2CredentialV3State, opts?: CustomResourceOptions): Ec2CredentialV3
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
access: Optional[str] = None,
project_id: Optional[str] = None,
region: Optional[str] = None,
secret: Optional[str] = None,
trust_id: Optional[str] = None,
user_id: Optional[str] = None) -> Ec2CredentialV3
func GetEc2CredentialV3(ctx *Context, name string, id IDInput, state *Ec2CredentialV3State, opts ...ResourceOption) (*Ec2CredentialV3, error)
public static Ec2CredentialV3 Get(string name, Input<string> id, Ec2CredentialV3State? state, CustomResourceOptions? opts = null)
public static Ec2CredentialV3 get(String name, Output<String> id, Ec2CredentialV3State state, CustomResourceOptions options)
Resource lookup is not supported in YAML
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Access string
contains an EC2 credential access UUID
- Project
Id string The ID of the project the EC2 credential is created for and that authentication requests using this EC2 credential will be scoped to. Only administrative users can specify a project ID different from the current auth scope.
- Region string
The region in which to obtain the V3 Keystone client. If omitted, the
region
argument of the provider is used. Changing this creates a new EC2 credential.- Secret string
contains an EC2 credential secret UUID
- Trust
Id string contains an EC2 credential trust ID scope
- User
Id string The ID of the user the EC2 credential is created for. Only administrative users can specify a user ID different from the current auth scope.
- Access string
contains an EC2 credential access UUID
- Project
Id string The ID of the project the EC2 credential is created for and that authentication requests using this EC2 credential will be scoped to. Only administrative users can specify a project ID different from the current auth scope.
- Region string
The region in which to obtain the V3 Keystone client. If omitted, the
region
argument of the provider is used. Changing this creates a new EC2 credential.- Secret string
contains an EC2 credential secret UUID
- Trust
Id string contains an EC2 credential trust ID scope
- User
Id string The ID of the user the EC2 credential is created for. Only administrative users can specify a user ID different from the current auth scope.
- access String
contains an EC2 credential access UUID
- project
Id String The ID of the project the EC2 credential is created for and that authentication requests using this EC2 credential will be scoped to. Only administrative users can specify a project ID different from the current auth scope.
- region String
The region in which to obtain the V3 Keystone client. If omitted, the
region
argument of the provider is used. Changing this creates a new EC2 credential.- secret String
contains an EC2 credential secret UUID
- trust
Id String contains an EC2 credential trust ID scope
- user
Id String The ID of the user the EC2 credential is created for. Only administrative users can specify a user ID different from the current auth scope.
- access string
contains an EC2 credential access UUID
- project
Id string The ID of the project the EC2 credential is created for and that authentication requests using this EC2 credential will be scoped to. Only administrative users can specify a project ID different from the current auth scope.
- region string
The region in which to obtain the V3 Keystone client. If omitted, the
region
argument of the provider is used. Changing this creates a new EC2 credential.- secret string
contains an EC2 credential secret UUID
- trust
Id string contains an EC2 credential trust ID scope
- user
Id string The ID of the user the EC2 credential is created for. Only administrative users can specify a user ID different from the current auth scope.
- access str
contains an EC2 credential access UUID
- project_
id str The ID of the project the EC2 credential is created for and that authentication requests using this EC2 credential will be scoped to. Only administrative users can specify a project ID different from the current auth scope.
- region str
The region in which to obtain the V3 Keystone client. If omitted, the
region
argument of the provider is used. Changing this creates a new EC2 credential.- secret str
contains an EC2 credential secret UUID
- trust_
id str contains an EC2 credential trust ID scope
- user_
id str The ID of the user the EC2 credential is created for. Only administrative users can specify a user ID different from the current auth scope.
- access String
contains an EC2 credential access UUID
- project
Id String The ID of the project the EC2 credential is created for and that authentication requests using this EC2 credential will be scoped to. Only administrative users can specify a project ID different from the current auth scope.
- region String
The region in which to obtain the V3 Keystone client. If omitted, the
region
argument of the provider is used. Changing this creates a new EC2 credential.- secret String
contains an EC2 credential secret UUID
- trust
Id String contains an EC2 credential trust ID scope
- user
Id String The ID of the user the EC2 credential is created for. Only administrative users can specify a user ID different from the current auth scope.
Package Details
- Repository
- OpenStack pulumi/pulumi-openstack
- License
- Apache-2.0
- Notes
This Pulumi package is based on the
openstack
Terraform Provider.