Skip to content

Commit

Permalink
Update docs for hashicorp#1166 (hashicorp#1396)
Browse files Browse the repository at this point in the history
  • Loading branch information
benashz authored and marcboudreau committed Nov 6, 2022
1 parent 6efcd97 commit 866f2ca
Show file tree
Hide file tree
Showing 2 changed files with 11 additions and 6 deletions.
3 changes: 2 additions & 1 deletion CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,8 @@ IMPROVEMENTS:
* `resource/transit_secret_backend_key`: Add `auto_rotate_interval` parameter support to Transit Key Backend ([#1345](https://github.com/hashicorp/terraform-provider-vault/pull/1345))
* `resource/consul_secret_backend_role`: Add support for Consul role ([#1366](https://github.com/hashicorp/terraform-provider-vault/pull/1366))
* `resource/consul_secret_backend_role`: Add support for Consul namespaces and partitions ([#1367](https://github.com/hashicorp/terraform-provider-vault/pull/1367))
* `resource/github_auth_backend`: Add support for `organization_id field` ([#1296](https://github.com/hashicorp/terraform-provider-vault/pull/1296))
* `resource/github_auth_backend`: Add support for `organization_id` field ([#1296](https://github.com/hashicorp/terraform-provider-vault/pull/1296))
* `resource/approle_auth_backend_role_secret_id`: Add `with_wrapped_accessor` to control how the resource ID is set ([#1166](https://github.com/hashicorp/terraform-provider-vault/pull/1166))

## 3.3.1 (February 25, 2022)
BUGS:
Expand Down
14 changes: 9 additions & 5 deletions website/docs/r/approle_auth_backend_role_secret_id.html.md
Original file line number Diff line number Diff line change
Expand Up @@ -29,11 +29,11 @@ resource "vault_approle_auth_backend_role_secret_id" "id" {
backend = vault_auth_backend.approle.path
role_name = vault_approle_auth_backend_role.example.role_name
metadata = <<EOT
{
"hello": "world"
}
EOT
metadata = jsonencode(
{
"hello" = "world"
}
)
}
```

Expand All @@ -57,6 +57,10 @@ The following arguments are supported:
and available for the duration specified. Only a single unwrapping of the
token is allowed.

* `with_wrapped_accessor` - (Optional) Set to `true` to use the wrapped secret-id accessor as the resource ID.
If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
invalidated through unwrapping.

## Attributes Reference

In addition to the fields above, the following attributes are exported:
Expand Down

0 comments on commit 866f2ca

Please sign in to comment.