generated from hashicorp/terraform-provider-scaffolding
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #8 from tiwood/init
RC1
- Loading branch information
Showing
1,941 changed files
with
563,680 additions
and
273 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,44 @@ | ||
--- | ||
# generated by https://github.com/hashicorp/terraform-plugin-docs | ||
page_title: "azurekeyvault_secret Data Source - terraform-provider-azurekeyvault" | ||
subcategory: "" | ||
description: |- | ||
Use this data source to access information about an existing Key Vault Secret. | ||
--- | ||
|
||
# azurekeyvault_secret (Data Source) | ||
|
||
Use this data source to access information about an existing Key Vault Secret. | ||
|
||
## Example Usage | ||
|
||
```terraform | ||
data "azurekeyvault_secret" "this" { | ||
key_vault_name = "MY-KV" | ||
name = "MY-SECRET" | ||
} | ||
``` | ||
|
||
<!-- schema generated by tfplugindocs --> | ||
## Schema | ||
|
||
### Required | ||
|
||
- `key_vault_name` (String) The name of the target Key Vault. | ||
- `name` (String) Specifies the name of the Key Vault Secret. | ||
|
||
### Optional | ||
|
||
- `id` (String) The ID of this resource. | ||
|
||
### Read-Only | ||
|
||
- `content_type` (String) Specifies the content type for the Key Vault Secret. | ||
- `not_after` (String) Secret not usable after the provided UTC datetime `(Y-m-d'T'H:M:S'Z')` | ||
- `not_before` (String) Secret not usable before the provided UTC datetime `(Y-m-d'T'H:M:S'Z')` | ||
- `tags` (Map of String) | ||
- `value` (String, Sensitive) Specifies the value of the Key Vault Secret. | ||
- `version` (String) The current version of the Key Vault Secret. | ||
- `versionless_id` (String) The Base ID of the Key Vault Secret. | ||
|
||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,22 +1,36 @@ | ||
--- | ||
# generated by https://github.com/hashicorp/terraform-plugin-docs | ||
page_title: "scaffolding Provider" | ||
subcategory: "" | ||
layout: "" | ||
page_title: "Provider: azurekeyvault" | ||
description: |- | ||
The azurekeyvault provider allows direct interaction with the Azure Key Vault data plane. | ||
--- | ||
|
||
# scaffolding Provider | ||
|
||
# azurekeyvault Provider | ||
|
||
This provider is mostly a direct copy of the `Azure Key Vault` related resources | ||
from the official `azurerm` provider. The main difference is, you dont have to | ||
specify a `subscription_id` during provider initialization, which enables you | ||
to create Key Vault resources in multiple Key Vaults, spanning `n` Azure subscriptions. | ||
|
||
## Example Usage | ||
|
||
```terraform | ||
provider "scaffolding" { | ||
# example configuration here | ||
# Specifying required arguments in-file or as variables. | ||
provider "azurekeyvault" { | ||
tenant_id = "00000000-0000-0000-0000-000000000001" | ||
client_id = "00000000-0000-0000-0000-000000000002" | ||
client_secret = var.YOUR_SECRET | ||
} | ||
# Using environment variables | ||
provider "azurekeyvault" {} | ||
``` | ||
|
||
<!-- schema generated by tfplugindocs --> | ||
## Schema | ||
|
||
### Optional | ||
|
||
- `client_id` (String) The Client ID which should be used. This can also be sourced from the `KEYVAULT_CLIENT_ID` Environment Variable. | ||
- `client_secret` (String, Sensitive) The Client Secret which should be used. This can also be sourced from the `KEYVAULT_CLIENT_SECRET` Environment Variable. | ||
- `tenant_id` (String) The Tenant ID should be used. This can also be sourced from the `KEYVAULT_TENANT_ID` Environment Variable. |
Oops, something went wrong.