We recommend using Azure Native.
azure.cdn.FrontdoorSecret
Explore with Pulumi AI
Manages a Front Door (standard/premium) Secret.
Example Usage
using System;
using System.Collections.Generic;
using System.IO;
using System.Linq;
using Pulumi;
using Azure = Pulumi.Azure;
using AzureAD = Pulumi.AzureAD;
private static string ReadFileBase64(string path) {
return Convert.ToBase64String(System.Text.Encoding.UTF8.GetBytes(File.ReadAllText(path)));
}
return await Deployment.RunAsync(() =>
{
var current = Azure.Core.GetClientConfig.Invoke();
var frontdoor = AzureAD.GetServicePrincipal.Invoke(new()
{
DisplayName = "Microsoft.Azure.Cdn",
});
var exampleResourceGroup = new Azure.Core.ResourceGroup("exampleResourceGroup", new()
{
Location = "West Europe",
});
var exampleKeyVault = new Azure.KeyVault.KeyVault("exampleKeyVault", new()
{
Location = exampleResourceGroup.Location,
ResourceGroupName = exampleResourceGroup.Name,
TenantId = current.Apply(getClientConfigResult => getClientConfigResult.TenantId),
SkuName = "premium",
SoftDeleteRetentionDays = 7,
NetworkAcls = new Azure.KeyVault.Inputs.KeyVaultNetworkAclsArgs
{
DefaultAction = "Deny",
Bypass = "AzureServices",
IpRules = new[]
{
"10.0.0.0/24",
},
},
AccessPolicies = new[]
{
new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs
{
TenantId = current.Apply(getClientConfigResult => getClientConfigResult.TenantId),
ObjectId = frontdoor.Apply(getServicePrincipalResult => getServicePrincipalResult.ObjectId),
SecretPermissions = new[]
{
"Get",
},
},
new Azure.KeyVault.Inputs.KeyVaultAccessPolicyArgs
{
TenantId = current.Apply(getClientConfigResult => getClientConfigResult.TenantId),
ObjectId = current.Apply(getClientConfigResult => getClientConfigResult.ObjectId),
CertificatePermissions = new[]
{
"Get",
"Import",
"Delete",
"Purge",
},
SecretPermissions = new[]
{
"Get",
},
},
},
});
var exampleCertificate = new Azure.KeyVault.Certificate("exampleCertificate", new()
{
KeyVaultId = exampleKeyVault.Id,
KeyVaultCertificate = new Azure.KeyVault.Inputs.CertificateCertificateArgs
{
Contents = ReadFileBase64("my-certificate.pfx"),
},
});
var exampleFrontdoorProfile = new Azure.Cdn.FrontdoorProfile("exampleFrontdoorProfile", new()
{
ResourceGroupName = exampleResourceGroup.Name,
SkuName = "Standard_AzureFrontDoor",
});
var exampleFrontdoorSecret = new Azure.Cdn.FrontdoorSecret("exampleFrontdoorSecret", new()
{
CdnFrontdoorProfileId = exampleFrontdoorProfile.Id,
Secret = new Azure.Cdn.Inputs.FrontdoorSecretSecretArgs
{
CustomerCertificates = new[]
{
new Azure.Cdn.Inputs.FrontdoorSecretSecretCustomerCertificateArgs
{
KeyVaultCertificateId = exampleCertificate.Id,
},
},
},
});
});
package main
import (
"encoding/base64"
"os"
"github.com/pulumi/pulumi-azure/sdk/v5/go/azure/cdn"
"github.com/pulumi/pulumi-azure/sdk/v5/go/azure/core"
"github.com/pulumi/pulumi-azure/sdk/v5/go/azure/keyvault"
"github.com/pulumi/pulumi-azuread/sdk/v5/go/azuread"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func filebase64OrPanic(path string) pulumi.StringPtrInput {
if fileData, err := os.ReadFile(path); err == nil {
return pulumi.String(base64.StdEncoding.EncodeToString(fileData[:]))
} else {
panic(err.Error())
}
}
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
current, err := core.GetClientConfig(ctx, nil, nil)
if err != nil {
return err
}
frontdoor, err := azuread.LookupServicePrincipal(ctx, &azuread.LookupServicePrincipalArgs{
DisplayName: pulumi.StringRef("Microsoft.Azure.Cdn"),
}, nil)
if err != nil {
return err
}
exampleResourceGroup, err := core.NewResourceGroup(ctx, "exampleResourceGroup", &core.ResourceGroupArgs{
Location: pulumi.String("West Europe"),
})
if err != nil {
return err
}
exampleKeyVault, err := keyvault.NewKeyVault(ctx, "exampleKeyVault", &keyvault.KeyVaultArgs{
Location: exampleResourceGroup.Location,
ResourceGroupName: exampleResourceGroup.Name,
TenantId: *pulumi.String(current.TenantId),
SkuName: pulumi.String("premium"),
SoftDeleteRetentionDays: pulumi.Int(7),
NetworkAcls: &keyvault.KeyVaultNetworkAclsArgs{
DefaultAction: pulumi.String("Deny"),
Bypass: pulumi.String("AzureServices"),
IpRules: pulumi.StringArray{
pulumi.String("10.0.0.0/24"),
},
},
AccessPolicies: keyvault.KeyVaultAccessPolicyArray{
&keyvault.KeyVaultAccessPolicyArgs{
TenantId: *pulumi.String(current.TenantId),
ObjectId: *pulumi.String(frontdoor.ObjectId),
SecretPermissions: pulumi.StringArray{
pulumi.String("Get"),
},
},
&keyvault.KeyVaultAccessPolicyArgs{
TenantId: *pulumi.String(current.TenantId),
ObjectId: *pulumi.String(current.ObjectId),
CertificatePermissions: pulumi.StringArray{
pulumi.String("Get"),
pulumi.String("Import"),
pulumi.String("Delete"),
pulumi.String("Purge"),
},
SecretPermissions: pulumi.StringArray{
pulumi.String("Get"),
},
},
},
})
if err != nil {
return err
}
exampleCertificate, err := keyvault.NewCertificate(ctx, "exampleCertificate", &keyvault.CertificateArgs{
KeyVaultId: exampleKeyVault.ID(),
Certificate: &keyvault.CertificateCertificateArgs{
Contents: filebase64OrPanic("my-certificate.pfx"),
},
})
if err != nil {
return err
}
exampleFrontdoorProfile, err := cdn.NewFrontdoorProfile(ctx, "exampleFrontdoorProfile", &cdn.FrontdoorProfileArgs{
ResourceGroupName: exampleResourceGroup.Name,
SkuName: pulumi.String("Standard_AzureFrontDoor"),
})
if err != nil {
return err
}
_, err = cdn.NewFrontdoorSecret(ctx, "exampleFrontdoorSecret", &cdn.FrontdoorSecretArgs{
CdnFrontdoorProfileId: exampleFrontdoorProfile.ID(),
Secret: &cdn.FrontdoorSecretSecretArgs{
CustomerCertificates: cdn.FrontdoorSecretSecretCustomerCertificateArray{
&cdn.FrontdoorSecretSecretCustomerCertificateArgs{
KeyVaultCertificateId: exampleCertificate.ID(),
},
},
},
})
if err != nil {
return err
}
return nil
})
}
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.azure.core.CoreFunctions;
import com.pulumi.azuread.AzureadFunctions;
import com.pulumi.azuread.inputs.GetServicePrincipalArgs;
import com.pulumi.azure.core.ResourceGroup;
import com.pulumi.azure.core.ResourceGroupArgs;
import com.pulumi.azure.keyvault.KeyVault;
import com.pulumi.azure.keyvault.KeyVaultArgs;
import com.pulumi.azure.keyvault.inputs.KeyVaultNetworkAclsArgs;
import com.pulumi.azure.keyvault.inputs.KeyVaultAccessPolicyArgs;
import com.pulumi.azure.keyvault.Certificate;
import com.pulumi.azure.keyvault.CertificateArgs;
import com.pulumi.azure.keyvault.inputs.CertificateCertificateArgs;
import com.pulumi.azure.cdn.FrontdoorProfile;
import com.pulumi.azure.cdn.FrontdoorProfileArgs;
import com.pulumi.azure.cdn.FrontdoorSecret;
import com.pulumi.azure.cdn.FrontdoorSecretArgs;
import com.pulumi.azure.cdn.inputs.FrontdoorSecretSecretArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
final var current = CoreFunctions.getClientConfig();
final var frontdoor = AzureadFunctions.getServicePrincipal(GetServicePrincipalArgs.builder()
.displayName("Microsoft.Azure.Cdn")
.build());
var exampleResourceGroup = new ResourceGroup("exampleResourceGroup", ResourceGroupArgs.builder()
.location("West Europe")
.build());
var exampleKeyVault = new KeyVault("exampleKeyVault", KeyVaultArgs.builder()
.location(exampleResourceGroup.location())
.resourceGroupName(exampleResourceGroup.name())
.tenantId(current.applyValue(getClientConfigResult -> getClientConfigResult.tenantId()))
.skuName("premium")
.softDeleteRetentionDays(7)
.networkAcls(KeyVaultNetworkAclsArgs.builder()
.defaultAction("Deny")
.bypass("AzureServices")
.ipRules("10.0.0.0/24")
.build())
.accessPolicies(
KeyVaultAccessPolicyArgs.builder()
.tenantId(current.applyValue(getClientConfigResult -> getClientConfigResult.tenantId()))
.objectId(frontdoor.applyValue(getServicePrincipalResult -> getServicePrincipalResult.objectId()))
.secretPermissions("Get")
.build(),
KeyVaultAccessPolicyArgs.builder()
.tenantId(current.applyValue(getClientConfigResult -> getClientConfigResult.tenantId()))
.objectId(current.applyValue(getClientConfigResult -> getClientConfigResult.objectId()))
.certificatePermissions(
"Get",
"Import",
"Delete",
"Purge")
.secretPermissions("Get")
.build())
.build());
var exampleCertificate = new Certificate("exampleCertificate", CertificateArgs.builder()
.keyVaultId(exampleKeyVault.id())
.certificate(CertificateCertificateArgs.builder()
.contents(Base64.getEncoder().encodeToString(Files.readAllBytes(Paths.get("my-certificate.pfx"))))
.build())
.build());
var exampleFrontdoorProfile = new FrontdoorProfile("exampleFrontdoorProfile", FrontdoorProfileArgs.builder()
.resourceGroupName(exampleResourceGroup.name())
.skuName("Standard_AzureFrontDoor")
.build());
var exampleFrontdoorSecret = new FrontdoorSecret("exampleFrontdoorSecret", FrontdoorSecretArgs.builder()
.cdnFrontdoorProfileId(exampleFrontdoorProfile.id())
.secret(FrontdoorSecretSecretArgs.builder()
.customerCertificates(FrontdoorSecretSecretCustomerCertificateArgs.builder()
.keyVaultCertificateId(exampleCertificate.id())
.build())
.build())
.build());
}
}
import pulumi
import base64
import pulumi_azure as azure
import pulumi_azuread as azuread
current = azure.core.get_client_config()
frontdoor = azuread.get_service_principal(display_name="Microsoft.Azure.Cdn")
example_resource_group = azure.core.ResourceGroup("exampleResourceGroup", location="West Europe")
example_key_vault = azure.keyvault.KeyVault("exampleKeyVault",
location=example_resource_group.location,
resource_group_name=example_resource_group.name,
tenant_id=current.tenant_id,
sku_name="premium",
soft_delete_retention_days=7,
network_acls=azure.keyvault.KeyVaultNetworkAclsArgs(
default_action="Deny",
bypass="AzureServices",
ip_rules=["10.0.0.0/24"],
),
access_policies=[
azure.keyvault.KeyVaultAccessPolicyArgs(
tenant_id=current.tenant_id,
object_id=frontdoor.object_id,
secret_permissions=["Get"],
),
azure.keyvault.KeyVaultAccessPolicyArgs(
tenant_id=current.tenant_id,
object_id=current.object_id,
certificate_permissions=[
"Get",
"Import",
"Delete",
"Purge",
],
secret_permissions=["Get"],
),
])
example_certificate = azure.keyvault.Certificate("exampleCertificate",
key_vault_id=example_key_vault.id,
certificate=azure.keyvault.CertificateCertificateArgs(
contents=(lambda path: base64.b64encode(open(path).read().encode()).decode())("my-certificate.pfx"),
))
example_frontdoor_profile = azure.cdn.FrontdoorProfile("exampleFrontdoorProfile",
resource_group_name=example_resource_group.name,
sku_name="Standard_AzureFrontDoor")
example_frontdoor_secret = azure.cdn.FrontdoorSecret("exampleFrontdoorSecret",
cdn_frontdoor_profile_id=example_frontdoor_profile.id,
secret=azure.cdn.FrontdoorSecretSecretArgs(
customer_certificates=[azure.cdn.FrontdoorSecretSecretCustomerCertificateArgs(
key_vault_certificate_id=example_certificate.id,
)],
))
import * as pulumi from "@pulumi/pulumi";
import * as azure from "@pulumi/azure";
import * as azuread from "@pulumi/azuread";
import * as fs from "fs";
const current = azure.core.getClientConfig({});
const frontdoor = azuread.getServicePrincipal({
displayName: "Microsoft.Azure.Cdn",
});
const exampleResourceGroup = new azure.core.ResourceGroup("exampleResourceGroup", {location: "West Europe"});
const exampleKeyVault = new azure.keyvault.KeyVault("exampleKeyVault", {
location: exampleResourceGroup.location,
resourceGroupName: exampleResourceGroup.name,
tenantId: current.then(current => current.tenantId),
skuName: "premium",
softDeleteRetentionDays: 7,
networkAcls: {
defaultAction: "Deny",
bypass: "AzureServices",
ipRules: ["10.0.0.0/24"],
},
accessPolicies: [
{
tenantId: current.then(current => current.tenantId),
objectId: frontdoor.then(frontdoor => frontdoor.objectId),
secretPermissions: ["Get"],
},
{
tenantId: current.then(current => current.tenantId),
objectId: current.then(current => current.objectId),
certificatePermissions: [
"Get",
"Import",
"Delete",
"Purge",
],
secretPermissions: ["Get"],
},
],
});
const exampleCertificate = new azure.keyvault.Certificate("exampleCertificate", {
keyVaultId: exampleKeyVault.id,
certificate: {
contents: Buffer.from(fs.readFileSync("my-certificate.pfx"), 'binary').toString('base64'),
},
});
const exampleFrontdoorProfile = new azure.cdn.FrontdoorProfile("exampleFrontdoorProfile", {
resourceGroupName: exampleResourceGroup.name,
skuName: "Standard_AzureFrontDoor",
});
const exampleFrontdoorSecret = new azure.cdn.FrontdoorSecret("exampleFrontdoorSecret", {
cdnFrontdoorProfileId: exampleFrontdoorProfile.id,
secret: {
customerCertificates: [{
keyVaultCertificateId: exampleCertificate.id,
}],
},
});
Coming soon!
Create FrontdoorSecret Resource
new FrontdoorSecret(name: string, args: FrontdoorSecretArgs, opts?: CustomResourceOptions);
@overload
def FrontdoorSecret(resource_name: str,
opts: Optional[ResourceOptions] = None,
cdn_frontdoor_profile_id: Optional[str] = None,
name: Optional[str] = None,
secret: Optional[FrontdoorSecretSecretArgs] = None)
@overload
def FrontdoorSecret(resource_name: str,
args: FrontdoorSecretArgs,
opts: Optional[ResourceOptions] = None)
func NewFrontdoorSecret(ctx *Context, name string, args FrontdoorSecretArgs, opts ...ResourceOption) (*FrontdoorSecret, error)
public FrontdoorSecret(string name, FrontdoorSecretArgs args, CustomResourceOptions? opts = null)
public FrontdoorSecret(String name, FrontdoorSecretArgs args)
public FrontdoorSecret(String name, FrontdoorSecretArgs args, CustomResourceOptions options)
type: azure:cdn:FrontdoorSecret
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args FrontdoorSecretArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args FrontdoorSecretArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args FrontdoorSecretArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args FrontdoorSecretArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args FrontdoorSecretArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
FrontdoorSecret Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
The FrontdoorSecret resource accepts the following input properties:
- Cdn
Frontdoor stringProfile Id The Resource ID of the Front Door Profile. Changing this forces a new Front Door Secret to be created.
- Secret
Frontdoor
Secret Secret A
secret
block as defined below. Changing this forces a new Front Door Secret to be created.- Name string
The name which should be used for this Front Door Secret. Possible values must start with a letter or a number, only contain letters, numbers and hyphens and have a length of between 2 and 260 characters. Changing this forces a new Front Door Secret to be created.
- Cdn
Frontdoor stringProfile Id The Resource ID of the Front Door Profile. Changing this forces a new Front Door Secret to be created.
- Secret
Frontdoor
Secret Secret Args A
secret
block as defined below. Changing this forces a new Front Door Secret to be created.- Name string
The name which should be used for this Front Door Secret. Possible values must start with a letter or a number, only contain letters, numbers and hyphens and have a length of between 2 and 260 characters. Changing this forces a new Front Door Secret to be created.
- cdn
Frontdoor StringProfile Id The Resource ID of the Front Door Profile. Changing this forces a new Front Door Secret to be created.
- secret
Frontdoor
Secret Secret A
secret
block as defined below. Changing this forces a new Front Door Secret to be created.- name String
The name which should be used for this Front Door Secret. Possible values must start with a letter or a number, only contain letters, numbers and hyphens and have a length of between 2 and 260 characters. Changing this forces a new Front Door Secret to be created.
- cdn
Frontdoor stringProfile Id The Resource ID of the Front Door Profile. Changing this forces a new Front Door Secret to be created.
- secret
Frontdoor
Secret Secret A
secret
block as defined below. Changing this forces a new Front Door Secret to be created.- name string
The name which should be used for this Front Door Secret. Possible values must start with a letter or a number, only contain letters, numbers and hyphens and have a length of between 2 and 260 characters. Changing this forces a new Front Door Secret to be created.
- cdn_
frontdoor_ strprofile_ id The Resource ID of the Front Door Profile. Changing this forces a new Front Door Secret to be created.
- secret
Frontdoor
Secret Secret Args A
secret
block as defined below. Changing this forces a new Front Door Secret to be created.- name str
The name which should be used for this Front Door Secret. Possible values must start with a letter or a number, only contain letters, numbers and hyphens and have a length of between 2 and 260 characters. Changing this forces a new Front Door Secret to be created.
- cdn
Frontdoor StringProfile Id The Resource ID of the Front Door Profile. Changing this forces a new Front Door Secret to be created.
- secret Property Map
A
secret
block as defined below. Changing this forces a new Front Door Secret to be created.- name String
The name which should be used for this Front Door Secret. Possible values must start with a letter or a number, only contain letters, numbers and hyphens and have a length of between 2 and 260 characters. Changing this forces a new Front Door Secret to be created.
Outputs
All input properties are implicitly available as output properties. Additionally, the FrontdoorSecret resource produces the following output properties:
- Cdn
Frontdoor stringProfile Name The name of the Front Door Profile containing this Front Door Secret.
- Id string
The provider-assigned unique ID for this managed resource.
- Cdn
Frontdoor stringProfile Name The name of the Front Door Profile containing this Front Door Secret.
- Id string
The provider-assigned unique ID for this managed resource.
- cdn
Frontdoor StringProfile Name The name of the Front Door Profile containing this Front Door Secret.
- id String
The provider-assigned unique ID for this managed resource.
- cdn
Frontdoor stringProfile Name The name of the Front Door Profile containing this Front Door Secret.
- id string
The provider-assigned unique ID for this managed resource.
- cdn_
frontdoor_ strprofile_ name The name of the Front Door Profile containing this Front Door Secret.
- id str
The provider-assigned unique ID for this managed resource.
- cdn
Frontdoor StringProfile Name The name of the Front Door Profile containing this Front Door Secret.
- id String
The provider-assigned unique ID for this managed resource.
Look up Existing FrontdoorSecret Resource
Get an existing FrontdoorSecret resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: FrontdoorSecretState, opts?: CustomResourceOptions): FrontdoorSecret
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
cdn_frontdoor_profile_id: Optional[str] = None,
cdn_frontdoor_profile_name: Optional[str] = None,
name: Optional[str] = None,
secret: Optional[FrontdoorSecretSecretArgs] = None) -> FrontdoorSecret
func GetFrontdoorSecret(ctx *Context, name string, id IDInput, state *FrontdoorSecretState, opts ...ResourceOption) (*FrontdoorSecret, error)
public static FrontdoorSecret Get(string name, Input<string> id, FrontdoorSecretState? state, CustomResourceOptions? opts = null)
public static FrontdoorSecret get(String name, Output<String> id, FrontdoorSecretState state, CustomResourceOptions options)
Resource lookup is not supported in YAML
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Cdn
Frontdoor stringProfile Id The Resource ID of the Front Door Profile. Changing this forces a new Front Door Secret to be created.
- Cdn
Frontdoor stringProfile Name The name of the Front Door Profile containing this Front Door Secret.
- Name string
The name which should be used for this Front Door Secret. Possible values must start with a letter or a number, only contain letters, numbers and hyphens and have a length of between 2 and 260 characters. Changing this forces a new Front Door Secret to be created.
- Secret
Frontdoor
Secret Secret A
secret
block as defined below. Changing this forces a new Front Door Secret to be created.
- Cdn
Frontdoor stringProfile Id The Resource ID of the Front Door Profile. Changing this forces a new Front Door Secret to be created.
- Cdn
Frontdoor stringProfile Name The name of the Front Door Profile containing this Front Door Secret.
- Name string
The name which should be used for this Front Door Secret. Possible values must start with a letter or a number, only contain letters, numbers and hyphens and have a length of between 2 and 260 characters. Changing this forces a new Front Door Secret to be created.
- Secret
Frontdoor
Secret Secret Args A
secret
block as defined below. Changing this forces a new Front Door Secret to be created.
- cdn
Frontdoor StringProfile Id The Resource ID of the Front Door Profile. Changing this forces a new Front Door Secret to be created.
- cdn
Frontdoor StringProfile Name The name of the Front Door Profile containing this Front Door Secret.
- name String
The name which should be used for this Front Door Secret. Possible values must start with a letter or a number, only contain letters, numbers and hyphens and have a length of between 2 and 260 characters. Changing this forces a new Front Door Secret to be created.
- secret
Frontdoor
Secret Secret A
secret
block as defined below. Changing this forces a new Front Door Secret to be created.
- cdn
Frontdoor stringProfile Id The Resource ID of the Front Door Profile. Changing this forces a new Front Door Secret to be created.
- cdn
Frontdoor stringProfile Name The name of the Front Door Profile containing this Front Door Secret.
- name string
The name which should be used for this Front Door Secret. Possible values must start with a letter or a number, only contain letters, numbers and hyphens and have a length of between 2 and 260 characters. Changing this forces a new Front Door Secret to be created.
- secret
Frontdoor
Secret Secret A
secret
block as defined below. Changing this forces a new Front Door Secret to be created.
- cdn_
frontdoor_ strprofile_ id The Resource ID of the Front Door Profile. Changing this forces a new Front Door Secret to be created.
- cdn_
frontdoor_ strprofile_ name The name of the Front Door Profile containing this Front Door Secret.
- name str
The name which should be used for this Front Door Secret. Possible values must start with a letter or a number, only contain letters, numbers and hyphens and have a length of between 2 and 260 characters. Changing this forces a new Front Door Secret to be created.
- secret
Frontdoor
Secret Secret Args A
secret
block as defined below. Changing this forces a new Front Door Secret to be created.
- cdn
Frontdoor StringProfile Id The Resource ID of the Front Door Profile. Changing this forces a new Front Door Secret to be created.
- cdn
Frontdoor StringProfile Name The name of the Front Door Profile containing this Front Door Secret.
- name String
The name which should be used for this Front Door Secret. Possible values must start with a letter or a number, only contain letters, numbers and hyphens and have a length of between 2 and 260 characters. Changing this forces a new Front Door Secret to be created.
- secret Property Map
A
secret
block as defined below. Changing this forces a new Front Door Secret to be created.
Supporting Types
FrontdoorSecretSecret, FrontdoorSecretSecretArgs
- Customer
Certificates List<FrontdoorSecret Secret Customer Certificate> A
customer_certificate
block as defined below. Changing this forces a new Front Door Secret to be created.
- Customer
Certificates []FrontdoorSecret Secret Customer Certificate A
customer_certificate
block as defined below. Changing this forces a new Front Door Secret to be created.
- customer
Certificates List<FrontdoorSecret Secret Customer Certificate> A
customer_certificate
block as defined below. Changing this forces a new Front Door Secret to be created.
- customer
Certificates FrontdoorSecret Secret Customer Certificate[] A
customer_certificate
block as defined below. Changing this forces a new Front Door Secret to be created.
- customer_
certificates Sequence[FrontdoorSecret Secret Customer Certificate] A
customer_certificate
block as defined below. Changing this forces a new Front Door Secret to be created.
- customer
Certificates List<Property Map> A
customer_certificate
block as defined below. Changing this forces a new Front Door Secret to be created.
FrontdoorSecretSecretCustomerCertificate, FrontdoorSecretSecretCustomerCertificateArgs
- Key
Vault stringCertificate Id The ID of the Key Vault certificate resource to use. Changing this forces a new Front Door Secret to be created.
->NOTE: If you would like to use the latest version of the Key Vault Certificate use the Key Vault Certificates
versionless_id
attribute as thekey_vault_certificate_id
fields value(e.g.key_vault_certificate_id = azurerm_key_vault_certificate.example.versionless_id
).- Subject
Alternative List<string>Names One or more
subject alternative names
contained within the key vault certificate.
- Key
Vault stringCertificate Id The ID of the Key Vault certificate resource to use. Changing this forces a new Front Door Secret to be created.
->NOTE: If you would like to use the latest version of the Key Vault Certificate use the Key Vault Certificates
versionless_id
attribute as thekey_vault_certificate_id
fields value(e.g.key_vault_certificate_id = azurerm_key_vault_certificate.example.versionless_id
).- Subject
Alternative []stringNames One or more
subject alternative names
contained within the key vault certificate.
- key
Vault StringCertificate Id The ID of the Key Vault certificate resource to use. Changing this forces a new Front Door Secret to be created.
->NOTE: If you would like to use the latest version of the Key Vault Certificate use the Key Vault Certificates
versionless_id
attribute as thekey_vault_certificate_id
fields value(e.g.key_vault_certificate_id = azurerm_key_vault_certificate.example.versionless_id
).- subject
Alternative List<String>Names One or more
subject alternative names
contained within the key vault certificate.
- key
Vault stringCertificate Id The ID of the Key Vault certificate resource to use. Changing this forces a new Front Door Secret to be created.
->NOTE: If you would like to use the latest version of the Key Vault Certificate use the Key Vault Certificates
versionless_id
attribute as thekey_vault_certificate_id
fields value(e.g.key_vault_certificate_id = azurerm_key_vault_certificate.example.versionless_id
).- subject
Alternative string[]Names One or more
subject alternative names
contained within the key vault certificate.
- key_
vault_ strcertificate_ id The ID of the Key Vault certificate resource to use. Changing this forces a new Front Door Secret to be created.
->NOTE: If you would like to use the latest version of the Key Vault Certificate use the Key Vault Certificates
versionless_id
attribute as thekey_vault_certificate_id
fields value(e.g.key_vault_certificate_id = azurerm_key_vault_certificate.example.versionless_id
).- subject_
alternative_ Sequence[str]names One or more
subject alternative names
contained within the key vault certificate.
- key
Vault StringCertificate Id The ID of the Key Vault certificate resource to use. Changing this forces a new Front Door Secret to be created.
->NOTE: If you would like to use the latest version of the Key Vault Certificate use the Key Vault Certificates
versionless_id
attribute as thekey_vault_certificate_id
fields value(e.g.key_vault_certificate_id = azurerm_key_vault_certificate.example.versionless_id
).- subject
Alternative List<String>Names One or more
subject alternative names
contained within the key vault certificate.
Import
Front Door Secrets can be imported using the resource id
, e.g.
$ pulumi import azure:cdn/frontdoorSecret:FrontdoorSecret example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/resourceGroup1/providers/Microsoft.Cdn/profiles/profile1/secrets/secrets1
Package Details
- Repository
- Azure Classic pulumi/pulumi-azure
- License
- Apache-2.0
- Notes
This Pulumi package is based on the
azurerm
Terraform Provider.