ibm.SmServiceCredentialsSecret
Explore with Pulumi AI
Provides a resource for ServiceCredentialsSecret. This allows ServiceCredentialsSecret to be created, updated and deleted.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as ibm from "@pulumi/ibm";
const smServiceCredentialsSecret = new ibm.SmServiceCredentialsSecret("smServiceCredentialsSecret", {
instanceId: ibm_resource_instance.sm_instance.guid,
region: "us-south",
customMetadata: {
key: "value",
},
description: "Extended description for this secret.",
labels: ["my-label"],
rotation: {
autoRotate: true,
interval: 1,
unit: "day",
},
secretGroupId: ibm_sm_secret_group.sm_secret_group.secret_group_id,
sourceService: {
instance: {
crn: "crn:v1:bluemix:public:cloud-object-storage:global:a/111f5fb10986423e9saa8512f1db7e65:111133c8-49ea-41xe-8c40-122038246f5b::",
},
role: {
crn: "crn:v1:bluemix:public:iam::::serviceRole:Writer",
},
parameters: {
HMAC: "true",
},
},
ttl: "1800",
});
import pulumi
import pulumi_ibm as ibm
sm_service_credentials_secret = ibm.SmServiceCredentialsSecret("smServiceCredentialsSecret",
instance_id=ibm_resource_instance["sm_instance"]["guid"],
region="us-south",
custom_metadata={
"key": "value",
},
description="Extended description for this secret.",
labels=["my-label"],
rotation={
"auto_rotate": True,
"interval": 1,
"unit": "day",
},
secret_group_id=ibm_sm_secret_group["sm_secret_group"]["secret_group_id"],
source_service={
"instance": {
"crn": "crn:v1:bluemix:public:cloud-object-storage:global:a/111f5fb10986423e9saa8512f1db7e65:111133c8-49ea-41xe-8c40-122038246f5b::",
},
"role": {
"crn": "crn:v1:bluemix:public:iam::::serviceRole:Writer",
},
"parameters": {
"HMAC": "true",
},
},
ttl="1800")
package main
import (
"github.com/pulumi/pulumi-terraform-provider/sdks/go/ibm/ibm"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := ibm.NewSmServiceCredentialsSecret(ctx, "smServiceCredentialsSecret", &ibm.SmServiceCredentialsSecretArgs{
InstanceId: pulumi.Any(ibm_resource_instance.Sm_instance.Guid),
Region: pulumi.String("us-south"),
CustomMetadata: pulumi.StringMap{
"key": pulumi.String("value"),
},
Description: pulumi.String("Extended description for this secret."),
Labels: pulumi.StringArray{
pulumi.String("my-label"),
},
Rotation: &ibm.SmServiceCredentialsSecretRotationArgs{
AutoRotate: pulumi.Bool(true),
Interval: pulumi.Float64(1),
Unit: pulumi.String("day"),
},
SecretGroupId: pulumi.Any(ibm_sm_secret_group.Sm_secret_group.Secret_group_id),
SourceService: &ibm.SmServiceCredentialsSecretSourceServiceArgs{
Instance: &ibm.SmServiceCredentialsSecretSourceServiceInstanceArgs{
Crn: pulumi.String("crn:v1:bluemix:public:cloud-object-storage:global:a/111f5fb10986423e9saa8512f1db7e65:111133c8-49ea-41xe-8c40-122038246f5b::"),
},
Role: &ibm.SmServiceCredentialsSecretSourceServiceRoleArgs{
Crn: pulumi.String("crn:v1:bluemix:public:iam::::serviceRole:Writer"),
},
Parameters: pulumi.StringMap{
"HMAC": pulumi.String("true"),
},
},
Ttl: pulumi.String("1800"),
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Ibm = Pulumi.Ibm;
return await Deployment.RunAsync(() =>
{
var smServiceCredentialsSecret = new Ibm.SmServiceCredentialsSecret("smServiceCredentialsSecret", new()
{
InstanceId = ibm_resource_instance.Sm_instance.Guid,
Region = "us-south",
CustomMetadata =
{
{ "key", "value" },
},
Description = "Extended description for this secret.",
Labels = new[]
{
"my-label",
},
Rotation = new Ibm.Inputs.SmServiceCredentialsSecretRotationArgs
{
AutoRotate = true,
Interval = 1,
Unit = "day",
},
SecretGroupId = ibm_sm_secret_group.Sm_secret_group.Secret_group_id,
SourceService = new Ibm.Inputs.SmServiceCredentialsSecretSourceServiceArgs
{
Instance = new Ibm.Inputs.SmServiceCredentialsSecretSourceServiceInstanceArgs
{
Crn = "crn:v1:bluemix:public:cloud-object-storage:global:a/111f5fb10986423e9saa8512f1db7e65:111133c8-49ea-41xe-8c40-122038246f5b::",
},
Role = new Ibm.Inputs.SmServiceCredentialsSecretSourceServiceRoleArgs
{
Crn = "crn:v1:bluemix:public:iam::::serviceRole:Writer",
},
Parameters =
{
{ "HMAC", "true" },
},
},
Ttl = "1800",
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.ibm.SmServiceCredentialsSecret;
import com.pulumi.ibm.SmServiceCredentialsSecretArgs;
import com.pulumi.ibm.inputs.SmServiceCredentialsSecretRotationArgs;
import com.pulumi.ibm.inputs.SmServiceCredentialsSecretSourceServiceArgs;
import com.pulumi.ibm.inputs.SmServiceCredentialsSecretSourceServiceInstanceArgs;
import com.pulumi.ibm.inputs.SmServiceCredentialsSecretSourceServiceRoleArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var smServiceCredentialsSecret = new SmServiceCredentialsSecret("smServiceCredentialsSecret", SmServiceCredentialsSecretArgs.builder()
.instanceId(ibm_resource_instance.sm_instance().guid())
.region("us-south")
.customMetadata(Map.of("key", "value"))
.description("Extended description for this secret.")
.labels("my-label")
.rotation(SmServiceCredentialsSecretRotationArgs.builder()
.autoRotate(true)
.interval(1)
.unit("day")
.build())
.secretGroupId(ibm_sm_secret_group.sm_secret_group().secret_group_id())
.sourceService(SmServiceCredentialsSecretSourceServiceArgs.builder()
.instance(SmServiceCredentialsSecretSourceServiceInstanceArgs.builder()
.crn("crn:v1:bluemix:public:cloud-object-storage:global:a/111f5fb10986423e9saa8512f1db7e65:111133c8-49ea-41xe-8c40-122038246f5b::")
.build())
.role(SmServiceCredentialsSecretSourceServiceRoleArgs.builder()
.crn("crn:v1:bluemix:public:iam::::serviceRole:Writer")
.build())
.parameters(Map.of("HMAC", true))
.build())
.ttl("1800")
.build());
}
}
resources:
smServiceCredentialsSecret:
type: ibm:SmServiceCredentialsSecret
properties:
instanceId: ${ibm_resource_instance.sm_instance.guid}
region: us-south
customMetadata:
key: value
description: Extended description for this secret.
labels:
- my-label
rotation:
autoRotate: true
interval: 1
unit: day
secretGroupId: ${ibm_sm_secret_group.sm_secret_group.secret_group_id}
sourceService:
instance:
crn: 'crn:v1:bluemix:public:cloud-object-storage:global:a/111f5fb10986423e9saa8512f1db7e65:111133c8-49ea-41xe-8c40-122038246f5b::'
role:
crn: crn:v1:bluemix:public:iam::::serviceRole:Writer
parameters:
HMAC: true
ttl: '1800'
With Existing Service ID
import * as pulumi from "@pulumi/pulumi";
import * as ibm from "@pulumi/ibm";
const smServiceCredentialsSecret = new ibm.SmServiceCredentialsSecret("smServiceCredentialsSecret", {
instanceId: ibm_resource_instance.sm_instance.guid,
region: "us-south",
customMetadata: {
key: "value",
},
description: "Extended description for this secret.",
labels: ["my-label"],
rotation: {
autoRotate: true,
interval: 1,
unit: "day",
},
secretGroupId: ibm_sm_secret_group.sm_secret_group.secret_group_id,
sourceService: {
instance: {
crn: "crn:v1:bluemix:public:cloud-object-storage:global:a/111f5fb10986423e9saa8512f1db7e65:111133c8-49ea-41xe-8c40-122038246f5b::",
},
role: {
crn: "crn:v1:bluemix:public:iam::::serviceRole:Writer",
},
parameters: {
HMAC: "true",
serviceid_crn: "crn:v1:bluemix:public:iam-identity::a/22222f3c34444ff155555d15ca616946::serviceid:ServiceId-1234f56e-1d23-45e6-123c-cfb456b87fyb",
},
},
ttl: "1800",
});
import pulumi
import pulumi_ibm as ibm
sm_service_credentials_secret = ibm.SmServiceCredentialsSecret("smServiceCredentialsSecret",
instance_id=ibm_resource_instance["sm_instance"]["guid"],
region="us-south",
custom_metadata={
"key": "value",
},
description="Extended description for this secret.",
labels=["my-label"],
rotation={
"auto_rotate": True,
"interval": 1,
"unit": "day",
},
secret_group_id=ibm_sm_secret_group["sm_secret_group"]["secret_group_id"],
source_service={
"instance": {
"crn": "crn:v1:bluemix:public:cloud-object-storage:global:a/111f5fb10986423e9saa8512f1db7e65:111133c8-49ea-41xe-8c40-122038246f5b::",
},
"role": {
"crn": "crn:v1:bluemix:public:iam::::serviceRole:Writer",
},
"parameters": {
"HMAC": "true",
"serviceid_crn": "crn:v1:bluemix:public:iam-identity::a/22222f3c34444ff155555d15ca616946::serviceid:ServiceId-1234f56e-1d23-45e6-123c-cfb456b87fyb",
},
},
ttl="1800")
package main
import (
"github.com/pulumi/pulumi-terraform-provider/sdks/go/ibm/ibm"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := ibm.NewSmServiceCredentialsSecret(ctx, "smServiceCredentialsSecret", &ibm.SmServiceCredentialsSecretArgs{
InstanceId: pulumi.Any(ibm_resource_instance.Sm_instance.Guid),
Region: pulumi.String("us-south"),
CustomMetadata: pulumi.StringMap{
"key": pulumi.String("value"),
},
Description: pulumi.String("Extended description for this secret."),
Labels: pulumi.StringArray{
pulumi.String("my-label"),
},
Rotation: &ibm.SmServiceCredentialsSecretRotationArgs{
AutoRotate: pulumi.Bool(true),
Interval: pulumi.Float64(1),
Unit: pulumi.String("day"),
},
SecretGroupId: pulumi.Any(ibm_sm_secret_group.Sm_secret_group.Secret_group_id),
SourceService: &ibm.SmServiceCredentialsSecretSourceServiceArgs{
Instance: &ibm.SmServiceCredentialsSecretSourceServiceInstanceArgs{
Crn: pulumi.String("crn:v1:bluemix:public:cloud-object-storage:global:a/111f5fb10986423e9saa8512f1db7e65:111133c8-49ea-41xe-8c40-122038246f5b::"),
},
Role: &ibm.SmServiceCredentialsSecretSourceServiceRoleArgs{
Crn: pulumi.String("crn:v1:bluemix:public:iam::::serviceRole:Writer"),
},
Parameters: pulumi.StringMap{
"HMAC": pulumi.String("true"),
"serviceid_crn": pulumi.String("crn:v1:bluemix:public:iam-identity::a/22222f3c34444ff155555d15ca616946::serviceid:ServiceId-1234f56e-1d23-45e6-123c-cfb456b87fyb"),
},
},
Ttl: pulumi.String("1800"),
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Ibm = Pulumi.Ibm;
return await Deployment.RunAsync(() =>
{
var smServiceCredentialsSecret = new Ibm.SmServiceCredentialsSecret("smServiceCredentialsSecret", new()
{
InstanceId = ibm_resource_instance.Sm_instance.Guid,
Region = "us-south",
CustomMetadata =
{
{ "key", "value" },
},
Description = "Extended description for this secret.",
Labels = new[]
{
"my-label",
},
Rotation = new Ibm.Inputs.SmServiceCredentialsSecretRotationArgs
{
AutoRotate = true,
Interval = 1,
Unit = "day",
},
SecretGroupId = ibm_sm_secret_group.Sm_secret_group.Secret_group_id,
SourceService = new Ibm.Inputs.SmServiceCredentialsSecretSourceServiceArgs
{
Instance = new Ibm.Inputs.SmServiceCredentialsSecretSourceServiceInstanceArgs
{
Crn = "crn:v1:bluemix:public:cloud-object-storage:global:a/111f5fb10986423e9saa8512f1db7e65:111133c8-49ea-41xe-8c40-122038246f5b::",
},
Role = new Ibm.Inputs.SmServiceCredentialsSecretSourceServiceRoleArgs
{
Crn = "crn:v1:bluemix:public:iam::::serviceRole:Writer",
},
Parameters =
{
{ "HMAC", "true" },
{ "serviceid_crn", "crn:v1:bluemix:public:iam-identity::a/22222f3c34444ff155555d15ca616946::serviceid:ServiceId-1234f56e-1d23-45e6-123c-cfb456b87fyb" },
},
},
Ttl = "1800",
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.ibm.SmServiceCredentialsSecret;
import com.pulumi.ibm.SmServiceCredentialsSecretArgs;
import com.pulumi.ibm.inputs.SmServiceCredentialsSecretRotationArgs;
import com.pulumi.ibm.inputs.SmServiceCredentialsSecretSourceServiceArgs;
import com.pulumi.ibm.inputs.SmServiceCredentialsSecretSourceServiceInstanceArgs;
import com.pulumi.ibm.inputs.SmServiceCredentialsSecretSourceServiceRoleArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var smServiceCredentialsSecret = new SmServiceCredentialsSecret("smServiceCredentialsSecret", SmServiceCredentialsSecretArgs.builder()
.instanceId(ibm_resource_instance.sm_instance().guid())
.region("us-south")
.customMetadata(Map.of("key", "value"))
.description("Extended description for this secret.")
.labels("my-label")
.rotation(SmServiceCredentialsSecretRotationArgs.builder()
.autoRotate(true)
.interval(1)
.unit("day")
.build())
.secretGroupId(ibm_sm_secret_group.sm_secret_group().secret_group_id())
.sourceService(SmServiceCredentialsSecretSourceServiceArgs.builder()
.instance(SmServiceCredentialsSecretSourceServiceInstanceArgs.builder()
.crn("crn:v1:bluemix:public:cloud-object-storage:global:a/111f5fb10986423e9saa8512f1db7e65:111133c8-49ea-41xe-8c40-122038246f5b::")
.build())
.role(SmServiceCredentialsSecretSourceServiceRoleArgs.builder()
.crn("crn:v1:bluemix:public:iam::::serviceRole:Writer")
.build())
.parameters(Map.ofEntries(
Map.entry("HMAC", true),
Map.entry("serviceid_crn", "crn:v1:bluemix:public:iam-identity::a/22222f3c34444ff155555d15ca616946::serviceid:ServiceId-1234f56e-1d23-45e6-123c-cfb456b87fyb")
))
.build())
.ttl("1800")
.build());
}
}
resources:
smServiceCredentialsSecret:
type: ibm:SmServiceCredentialsSecret
properties:
instanceId: ${ibm_resource_instance.sm_instance.guid}
region: us-south
customMetadata:
key: value
description: Extended description for this secret.
labels:
- my-label
rotation:
autoRotate: true
interval: 1
unit: day
secretGroupId: ${ibm_sm_secret_group.sm_secret_group.secret_group_id}
sourceService:
instance:
crn: 'crn:v1:bluemix:public:cloud-object-storage:global:a/111f5fb10986423e9saa8512f1db7e65:111133c8-49ea-41xe-8c40-122038246f5b::'
role:
crn: crn:v1:bluemix:public:iam::::serviceRole:Writer
parameters:
HMAC: true
serviceid_crn: crn:v1:bluemix:public:iam-identity::a/22222f3c34444ff155555d15ca616946::serviceid:ServiceId-1234f56e-1d23-45e6-123c-cfb456b87fyb
ttl: '1800'
Example to access resource credentials using credentials attribute:
import * as pulumi from "@pulumi/pulumi";
import * as ibm from "@pulumi/ibm";
const smServiceCredentialsSecret = new ibm.SmServiceCredentialsSecret("smServiceCredentialsSecret", {
instanceId: ibm_resource_instance.sm_instance.guid,
region: "us-south",
sourceService: {
instance: {
crn: "crn:v1:bluemix:public:cloud-object-storage:global:a/111f5fb10986423e9saa8512f1db7e65:111133c8-49ea-41xe-8c40-122038246f5b::",
},
role: {
crn: "crn:v1:bluemix:public:iam::::serviceRole:Writer",
},
parameters: {
HMAC: "true",
},
},
ttl: "1800",
});
export const accessKeyId = smServiceCredentialsSecret.credentials["cos_hmac_keys.access_key_id"];
export const secretAccessKey = smServiceCredentialsSecret.credentials["cos_hmac_keys.secret_access_key"];
import pulumi
import pulumi_ibm as ibm
sm_service_credentials_secret = ibm.SmServiceCredentialsSecret("smServiceCredentialsSecret",
instance_id=ibm_resource_instance["sm_instance"]["guid"],
region="us-south",
source_service={
"instance": {
"crn": "crn:v1:bluemix:public:cloud-object-storage:global:a/111f5fb10986423e9saa8512f1db7e65:111133c8-49ea-41xe-8c40-122038246f5b::",
},
"role": {
"crn": "crn:v1:bluemix:public:iam::::serviceRole:Writer",
},
"parameters": {
"HMAC": "true",
},
},
ttl="1800")
pulumi.export("accessKeyId", sm_service_credentials_secret.credentials["cos_hmac_keys.access_key_id"])
pulumi.export("secretAccessKey", sm_service_credentials_secret.credentials["cos_hmac_keys.secret_access_key"])
package main
import (
"github.com/pulumi/pulumi-terraform-provider/sdks/go/ibm/ibm"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
smServiceCredentialsSecret, err := ibm.NewSmServiceCredentialsSecret(ctx, "smServiceCredentialsSecret", &ibm.SmServiceCredentialsSecretArgs{
InstanceId: pulumi.Any(ibm_resource_instance.Sm_instance.Guid),
Region: pulumi.String("us-south"),
SourceService: &ibm.SmServiceCredentialsSecretSourceServiceArgs{
Instance: &ibm.SmServiceCredentialsSecretSourceServiceInstanceArgs{
Crn: pulumi.String("crn:v1:bluemix:public:cloud-object-storage:global:a/111f5fb10986423e9saa8512f1db7e65:111133c8-49ea-41xe-8c40-122038246f5b::"),
},
Role: &ibm.SmServiceCredentialsSecretSourceServiceRoleArgs{
Crn: pulumi.String("crn:v1:bluemix:public:iam::::serviceRole:Writer"),
},
Parameters: pulumi.StringMap{
"HMAC": pulumi.String("true"),
},
},
Ttl: pulumi.String("1800"),
})
if err != nil {
return err
}
ctx.Export("accessKeyId", smServiceCredentialsSecret.Credentials.ApplyT(func(credentials map[string]string) (string, error) {
return credentials.Cos_hmac_keys.access_key_id, nil
}).(pulumi.StringOutput))
ctx.Export("secretAccessKey", smServiceCredentialsSecret.Credentials.ApplyT(func(credentials map[string]string) (string, error) {
return credentials.Cos_hmac_keys.secret_access_key, nil
}).(pulumi.StringOutput))
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Ibm = Pulumi.Ibm;
return await Deployment.RunAsync(() =>
{
var smServiceCredentialsSecret = new Ibm.SmServiceCredentialsSecret("smServiceCredentialsSecret", new()
{
InstanceId = ibm_resource_instance.Sm_instance.Guid,
Region = "us-south",
SourceService = new Ibm.Inputs.SmServiceCredentialsSecretSourceServiceArgs
{
Instance = new Ibm.Inputs.SmServiceCredentialsSecretSourceServiceInstanceArgs
{
Crn = "crn:v1:bluemix:public:cloud-object-storage:global:a/111f5fb10986423e9saa8512f1db7e65:111133c8-49ea-41xe-8c40-122038246f5b::",
},
Role = new Ibm.Inputs.SmServiceCredentialsSecretSourceServiceRoleArgs
{
Crn = "crn:v1:bluemix:public:iam::::serviceRole:Writer",
},
Parameters =
{
{ "HMAC", "true" },
},
},
Ttl = "1800",
});
return new Dictionary<string, object?>
{
["accessKeyId"] = smServiceCredentialsSecret.Credentials.Apply(credentials => credentials.Cos_hmac_keys_access_key_id),
["secretAccessKey"] = smServiceCredentialsSecret.Credentials.Apply(credentials => credentials.Cos_hmac_keys_secret_access_key),
};
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.ibm.SmServiceCredentialsSecret;
import com.pulumi.ibm.SmServiceCredentialsSecretArgs;
import com.pulumi.ibm.inputs.SmServiceCredentialsSecretSourceServiceArgs;
import com.pulumi.ibm.inputs.SmServiceCredentialsSecretSourceServiceInstanceArgs;
import com.pulumi.ibm.inputs.SmServiceCredentialsSecretSourceServiceRoleArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var smServiceCredentialsSecret = new SmServiceCredentialsSecret("smServiceCredentialsSecret", SmServiceCredentialsSecretArgs.builder()
.instanceId(ibm_resource_instance.sm_instance().guid())
.region("us-south")
.sourceService(SmServiceCredentialsSecretSourceServiceArgs.builder()
.instance(SmServiceCredentialsSecretSourceServiceInstanceArgs.builder()
.crn("crn:v1:bluemix:public:cloud-object-storage:global:a/111f5fb10986423e9saa8512f1db7e65:111133c8-49ea-41xe-8c40-122038246f5b::")
.build())
.role(SmServiceCredentialsSecretSourceServiceRoleArgs.builder()
.crn("crn:v1:bluemix:public:iam::::serviceRole:Writer")
.build())
.parameters(Map.of("HMAC", true))
.build())
.ttl("1800")
.build());
ctx.export("accessKeyId", smServiceCredentialsSecret.credentials().applyValue(credentials -> credentials.cos_hmac_keys.access_key_id()));
ctx.export("secretAccessKey", smServiceCredentialsSecret.credentials().applyValue(credentials -> credentials.cos_hmac_keys.secret_access_key()));
}
}
resources:
smServiceCredentialsSecret:
type: ibm:SmServiceCredentialsSecret
properties:
instanceId: ${ibm_resource_instance.sm_instance.guid}
region: us-south
sourceService:
instance:
crn: 'crn:v1:bluemix:public:cloud-object-storage:global:a/111f5fb10986423e9saa8512f1db7e65:111133c8-49ea-41xe-8c40-122038246f5b::'
role:
crn: crn:v1:bluemix:public:iam::::serviceRole:Writer
parameters:
HMAC: true
ttl: '1800'
outputs:
accessKeyId: ${smServiceCredentialsSecret.credentials"cos_hmac_keys.access_key_id"[%!s(MISSING)]}
secretAccessKey: ${smServiceCredentialsSecret.credentials"cos_hmac_keys.secret_access_key"[%!s(MISSING)]}
Provider Configuration
The IBM Cloud provider offers a flexible means of providing credentials for authentication. The following methods are supported, in this order, and explained below:
- Static credentials
- Environment variables
To find which credentials are required for this resource, see the service table here.
Static credentials
You can provide your static credentials by adding the ibmcloud_api_key
, iaas_classic_username
, and iaas_classic_api_key
arguments in the IBM Cloud provider block.
Usage:
provider "ibm" {
ibmcloud_api_key = ""
iaas_classic_username = ""
iaas_classic_api_key = ""
}
Environment variables
You can provide your credentials by exporting the IC_API_KEY
, IAAS_CLASSIC_USERNAME
, and IAAS_CLASSIC_API_KEY
environment variables, representing your IBM Cloud platform API key, IBM Cloud Classic Infrastructure (SoftLayer) user name, and IBM Cloud infrastructure API key, respectively.
provider "ibm" {}
Usage:
export IC_API_KEY="ibmcloud_api_key"
export IAAS_CLASSIC_USERNAME="iaas_classic_username"
export IAAS_CLASSIC_API_KEY="iaas_classic_api_key"
pulumi preview
Note:
- Create or find your
ibmcloud_api_key
andiaas_classic_api_key
here.
- Select
My IBM Cloud API Keys
option from view dropdown foribmcloud_api_key
- Select
Classic Infrastructure API Keys
option from view dropdown foriaas_classic_api_key
- For iaas_classic_username
- Go to Users
- Click on user.
- Find user name in the
VPN password
section underUser Details
tab
For more informaton, see here.
Create SmServiceCredentialsSecret Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new SmServiceCredentialsSecret(name: string, args: SmServiceCredentialsSecretArgs, opts?: CustomResourceOptions);
@overload
def SmServiceCredentialsSecret(resource_name: str,
args: SmServiceCredentialsSecretArgs,
opts: Optional[ResourceOptions] = None)
@overload
def SmServiceCredentialsSecret(resource_name: str,
opts: Optional[ResourceOptions] = None,
instance_id: Optional[str] = None,
source_service: Optional[SmServiceCredentialsSecretSourceServiceArgs] = None,
region: Optional[str] = None,
endpoint_type: Optional[str] = None,
labels: Optional[Sequence[str]] = None,
name: Optional[str] = None,
custom_metadata: Optional[Mapping[str, str]] = None,
rotation: Optional[SmServiceCredentialsSecretRotationArgs] = None,
secret_group_id: Optional[str] = None,
sm_service_credentials_secret_id: Optional[str] = None,
description: Optional[str] = None,
ttl: Optional[str] = None,
version_custom_metadata: Optional[Mapping[str, str]] = None)
func NewSmServiceCredentialsSecret(ctx *Context, name string, args SmServiceCredentialsSecretArgs, opts ...ResourceOption) (*SmServiceCredentialsSecret, error)
public SmServiceCredentialsSecret(string name, SmServiceCredentialsSecretArgs args, CustomResourceOptions? opts = null)
public SmServiceCredentialsSecret(String name, SmServiceCredentialsSecretArgs args)
public SmServiceCredentialsSecret(String name, SmServiceCredentialsSecretArgs args, CustomResourceOptions options)
type: ibm:SmServiceCredentialsSecret
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args SmServiceCredentialsSecretArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args SmServiceCredentialsSecretArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args SmServiceCredentialsSecretArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args SmServiceCredentialsSecretArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args SmServiceCredentialsSecretArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var smServiceCredentialsSecretResource = new Ibm.SmServiceCredentialsSecret("smServiceCredentialsSecretResource", new()
{
InstanceId = "string",
SourceService = new Ibm.Inputs.SmServiceCredentialsSecretSourceServiceArgs
{
Instance = new Ibm.Inputs.SmServiceCredentialsSecretSourceServiceInstanceArgs
{
Crn = "string",
},
Iams = new[]
{
new Ibm.Inputs.SmServiceCredentialsSecretSourceServiceIamArgs
{
Apikeys = new[]
{
new Ibm.Inputs.SmServiceCredentialsSecretSourceServiceIamApikeyArgs
{
Description = "string",
Name = "string",
},
},
Roles = new[]
{
new Ibm.Inputs.SmServiceCredentialsSecretSourceServiceIamRoleArgs
{
Crn = "string",
},
},
Serviceids = new[]
{
new Ibm.Inputs.SmServiceCredentialsSecretSourceServiceIamServiceidArgs
{
Crn = "string",
},
},
},
},
Parameters =
{
{ "string", "string" },
},
ResourceKeys = new[]
{
new Ibm.Inputs.SmServiceCredentialsSecretSourceServiceResourceKeyArgs
{
Crn = "string",
Name = "string",
},
},
Role = new Ibm.Inputs.SmServiceCredentialsSecretSourceServiceRoleArgs
{
Crn = "string",
},
},
Region = "string",
EndpointType = "string",
Labels = new[]
{
"string",
},
Name = "string",
CustomMetadata =
{
{ "string", "string" },
},
Rotation = new Ibm.Inputs.SmServiceCredentialsSecretRotationArgs
{
AutoRotate = false,
Interval = 0,
Unit = "string",
},
SecretGroupId = "string",
SmServiceCredentialsSecretId = "string",
Description = "string",
Ttl = "string",
VersionCustomMetadata =
{
{ "string", "string" },
},
});
example, err := ibm.NewSmServiceCredentialsSecret(ctx, "smServiceCredentialsSecretResource", &ibm.SmServiceCredentialsSecretArgs{
InstanceId: pulumi.String("string"),
SourceService: &ibm.SmServiceCredentialsSecretSourceServiceArgs{
Instance: &ibm.SmServiceCredentialsSecretSourceServiceInstanceArgs{
Crn: pulumi.String("string"),
},
Iams: ibm.SmServiceCredentialsSecretSourceServiceIamArray{
&ibm.SmServiceCredentialsSecretSourceServiceIamArgs{
Apikeys: ibm.SmServiceCredentialsSecretSourceServiceIamApikeyArray{
&ibm.SmServiceCredentialsSecretSourceServiceIamApikeyArgs{
Description: pulumi.String("string"),
Name: pulumi.String("string"),
},
},
Roles: ibm.SmServiceCredentialsSecretSourceServiceIamRoleArray{
&ibm.SmServiceCredentialsSecretSourceServiceIamRoleArgs{
Crn: pulumi.String("string"),
},
},
Serviceids: ibm.SmServiceCredentialsSecretSourceServiceIamServiceidArray{
&ibm.SmServiceCredentialsSecretSourceServiceIamServiceidArgs{
Crn: pulumi.String("string"),
},
},
},
},
Parameters: pulumi.StringMap{
"string": pulumi.String("string"),
},
ResourceKeys: ibm.SmServiceCredentialsSecretSourceServiceResourceKeyArray{
&ibm.SmServiceCredentialsSecretSourceServiceResourceKeyArgs{
Crn: pulumi.String("string"),
Name: pulumi.String("string"),
},
},
Role: &ibm.SmServiceCredentialsSecretSourceServiceRoleArgs{
Crn: pulumi.String("string"),
},
},
Region: pulumi.String("string"),
EndpointType: pulumi.String("string"),
Labels: pulumi.StringArray{
pulumi.String("string"),
},
Name: pulumi.String("string"),
CustomMetadata: pulumi.StringMap{
"string": pulumi.String("string"),
},
Rotation: &ibm.SmServiceCredentialsSecretRotationArgs{
AutoRotate: pulumi.Bool(false),
Interval: pulumi.Float64(0),
Unit: pulumi.String("string"),
},
SecretGroupId: pulumi.String("string"),
SmServiceCredentialsSecretId: pulumi.String("string"),
Description: pulumi.String("string"),
Ttl: pulumi.String("string"),
VersionCustomMetadata: pulumi.StringMap{
"string": pulumi.String("string"),
},
})
var smServiceCredentialsSecretResource = new SmServiceCredentialsSecret("smServiceCredentialsSecretResource", SmServiceCredentialsSecretArgs.builder()
.instanceId("string")
.sourceService(SmServiceCredentialsSecretSourceServiceArgs.builder()
.instance(SmServiceCredentialsSecretSourceServiceInstanceArgs.builder()
.crn("string")
.build())
.iams(SmServiceCredentialsSecretSourceServiceIamArgs.builder()
.apikeys(SmServiceCredentialsSecretSourceServiceIamApikeyArgs.builder()
.description("string")
.name("string")
.build())
.roles(SmServiceCredentialsSecretSourceServiceIamRoleArgs.builder()
.crn("string")
.build())
.serviceids(SmServiceCredentialsSecretSourceServiceIamServiceidArgs.builder()
.crn("string")
.build())
.build())
.parameters(Map.of("string", "string"))
.resourceKeys(SmServiceCredentialsSecretSourceServiceResourceKeyArgs.builder()
.crn("string")
.name("string")
.build())
.role(SmServiceCredentialsSecretSourceServiceRoleArgs.builder()
.crn("string")
.build())
.build())
.region("string")
.endpointType("string")
.labels("string")
.name("string")
.customMetadata(Map.of("string", "string"))
.rotation(SmServiceCredentialsSecretRotationArgs.builder()
.autoRotate(false)
.interval(0)
.unit("string")
.build())
.secretGroupId("string")
.smServiceCredentialsSecretId("string")
.description("string")
.ttl("string")
.versionCustomMetadata(Map.of("string", "string"))
.build());
sm_service_credentials_secret_resource = ibm.SmServiceCredentialsSecret("smServiceCredentialsSecretResource",
instance_id="string",
source_service={
"instance": {
"crn": "string",
},
"iams": [{
"apikeys": [{
"description": "string",
"name": "string",
}],
"roles": [{
"crn": "string",
}],
"serviceids": [{
"crn": "string",
}],
}],
"parameters": {
"string": "string",
},
"resource_keys": [{
"crn": "string",
"name": "string",
}],
"role": {
"crn": "string",
},
},
region="string",
endpoint_type="string",
labels=["string"],
name="string",
custom_metadata={
"string": "string",
},
rotation={
"auto_rotate": False,
"interval": 0,
"unit": "string",
},
secret_group_id="string",
sm_service_credentials_secret_id="string",
description="string",
ttl="string",
version_custom_metadata={
"string": "string",
})
const smServiceCredentialsSecretResource = new ibm.SmServiceCredentialsSecret("smServiceCredentialsSecretResource", {
instanceId: "string",
sourceService: {
instance: {
crn: "string",
},
iams: [{
apikeys: [{
description: "string",
name: "string",
}],
roles: [{
crn: "string",
}],
serviceids: [{
crn: "string",
}],
}],
parameters: {
string: "string",
},
resourceKeys: [{
crn: "string",
name: "string",
}],
role: {
crn: "string",
},
},
region: "string",
endpointType: "string",
labels: ["string"],
name: "string",
customMetadata: {
string: "string",
},
rotation: {
autoRotate: false,
interval: 0,
unit: "string",
},
secretGroupId: "string",
smServiceCredentialsSecretId: "string",
description: "string",
ttl: "string",
versionCustomMetadata: {
string: "string",
},
});
type: ibm:SmServiceCredentialsSecret
properties:
customMetadata:
string: string
description: string
endpointType: string
instanceId: string
labels:
- string
name: string
region: string
rotation:
autoRotate: false
interval: 0
unit: string
secretGroupId: string
smServiceCredentialsSecretId: string
sourceService:
iams:
- apikeys:
- description: string
name: string
roles:
- crn: string
serviceids:
- crn: string
instance:
crn: string
parameters:
string: string
resourceKeys:
- crn: string
name: string
role:
crn: string
ttl: string
versionCustomMetadata:
string: string
SmServiceCredentialsSecret Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The SmServiceCredentialsSecret resource accepts the following input properties:
- Instance
Id string - The GUID of the Secrets Manager instance.
- Source
Service SmService Credentials Secret Source Service - The properties required for creating the service credentials for the specified source service instance. Nested scheme for source_service:
- Custom
Metadata Dictionary<string, string> - The secret metadata that a user can customize.
- Description string
- An extended description of your secret.To protect your privacy, do not use personal data, such as your name or location, as a description for your secret group.
- Constraints: The maximum length is
1024
characters. The minimum length is0
characters. The value must match regular expression/(.*?)/
.
- Constraints: The maximum length is
- Endpoint
Type string - The endpoint type. If not provided the endpoint type is determined by the
visibility
argument provided in the provider configuration.- Constraints: Allowable values are:
private
,public
.
- Constraints: Allowable values are:
- Labels List<string>
- Labels that you can use to search for secrets in your instance.Up to 30 labels can be created.
- Constraints: The list items must match regular expression
/(.*?)/
. The maximum length is30
items. The minimum length is0
items.
- Constraints: The list items must match regular expression
- Name string
- The human-readable name of your secret.
- Constraints: The maximum length is
256
characters. The minimum length is2
characters. The value must match regular expression^[A-Za-z0-9_][A-Za-z0-9_]*(?:_*-*\.*[A-Za-z0-9]*)*[A-Za-z0-9]+$
.
- Constraints: The maximum length is
- Region string
- The region of the Secrets Manager instance. If not provided defaults to the region defined in the IBM provider configuration.
- Rotation
Sm
Service Credentials Secret Rotation - Determines whether Secrets Manager rotates your secrets automatically. Nested scheme for rotation:
- Secret
Group stringId - A UUID identifier, or
default
secret group.- Constraints: The maximum length is
36
characters. The minimum length is7
characters. The value must match regular expression/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/
.
- Constraints: The maximum length is
- Sm
Service stringCredentials Secret Id - Ttl string
- The time-to-live (TTL) or lease duration to assign to generated credentials. The TTL defines for how long generated credentials remain valid. The value should be a string that specifies the number of seconds. Minimum duration is 86400 (1 day). Maximum is 7776000 seconds (90 days).
- Constraints: The maximum length is
7
characters. The minimum length is2
characters.
- Constraints: The maximum length is
- Version
Custom Dictionary<string, string>Metadata - The secret version metadata that a user can customize.
- Instance
Id string - The GUID of the Secrets Manager instance.
- Source
Service SmService Credentials Secret Source Service Args - The properties required for creating the service credentials for the specified source service instance. Nested scheme for source_service:
- Custom
Metadata map[string]string - The secret metadata that a user can customize.
- Description string
- An extended description of your secret.To protect your privacy, do not use personal data, such as your name or location, as a description for your secret group.
- Constraints: The maximum length is
1024
characters. The minimum length is0
characters. The value must match regular expression/(.*?)/
.
- Constraints: The maximum length is
- Endpoint
Type string - The endpoint type. If not provided the endpoint type is determined by the
visibility
argument provided in the provider configuration.- Constraints: Allowable values are:
private
,public
.
- Constraints: Allowable values are:
- Labels []string
- Labels that you can use to search for secrets in your instance.Up to 30 labels can be created.
- Constraints: The list items must match regular expression
/(.*?)/
. The maximum length is30
items. The minimum length is0
items.
- Constraints: The list items must match regular expression
- Name string
- The human-readable name of your secret.
- Constraints: The maximum length is
256
characters. The minimum length is2
characters. The value must match regular expression^[A-Za-z0-9_][A-Za-z0-9_]*(?:_*-*\.*[A-Za-z0-9]*)*[A-Za-z0-9]+$
.
- Constraints: The maximum length is
- Region string
- The region of the Secrets Manager instance. If not provided defaults to the region defined in the IBM provider configuration.
- Rotation
Sm
Service Credentials Secret Rotation Args - Determines whether Secrets Manager rotates your secrets automatically. Nested scheme for rotation:
- Secret
Group stringId - A UUID identifier, or
default
secret group.- Constraints: The maximum length is
36
characters. The minimum length is7
characters. The value must match regular expression/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/
.
- Constraints: The maximum length is
- Sm
Service stringCredentials Secret Id - Ttl string
- The time-to-live (TTL) or lease duration to assign to generated credentials. The TTL defines for how long generated credentials remain valid. The value should be a string that specifies the number of seconds. Minimum duration is 86400 (1 day). Maximum is 7776000 seconds (90 days).
- Constraints: The maximum length is
7
characters. The minimum length is2
characters.
- Constraints: The maximum length is
- Version
Custom map[string]stringMetadata - The secret version metadata that a user can customize.
- instance
Id String - The GUID of the Secrets Manager instance.
- source
Service SmService Credentials Secret Source Service - The properties required for creating the service credentials for the specified source service instance. Nested scheme for source_service:
- custom
Metadata Map<String,String> - The secret metadata that a user can customize.
- description String
- An extended description of your secret.To protect your privacy, do not use personal data, such as your name or location, as a description for your secret group.
- Constraints: The maximum length is
1024
characters. The minimum length is0
characters. The value must match regular expression/(.*?)/
.
- Constraints: The maximum length is
- endpoint
Type String - The endpoint type. If not provided the endpoint type is determined by the
visibility
argument provided in the provider configuration.- Constraints: Allowable values are:
private
,public
.
- Constraints: Allowable values are:
- labels List<String>
- Labels that you can use to search for secrets in your instance.Up to 30 labels can be created.
- Constraints: The list items must match regular expression
/(.*?)/
. The maximum length is30
items. The minimum length is0
items.
- Constraints: The list items must match regular expression
- name String
- The human-readable name of your secret.
- Constraints: The maximum length is
256
characters. The minimum length is2
characters. The value must match regular expression^[A-Za-z0-9_][A-Za-z0-9_]*(?:_*-*\.*[A-Za-z0-9]*)*[A-Za-z0-9]+$
.
- Constraints: The maximum length is
- region String
- The region of the Secrets Manager instance. If not provided defaults to the region defined in the IBM provider configuration.
- rotation
Sm
Service Credentials Secret Rotation - Determines whether Secrets Manager rotates your secrets automatically. Nested scheme for rotation:
- secret
Group StringId - A UUID identifier, or
default
secret group.- Constraints: The maximum length is
36
characters. The minimum length is7
characters. The value must match regular expression/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/
.
- Constraints: The maximum length is
- sm
Service StringCredentials Secret Id - ttl String
- The time-to-live (TTL) or lease duration to assign to generated credentials. The TTL defines for how long generated credentials remain valid. The value should be a string that specifies the number of seconds. Minimum duration is 86400 (1 day). Maximum is 7776000 seconds (90 days).
- Constraints: The maximum length is
7
characters. The minimum length is2
characters.
- Constraints: The maximum length is
- version
Custom Map<String,String>Metadata - The secret version metadata that a user can customize.
- instance
Id string - The GUID of the Secrets Manager instance.
- source
Service SmService Credentials Secret Source Service - The properties required for creating the service credentials for the specified source service instance. Nested scheme for source_service:
- custom
Metadata {[key: string]: string} - The secret metadata that a user can customize.
- description string
- An extended description of your secret.To protect your privacy, do not use personal data, such as your name or location, as a description for your secret group.
- Constraints: The maximum length is
1024
characters. The minimum length is0
characters. The value must match regular expression/(.*?)/
.
- Constraints: The maximum length is
- endpoint
Type string - The endpoint type. If not provided the endpoint type is determined by the
visibility
argument provided in the provider configuration.- Constraints: Allowable values are:
private
,public
.
- Constraints: Allowable values are:
- labels string[]
- Labels that you can use to search for secrets in your instance.Up to 30 labels can be created.
- Constraints: The list items must match regular expression
/(.*?)/
. The maximum length is30
items. The minimum length is0
items.
- Constraints: The list items must match regular expression
- name string
- The human-readable name of your secret.
- Constraints: The maximum length is
256
characters. The minimum length is2
characters. The value must match regular expression^[A-Za-z0-9_][A-Za-z0-9_]*(?:_*-*\.*[A-Za-z0-9]*)*[A-Za-z0-9]+$
.
- Constraints: The maximum length is
- region string
- The region of the Secrets Manager instance. If not provided defaults to the region defined in the IBM provider configuration.
- rotation
Sm
Service Credentials Secret Rotation - Determines whether Secrets Manager rotates your secrets automatically. Nested scheme for rotation:
- secret
Group stringId - A UUID identifier, or
default
secret group.- Constraints: The maximum length is
36
characters. The minimum length is7
characters. The value must match regular expression/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/
.
- Constraints: The maximum length is
- sm
Service stringCredentials Secret Id - ttl string
- The time-to-live (TTL) or lease duration to assign to generated credentials. The TTL defines for how long generated credentials remain valid. The value should be a string that specifies the number of seconds. Minimum duration is 86400 (1 day). Maximum is 7776000 seconds (90 days).
- Constraints: The maximum length is
7
characters. The minimum length is2
characters.
- Constraints: The maximum length is
- version
Custom {[key: string]: string}Metadata - The secret version metadata that a user can customize.
- instance_
id str - The GUID of the Secrets Manager instance.
- source_
service SmService Credentials Secret Source Service Args - The properties required for creating the service credentials for the specified source service instance. Nested scheme for source_service:
- custom_
metadata Mapping[str, str] - The secret metadata that a user can customize.
- description str
- An extended description of your secret.To protect your privacy, do not use personal data, such as your name or location, as a description for your secret group.
- Constraints: The maximum length is
1024
characters. The minimum length is0
characters. The value must match regular expression/(.*?)/
.
- Constraints: The maximum length is
- endpoint_
type str - The endpoint type. If not provided the endpoint type is determined by the
visibility
argument provided in the provider configuration.- Constraints: Allowable values are:
private
,public
.
- Constraints: Allowable values are:
- labels Sequence[str]
- Labels that you can use to search for secrets in your instance.Up to 30 labels can be created.
- Constraints: The list items must match regular expression
/(.*?)/
. The maximum length is30
items. The minimum length is0
items.
- Constraints: The list items must match regular expression
- name str
- The human-readable name of your secret.
- Constraints: The maximum length is
256
characters. The minimum length is2
characters. The value must match regular expression^[A-Za-z0-9_][A-Za-z0-9_]*(?:_*-*\.*[A-Za-z0-9]*)*[A-Za-z0-9]+$
.
- Constraints: The maximum length is
- region str
- The region of the Secrets Manager instance. If not provided defaults to the region defined in the IBM provider configuration.
- rotation
Sm
Service Credentials Secret Rotation Args - Determines whether Secrets Manager rotates your secrets automatically. Nested scheme for rotation:
- secret_
group_ strid - A UUID identifier, or
default
secret group.- Constraints: The maximum length is
36
characters. The minimum length is7
characters. The value must match regular expression/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/
.
- Constraints: The maximum length is
- sm_
service_ strcredentials_ secret_ id - ttl str
- The time-to-live (TTL) or lease duration to assign to generated credentials. The TTL defines for how long generated credentials remain valid. The value should be a string that specifies the number of seconds. Minimum duration is 86400 (1 day). Maximum is 7776000 seconds (90 days).
- Constraints: The maximum length is
7
characters. The minimum length is2
characters.
- Constraints: The maximum length is
- version_
custom_ Mapping[str, str]metadata - The secret version metadata that a user can customize.
- instance
Id String - The GUID of the Secrets Manager instance.
- source
Service Property Map - The properties required for creating the service credentials for the specified source service instance. Nested scheme for source_service:
- custom
Metadata Map<String> - The secret metadata that a user can customize.
- description String
- An extended description of your secret.To protect your privacy, do not use personal data, such as your name or location, as a description for your secret group.
- Constraints: The maximum length is
1024
characters. The minimum length is0
characters. The value must match regular expression/(.*?)/
.
- Constraints: The maximum length is
- endpoint
Type String - The endpoint type. If not provided the endpoint type is determined by the
visibility
argument provided in the provider configuration.- Constraints: Allowable values are:
private
,public
.
- Constraints: Allowable values are:
- labels List<String>
- Labels that you can use to search for secrets in your instance.Up to 30 labels can be created.
- Constraints: The list items must match regular expression
/(.*?)/
. The maximum length is30
items. The minimum length is0
items.
- Constraints: The list items must match regular expression
- name String
- The human-readable name of your secret.
- Constraints: The maximum length is
256
characters. The minimum length is2
characters. The value must match regular expression^[A-Za-z0-9_][A-Za-z0-9_]*(?:_*-*\.*[A-Za-z0-9]*)*[A-Za-z0-9]+$
.
- Constraints: The maximum length is
- region String
- The region of the Secrets Manager instance. If not provided defaults to the region defined in the IBM provider configuration.
- rotation Property Map
- Determines whether Secrets Manager rotates your secrets automatically. Nested scheme for rotation:
- secret
Group StringId - A UUID identifier, or
default
secret group.- Constraints: The maximum length is
36
characters. The minimum length is7
characters. The value must match regular expression/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/
.
- Constraints: The maximum length is
- sm
Service StringCredentials Secret Id - ttl String
- The time-to-live (TTL) or lease duration to assign to generated credentials. The TTL defines for how long generated credentials remain valid. The value should be a string that specifies the number of seconds. Minimum duration is 86400 (1 day). Maximum is 7776000 seconds (90 days).
- Constraints: The maximum length is
7
characters. The minimum length is2
characters.
- Constraints: The maximum length is
- version
Custom Map<String>Metadata - The secret version metadata that a user can customize.
Outputs
All input properties are implicitly available as output properties. Additionally, the SmServiceCredentialsSecret resource produces the following output properties:
- Created
At string - (String) The date when a resource was created. The date format follows RFC 3339.
- Created
By string - (String) The unique identifier that is associated with the entity that created the secret.
- Constraints: The maximum length is
128
characters. The minimum length is4
characters.
- Constraints: The maximum length is
- Credentials Dictionary<string, string>
- (List) The properties of the service credentials secret payload. Nested scheme for credentials:
- Crn string
- (String) The resource key CRN of the generated service credentials.
- Downloaded bool
- (Boolean) Indicates whether the secret data that is associated with a secret version was retrieved in a call to the service API.
- Expiration
Date string - (String) The date a secret is expired. The date format follows RFC 3339.
- Id string
- The provider-assigned unique ID for this managed resource.
- Locks
Total double - (Integer) The number of locks of the secret.
- Constraints: The maximum value is
1000
. The minimum value is0
.
- Constraints: The maximum value is
- Next
Rotation stringDate - (String) The date that the secret is scheduled for automatic rotation.The service automatically creates a new version of the secret on its next rotation date. This field exists only for secrets that have an existing rotation policy.
- Secret
Id string - The unique identifier of the ServiceCredentialsSecret.
- Secret
Type string - (String) The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials.
- Constraints: Allowable values are:
arbitrary
,imported_cert
,public_cert
,iam_credentials
,kv
,username_password
,private_cert
.
- Constraints: Allowable values are:
- State double
- (Integer) The secret state that is based on NIST SP 800-57. States are integers and correspond to the
Pre-activation = 0
,Active = 1
,Suspended = 2
,Deactivated = 3
, andDestroyed = 5
values.- Constraints: Allowable values are:
0
,1
,2
,3
,5
.
- Constraints: Allowable values are:
- State
Description string - (String) A text representation of the secret state.
- Constraints: Allowable values are:
pre_activation
,active
,suspended
,deactivated
,destroyed
.
- Constraints: Allowable values are:
- Updated
At string - (String) The date when a resource was recently modified. The date format follows RFC 3339.
- Versions
Total double - (Integer) The number of versions of the secret.
- Constraints: The maximum value is
50
. The minimum value is0
.
- Constraints: The maximum value is
- Created
At string - (String) The date when a resource was created. The date format follows RFC 3339.
- Created
By string - (String) The unique identifier that is associated with the entity that created the secret.
- Constraints: The maximum length is
128
characters. The minimum length is4
characters.
- Constraints: The maximum length is
- Credentials map[string]string
- (List) The properties of the service credentials secret payload. Nested scheme for credentials:
- Crn string
- (String) The resource key CRN of the generated service credentials.
- Downloaded bool
- (Boolean) Indicates whether the secret data that is associated with a secret version was retrieved in a call to the service API.
- Expiration
Date string - (String) The date a secret is expired. The date format follows RFC 3339.
- Id string
- The provider-assigned unique ID for this managed resource.
- Locks
Total float64 - (Integer) The number of locks of the secret.
- Constraints: The maximum value is
1000
. The minimum value is0
.
- Constraints: The maximum value is
- Next
Rotation stringDate - (String) The date that the secret is scheduled for automatic rotation.The service automatically creates a new version of the secret on its next rotation date. This field exists only for secrets that have an existing rotation policy.
- Secret
Id string - The unique identifier of the ServiceCredentialsSecret.
- Secret
Type string - (String) The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials.
- Constraints: Allowable values are:
arbitrary
,imported_cert
,public_cert
,iam_credentials
,kv
,username_password
,private_cert
.
- Constraints: Allowable values are:
- State float64
- (Integer) The secret state that is based on NIST SP 800-57. States are integers and correspond to the
Pre-activation = 0
,Active = 1
,Suspended = 2
,Deactivated = 3
, andDestroyed = 5
values.- Constraints: Allowable values are:
0
,1
,2
,3
,5
.
- Constraints: Allowable values are:
- State
Description string - (String) A text representation of the secret state.
- Constraints: Allowable values are:
pre_activation
,active
,suspended
,deactivated
,destroyed
.
- Constraints: Allowable values are:
- Updated
At string - (String) The date when a resource was recently modified. The date format follows RFC 3339.
- Versions
Total float64 - (Integer) The number of versions of the secret.
- Constraints: The maximum value is
50
. The minimum value is0
.
- Constraints: The maximum value is
- created
At String - (String) The date when a resource was created. The date format follows RFC 3339.
- created
By String - (String) The unique identifier that is associated with the entity that created the secret.
- Constraints: The maximum length is
128
characters. The minimum length is4
characters.
- Constraints: The maximum length is
- credentials Map<String,String>
- (List) The properties of the service credentials secret payload. Nested scheme for credentials:
- crn String
- (String) The resource key CRN of the generated service credentials.
- downloaded Boolean
- (Boolean) Indicates whether the secret data that is associated with a secret version was retrieved in a call to the service API.
- expiration
Date String - (String) The date a secret is expired. The date format follows RFC 3339.
- id String
- The provider-assigned unique ID for this managed resource.
- locks
Total Double - (Integer) The number of locks of the secret.
- Constraints: The maximum value is
1000
. The minimum value is0
.
- Constraints: The maximum value is
- next
Rotation StringDate - (String) The date that the secret is scheduled for automatic rotation.The service automatically creates a new version of the secret on its next rotation date. This field exists only for secrets that have an existing rotation policy.
- secret
Id String - The unique identifier of the ServiceCredentialsSecret.
- secret
Type String - (String) The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials.
- Constraints: Allowable values are:
arbitrary
,imported_cert
,public_cert
,iam_credentials
,kv
,username_password
,private_cert
.
- Constraints: Allowable values are:
- state Double
- (Integer) The secret state that is based on NIST SP 800-57. States are integers and correspond to the
Pre-activation = 0
,Active = 1
,Suspended = 2
,Deactivated = 3
, andDestroyed = 5
values.- Constraints: Allowable values are:
0
,1
,2
,3
,5
.
- Constraints: Allowable values are:
- state
Description String - (String) A text representation of the secret state.
- Constraints: Allowable values are:
pre_activation
,active
,suspended
,deactivated
,destroyed
.
- Constraints: Allowable values are:
- updated
At String - (String) The date when a resource was recently modified. The date format follows RFC 3339.
- versions
Total Double - (Integer) The number of versions of the secret.
- Constraints: The maximum value is
50
. The minimum value is0
.
- Constraints: The maximum value is
- created
At string - (String) The date when a resource was created. The date format follows RFC 3339.
- created
By string - (String) The unique identifier that is associated with the entity that created the secret.
- Constraints: The maximum length is
128
characters. The minimum length is4
characters.
- Constraints: The maximum length is
- credentials {[key: string]: string}
- (List) The properties of the service credentials secret payload. Nested scheme for credentials:
- crn string
- (String) The resource key CRN of the generated service credentials.
- downloaded boolean
- (Boolean) Indicates whether the secret data that is associated with a secret version was retrieved in a call to the service API.
- expiration
Date string - (String) The date a secret is expired. The date format follows RFC 3339.
- id string
- The provider-assigned unique ID for this managed resource.
- locks
Total number - (Integer) The number of locks of the secret.
- Constraints: The maximum value is
1000
. The minimum value is0
.
- Constraints: The maximum value is
- next
Rotation stringDate - (String) The date that the secret is scheduled for automatic rotation.The service automatically creates a new version of the secret on its next rotation date. This field exists only for secrets that have an existing rotation policy.
- secret
Id string - The unique identifier of the ServiceCredentialsSecret.
- secret
Type string - (String) The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials.
- Constraints: Allowable values are:
arbitrary
,imported_cert
,public_cert
,iam_credentials
,kv
,username_password
,private_cert
.
- Constraints: Allowable values are:
- state number
- (Integer) The secret state that is based on NIST SP 800-57. States are integers and correspond to the
Pre-activation = 0
,Active = 1
,Suspended = 2
,Deactivated = 3
, andDestroyed = 5
values.- Constraints: Allowable values are:
0
,1
,2
,3
,5
.
- Constraints: Allowable values are:
- state
Description string - (String) A text representation of the secret state.
- Constraints: Allowable values are:
pre_activation
,active
,suspended
,deactivated
,destroyed
.
- Constraints: Allowable values are:
- updated
At string - (String) The date when a resource was recently modified. The date format follows RFC 3339.
- versions
Total number - (Integer) The number of versions of the secret.
- Constraints: The maximum value is
50
. The minimum value is0
.
- Constraints: The maximum value is
- created_
at str - (String) The date when a resource was created. The date format follows RFC 3339.
- created_
by str - (String) The unique identifier that is associated with the entity that created the secret.
- Constraints: The maximum length is
128
characters. The minimum length is4
characters.
- Constraints: The maximum length is
- credentials Mapping[str, str]
- (List) The properties of the service credentials secret payload. Nested scheme for credentials:
- crn str
- (String) The resource key CRN of the generated service credentials.
- downloaded bool
- (Boolean) Indicates whether the secret data that is associated with a secret version was retrieved in a call to the service API.
- expiration_
date str - (String) The date a secret is expired. The date format follows RFC 3339.
- id str
- The provider-assigned unique ID for this managed resource.
- locks_
total float - (Integer) The number of locks of the secret.
- Constraints: The maximum value is
1000
. The minimum value is0
.
- Constraints: The maximum value is
- next_
rotation_ strdate - (String) The date that the secret is scheduled for automatic rotation.The service automatically creates a new version of the secret on its next rotation date. This field exists only for secrets that have an existing rotation policy.
- secret_
id str - The unique identifier of the ServiceCredentialsSecret.
- secret_
type str - (String) The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials.
- Constraints: Allowable values are:
arbitrary
,imported_cert
,public_cert
,iam_credentials
,kv
,username_password
,private_cert
.
- Constraints: Allowable values are:
- state float
- (Integer) The secret state that is based on NIST SP 800-57. States are integers and correspond to the
Pre-activation = 0
,Active = 1
,Suspended = 2
,Deactivated = 3
, andDestroyed = 5
values.- Constraints: Allowable values are:
0
,1
,2
,3
,5
.
- Constraints: Allowable values are:
- state_
description str - (String) A text representation of the secret state.
- Constraints: Allowable values are:
pre_activation
,active
,suspended
,deactivated
,destroyed
.
- Constraints: Allowable values are:
- updated_
at str - (String) The date when a resource was recently modified. The date format follows RFC 3339.
- versions_
total float - (Integer) The number of versions of the secret.
- Constraints: The maximum value is
50
. The minimum value is0
.
- Constraints: The maximum value is
- created
At String - (String) The date when a resource was created. The date format follows RFC 3339.
- created
By String - (String) The unique identifier that is associated with the entity that created the secret.
- Constraints: The maximum length is
128
characters. The minimum length is4
characters.
- Constraints: The maximum length is
- credentials Map<String>
- (List) The properties of the service credentials secret payload. Nested scheme for credentials:
- crn String
- (String) The resource key CRN of the generated service credentials.
- downloaded Boolean
- (Boolean) Indicates whether the secret data that is associated with a secret version was retrieved in a call to the service API.
- expiration
Date String - (String) The date a secret is expired. The date format follows RFC 3339.
- id String
- The provider-assigned unique ID for this managed resource.
- locks
Total Number - (Integer) The number of locks of the secret.
- Constraints: The maximum value is
1000
. The minimum value is0
.
- Constraints: The maximum value is
- next
Rotation StringDate - (String) The date that the secret is scheduled for automatic rotation.The service automatically creates a new version of the secret on its next rotation date. This field exists only for secrets that have an existing rotation policy.
- secret
Id String - The unique identifier of the ServiceCredentialsSecret.
- secret
Type String - (String) The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials.
- Constraints: Allowable values are:
arbitrary
,imported_cert
,public_cert
,iam_credentials
,kv
,username_password
,private_cert
.
- Constraints: Allowable values are:
- state Number
- (Integer) The secret state that is based on NIST SP 800-57. States are integers and correspond to the
Pre-activation = 0
,Active = 1
,Suspended = 2
,Deactivated = 3
, andDestroyed = 5
values.- Constraints: Allowable values are:
0
,1
,2
,3
,5
.
- Constraints: Allowable values are:
- state
Description String - (String) A text representation of the secret state.
- Constraints: Allowable values are:
pre_activation
,active
,suspended
,deactivated
,destroyed
.
- Constraints: Allowable values are:
- updated
At String - (String) The date when a resource was recently modified. The date format follows RFC 3339.
- versions
Total Number - (Integer) The number of versions of the secret.
- Constraints: The maximum value is
50
. The minimum value is0
.
- Constraints: The maximum value is
Look up Existing SmServiceCredentialsSecret Resource
Get an existing SmServiceCredentialsSecret resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: SmServiceCredentialsSecretState, opts?: CustomResourceOptions): SmServiceCredentialsSecret
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
created_at: Optional[str] = None,
created_by: Optional[str] = None,
credentials: Optional[Mapping[str, str]] = None,
crn: Optional[str] = None,
custom_metadata: Optional[Mapping[str, str]] = None,
description: Optional[str] = None,
downloaded: Optional[bool] = None,
endpoint_type: Optional[str] = None,
expiration_date: Optional[str] = None,
instance_id: Optional[str] = None,
labels: Optional[Sequence[str]] = None,
locks_total: Optional[float] = None,
name: Optional[str] = None,
next_rotation_date: Optional[str] = None,
region: Optional[str] = None,
rotation: Optional[SmServiceCredentialsSecretRotationArgs] = None,
secret_group_id: Optional[str] = None,
secret_id: Optional[str] = None,
secret_type: Optional[str] = None,
sm_service_credentials_secret_id: Optional[str] = None,
source_service: Optional[SmServiceCredentialsSecretSourceServiceArgs] = None,
state: Optional[float] = None,
state_description: Optional[str] = None,
ttl: Optional[str] = None,
updated_at: Optional[str] = None,
version_custom_metadata: Optional[Mapping[str, str]] = None,
versions_total: Optional[float] = None) -> SmServiceCredentialsSecret
func GetSmServiceCredentialsSecret(ctx *Context, name string, id IDInput, state *SmServiceCredentialsSecretState, opts ...ResourceOption) (*SmServiceCredentialsSecret, error)
public static SmServiceCredentialsSecret Get(string name, Input<string> id, SmServiceCredentialsSecretState? state, CustomResourceOptions? opts = null)
public static SmServiceCredentialsSecret get(String name, Output<String> id, SmServiceCredentialsSecretState state, CustomResourceOptions options)
resources: _: type: ibm:SmServiceCredentialsSecret get: id: ${id}
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Created
At string - (String) The date when a resource was created. The date format follows RFC 3339.
- Created
By string - (String) The unique identifier that is associated with the entity that created the secret.
- Constraints: The maximum length is
128
characters. The minimum length is4
characters.
- Constraints: The maximum length is
- Credentials Dictionary<string, string>
- (List) The properties of the service credentials secret payload. Nested scheme for credentials:
- Crn string
- (String) The resource key CRN of the generated service credentials.
- Custom
Metadata Dictionary<string, string> - The secret metadata that a user can customize.
- Description string
- An extended description of your secret.To protect your privacy, do not use personal data, such as your name or location, as a description for your secret group.
- Constraints: The maximum length is
1024
characters. The minimum length is0
characters. The value must match regular expression/(.*?)/
.
- Constraints: The maximum length is
- Downloaded bool
- (Boolean) Indicates whether the secret data that is associated with a secret version was retrieved in a call to the service API.
- Endpoint
Type string - The endpoint type. If not provided the endpoint type is determined by the
visibility
argument provided in the provider configuration.- Constraints: Allowable values are:
private
,public
.
- Constraints: Allowable values are:
- Expiration
Date string - (String) The date a secret is expired. The date format follows RFC 3339.
- Instance
Id string - The GUID of the Secrets Manager instance.
- Labels List<string>
- Labels that you can use to search for secrets in your instance.Up to 30 labels can be created.
- Constraints: The list items must match regular expression
/(.*?)/
. The maximum length is30
items. The minimum length is0
items.
- Constraints: The list items must match regular expression
- Locks
Total double - (Integer) The number of locks of the secret.
- Constraints: The maximum value is
1000
. The minimum value is0
.
- Constraints: The maximum value is
- Name string
- The human-readable name of your secret.
- Constraints: The maximum length is
256
characters. The minimum length is2
characters. The value must match regular expression^[A-Za-z0-9_][A-Za-z0-9_]*(?:_*-*\.*[A-Za-z0-9]*)*[A-Za-z0-9]+$
.
- Constraints: The maximum length is
- Next
Rotation stringDate - (String) The date that the secret is scheduled for automatic rotation.The service automatically creates a new version of the secret on its next rotation date. This field exists only for secrets that have an existing rotation policy.
- Region string
- The region of the Secrets Manager instance. If not provided defaults to the region defined in the IBM provider configuration.
- Rotation
Sm
Service Credentials Secret Rotation - Determines whether Secrets Manager rotates your secrets automatically. Nested scheme for rotation:
- Secret
Group stringId - A UUID identifier, or
default
secret group.- Constraints: The maximum length is
36
characters. The minimum length is7
characters. The value must match regular expression/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/
.
- Constraints: The maximum length is
- Secret
Id string - The unique identifier of the ServiceCredentialsSecret.
- Secret
Type string - (String) The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials.
- Constraints: Allowable values are:
arbitrary
,imported_cert
,public_cert
,iam_credentials
,kv
,username_password
,private_cert
.
- Constraints: Allowable values are:
- Sm
Service stringCredentials Secret Id - Source
Service SmService Credentials Secret Source Service - The properties required for creating the service credentials for the specified source service instance. Nested scheme for source_service:
- State double
- (Integer) The secret state that is based on NIST SP 800-57. States are integers and correspond to the
Pre-activation = 0
,Active = 1
,Suspended = 2
,Deactivated = 3
, andDestroyed = 5
values.- Constraints: Allowable values are:
0
,1
,2
,3
,5
.
- Constraints: Allowable values are:
- State
Description string - (String) A text representation of the secret state.
- Constraints: Allowable values are:
pre_activation
,active
,suspended
,deactivated
,destroyed
.
- Constraints: Allowable values are:
- Ttl string
- The time-to-live (TTL) or lease duration to assign to generated credentials. The TTL defines for how long generated credentials remain valid. The value should be a string that specifies the number of seconds. Minimum duration is 86400 (1 day). Maximum is 7776000 seconds (90 days).
- Constraints: The maximum length is
7
characters. The minimum length is2
characters.
- Constraints: The maximum length is
- Updated
At string - (String) The date when a resource was recently modified. The date format follows RFC 3339.
- Version
Custom Dictionary<string, string>Metadata - The secret version metadata that a user can customize.
- Versions
Total double - (Integer) The number of versions of the secret.
- Constraints: The maximum value is
50
. The minimum value is0
.
- Constraints: The maximum value is
- Created
At string - (String) The date when a resource was created. The date format follows RFC 3339.
- Created
By string - (String) The unique identifier that is associated with the entity that created the secret.
- Constraints: The maximum length is
128
characters. The minimum length is4
characters.
- Constraints: The maximum length is
- Credentials map[string]string
- (List) The properties of the service credentials secret payload. Nested scheme for credentials:
- Crn string
- (String) The resource key CRN of the generated service credentials.
- Custom
Metadata map[string]string - The secret metadata that a user can customize.
- Description string
- An extended description of your secret.To protect your privacy, do not use personal data, such as your name or location, as a description for your secret group.
- Constraints: The maximum length is
1024
characters. The minimum length is0
characters. The value must match regular expression/(.*?)/
.
- Constraints: The maximum length is
- Downloaded bool
- (Boolean) Indicates whether the secret data that is associated with a secret version was retrieved in a call to the service API.
- Endpoint
Type string - The endpoint type. If not provided the endpoint type is determined by the
visibility
argument provided in the provider configuration.- Constraints: Allowable values are:
private
,public
.
- Constraints: Allowable values are:
- Expiration
Date string - (String) The date a secret is expired. The date format follows RFC 3339.
- Instance
Id string - The GUID of the Secrets Manager instance.
- Labels []string
- Labels that you can use to search for secrets in your instance.Up to 30 labels can be created.
- Constraints: The list items must match regular expression
/(.*?)/
. The maximum length is30
items. The minimum length is0
items.
- Constraints: The list items must match regular expression
- Locks
Total float64 - (Integer) The number of locks of the secret.
- Constraints: The maximum value is
1000
. The minimum value is0
.
- Constraints: The maximum value is
- Name string
- The human-readable name of your secret.
- Constraints: The maximum length is
256
characters. The minimum length is2
characters. The value must match regular expression^[A-Za-z0-9_][A-Za-z0-9_]*(?:_*-*\.*[A-Za-z0-9]*)*[A-Za-z0-9]+$
.
- Constraints: The maximum length is
- Next
Rotation stringDate - (String) The date that the secret is scheduled for automatic rotation.The service automatically creates a new version of the secret on its next rotation date. This field exists only for secrets that have an existing rotation policy.
- Region string
- The region of the Secrets Manager instance. If not provided defaults to the region defined in the IBM provider configuration.
- Rotation
Sm
Service Credentials Secret Rotation Args - Determines whether Secrets Manager rotates your secrets automatically. Nested scheme for rotation:
- Secret
Group stringId - A UUID identifier, or
default
secret group.- Constraints: The maximum length is
36
characters. The minimum length is7
characters. The value must match regular expression/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/
.
- Constraints: The maximum length is
- Secret
Id string - The unique identifier of the ServiceCredentialsSecret.
- Secret
Type string - (String) The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials.
- Constraints: Allowable values are:
arbitrary
,imported_cert
,public_cert
,iam_credentials
,kv
,username_password
,private_cert
.
- Constraints: Allowable values are:
- Sm
Service stringCredentials Secret Id - Source
Service SmService Credentials Secret Source Service Args - The properties required for creating the service credentials for the specified source service instance. Nested scheme for source_service:
- State float64
- (Integer) The secret state that is based on NIST SP 800-57. States are integers and correspond to the
Pre-activation = 0
,Active = 1
,Suspended = 2
,Deactivated = 3
, andDestroyed = 5
values.- Constraints: Allowable values are:
0
,1
,2
,3
,5
.
- Constraints: Allowable values are:
- State
Description string - (String) A text representation of the secret state.
- Constraints: Allowable values are:
pre_activation
,active
,suspended
,deactivated
,destroyed
.
- Constraints: Allowable values are:
- Ttl string
- The time-to-live (TTL) or lease duration to assign to generated credentials. The TTL defines for how long generated credentials remain valid. The value should be a string that specifies the number of seconds. Minimum duration is 86400 (1 day). Maximum is 7776000 seconds (90 days).
- Constraints: The maximum length is
7
characters. The minimum length is2
characters.
- Constraints: The maximum length is
- Updated
At string - (String) The date when a resource was recently modified. The date format follows RFC 3339.
- Version
Custom map[string]stringMetadata - The secret version metadata that a user can customize.
- Versions
Total float64 - (Integer) The number of versions of the secret.
- Constraints: The maximum value is
50
. The minimum value is0
.
- Constraints: The maximum value is
- created
At String - (String) The date when a resource was created. The date format follows RFC 3339.
- created
By String - (String) The unique identifier that is associated with the entity that created the secret.
- Constraints: The maximum length is
128
characters. The minimum length is4
characters.
- Constraints: The maximum length is
- credentials Map<String,String>
- (List) The properties of the service credentials secret payload. Nested scheme for credentials:
- crn String
- (String) The resource key CRN of the generated service credentials.
- custom
Metadata Map<String,String> - The secret metadata that a user can customize.
- description String
- An extended description of your secret.To protect your privacy, do not use personal data, such as your name or location, as a description for your secret group.
- Constraints: The maximum length is
1024
characters. The minimum length is0
characters. The value must match regular expression/(.*?)/
.
- Constraints: The maximum length is
- downloaded Boolean
- (Boolean) Indicates whether the secret data that is associated with a secret version was retrieved in a call to the service API.
- endpoint
Type String - The endpoint type. If not provided the endpoint type is determined by the
visibility
argument provided in the provider configuration.- Constraints: Allowable values are:
private
,public
.
- Constraints: Allowable values are:
- expiration
Date String - (String) The date a secret is expired. The date format follows RFC 3339.
- instance
Id String - The GUID of the Secrets Manager instance.
- labels List<String>
- Labels that you can use to search for secrets in your instance.Up to 30 labels can be created.
- Constraints: The list items must match regular expression
/(.*?)/
. The maximum length is30
items. The minimum length is0
items.
- Constraints: The list items must match regular expression
- locks
Total Double - (Integer) The number of locks of the secret.
- Constraints: The maximum value is
1000
. The minimum value is0
.
- Constraints: The maximum value is
- name String
- The human-readable name of your secret.
- Constraints: The maximum length is
256
characters. The minimum length is2
characters. The value must match regular expression^[A-Za-z0-9_][A-Za-z0-9_]*(?:_*-*\.*[A-Za-z0-9]*)*[A-Za-z0-9]+$
.
- Constraints: The maximum length is
- next
Rotation StringDate - (String) The date that the secret is scheduled for automatic rotation.The service automatically creates a new version of the secret on its next rotation date. This field exists only for secrets that have an existing rotation policy.
- region String
- The region of the Secrets Manager instance. If not provided defaults to the region defined in the IBM provider configuration.
- rotation
Sm
Service Credentials Secret Rotation - Determines whether Secrets Manager rotates your secrets automatically. Nested scheme for rotation:
- secret
Group StringId - A UUID identifier, or
default
secret group.- Constraints: The maximum length is
36
characters. The minimum length is7
characters. The value must match regular expression/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/
.
- Constraints: The maximum length is
- secret
Id String - The unique identifier of the ServiceCredentialsSecret.
- secret
Type String - (String) The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials.
- Constraints: Allowable values are:
arbitrary
,imported_cert
,public_cert
,iam_credentials
,kv
,username_password
,private_cert
.
- Constraints: Allowable values are:
- sm
Service StringCredentials Secret Id - source
Service SmService Credentials Secret Source Service - The properties required for creating the service credentials for the specified source service instance. Nested scheme for source_service:
- state Double
- (Integer) The secret state that is based on NIST SP 800-57. States are integers and correspond to the
Pre-activation = 0
,Active = 1
,Suspended = 2
,Deactivated = 3
, andDestroyed = 5
values.- Constraints: Allowable values are:
0
,1
,2
,3
,5
.
- Constraints: Allowable values are:
- state
Description String - (String) A text representation of the secret state.
- Constraints: Allowable values are:
pre_activation
,active
,suspended
,deactivated
,destroyed
.
- Constraints: Allowable values are:
- ttl String
- The time-to-live (TTL) or lease duration to assign to generated credentials. The TTL defines for how long generated credentials remain valid. The value should be a string that specifies the number of seconds. Minimum duration is 86400 (1 day). Maximum is 7776000 seconds (90 days).
- Constraints: The maximum length is
7
characters. The minimum length is2
characters.
- Constraints: The maximum length is
- updated
At String - (String) The date when a resource was recently modified. The date format follows RFC 3339.
- version
Custom Map<String,String>Metadata - The secret version metadata that a user can customize.
- versions
Total Double - (Integer) The number of versions of the secret.
- Constraints: The maximum value is
50
. The minimum value is0
.
- Constraints: The maximum value is
- created
At string - (String) The date when a resource was created. The date format follows RFC 3339.
- created
By string - (String) The unique identifier that is associated with the entity that created the secret.
- Constraints: The maximum length is
128
characters. The minimum length is4
characters.
- Constraints: The maximum length is
- credentials {[key: string]: string}
- (List) The properties of the service credentials secret payload. Nested scheme for credentials:
- crn string
- (String) The resource key CRN of the generated service credentials.
- custom
Metadata {[key: string]: string} - The secret metadata that a user can customize.
- description string
- An extended description of your secret.To protect your privacy, do not use personal data, such as your name or location, as a description for your secret group.
- Constraints: The maximum length is
1024
characters. The minimum length is0
characters. The value must match regular expression/(.*?)/
.
- Constraints: The maximum length is
- downloaded boolean
- (Boolean) Indicates whether the secret data that is associated with a secret version was retrieved in a call to the service API.
- endpoint
Type string - The endpoint type. If not provided the endpoint type is determined by the
visibility
argument provided in the provider configuration.- Constraints: Allowable values are:
private
,public
.
- Constraints: Allowable values are:
- expiration
Date string - (String) The date a secret is expired. The date format follows RFC 3339.
- instance
Id string - The GUID of the Secrets Manager instance.
- labels string[]
- Labels that you can use to search for secrets in your instance.Up to 30 labels can be created.
- Constraints: The list items must match regular expression
/(.*?)/
. The maximum length is30
items. The minimum length is0
items.
- Constraints: The list items must match regular expression
- locks
Total number - (Integer) The number of locks of the secret.
- Constraints: The maximum value is
1000
. The minimum value is0
.
- Constraints: The maximum value is
- name string
- The human-readable name of your secret.
- Constraints: The maximum length is
256
characters. The minimum length is2
characters. The value must match regular expression^[A-Za-z0-9_][A-Za-z0-9_]*(?:_*-*\.*[A-Za-z0-9]*)*[A-Za-z0-9]+$
.
- Constraints: The maximum length is
- next
Rotation stringDate - (String) The date that the secret is scheduled for automatic rotation.The service automatically creates a new version of the secret on its next rotation date. This field exists only for secrets that have an existing rotation policy.
- region string
- The region of the Secrets Manager instance. If not provided defaults to the region defined in the IBM provider configuration.
- rotation
Sm
Service Credentials Secret Rotation - Determines whether Secrets Manager rotates your secrets automatically. Nested scheme for rotation:
- secret
Group stringId - A UUID identifier, or
default
secret group.- Constraints: The maximum length is
36
characters. The minimum length is7
characters. The value must match regular expression/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/
.
- Constraints: The maximum length is
- secret
Id string - The unique identifier of the ServiceCredentialsSecret.
- secret
Type string - (String) The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials.
- Constraints: Allowable values are:
arbitrary
,imported_cert
,public_cert
,iam_credentials
,kv
,username_password
,private_cert
.
- Constraints: Allowable values are:
- sm
Service stringCredentials Secret Id - source
Service SmService Credentials Secret Source Service - The properties required for creating the service credentials for the specified source service instance. Nested scheme for source_service:
- state number
- (Integer) The secret state that is based on NIST SP 800-57. States are integers and correspond to the
Pre-activation = 0
,Active = 1
,Suspended = 2
,Deactivated = 3
, andDestroyed = 5
values.- Constraints: Allowable values are:
0
,1
,2
,3
,5
.
- Constraints: Allowable values are:
- state
Description string - (String) A text representation of the secret state.
- Constraints: Allowable values are:
pre_activation
,active
,suspended
,deactivated
,destroyed
.
- Constraints: Allowable values are:
- ttl string
- The time-to-live (TTL) or lease duration to assign to generated credentials. The TTL defines for how long generated credentials remain valid. The value should be a string that specifies the number of seconds. Minimum duration is 86400 (1 day). Maximum is 7776000 seconds (90 days).
- Constraints: The maximum length is
7
characters. The minimum length is2
characters.
- Constraints: The maximum length is
- updated
At string - (String) The date when a resource was recently modified. The date format follows RFC 3339.
- version
Custom {[key: string]: string}Metadata - The secret version metadata that a user can customize.
- versions
Total number - (Integer) The number of versions of the secret.
- Constraints: The maximum value is
50
. The minimum value is0
.
- Constraints: The maximum value is
- created_
at str - (String) The date when a resource was created. The date format follows RFC 3339.
- created_
by str - (String) The unique identifier that is associated with the entity that created the secret.
- Constraints: The maximum length is
128
characters. The minimum length is4
characters.
- Constraints: The maximum length is
- credentials Mapping[str, str]
- (List) The properties of the service credentials secret payload. Nested scheme for credentials:
- crn str
- (String) The resource key CRN of the generated service credentials.
- custom_
metadata Mapping[str, str] - The secret metadata that a user can customize.
- description str
- An extended description of your secret.To protect your privacy, do not use personal data, such as your name or location, as a description for your secret group.
- Constraints: The maximum length is
1024
characters. The minimum length is0
characters. The value must match regular expression/(.*?)/
.
- Constraints: The maximum length is
- downloaded bool
- (Boolean) Indicates whether the secret data that is associated with a secret version was retrieved in a call to the service API.
- endpoint_
type str - The endpoint type. If not provided the endpoint type is determined by the
visibility
argument provided in the provider configuration.- Constraints: Allowable values are:
private
,public
.
- Constraints: Allowable values are:
- expiration_
date str - (String) The date a secret is expired. The date format follows RFC 3339.
- instance_
id str - The GUID of the Secrets Manager instance.
- labels Sequence[str]
- Labels that you can use to search for secrets in your instance.Up to 30 labels can be created.
- Constraints: The list items must match regular expression
/(.*?)/
. The maximum length is30
items. The minimum length is0
items.
- Constraints: The list items must match regular expression
- locks_
total float - (Integer) The number of locks of the secret.
- Constraints: The maximum value is
1000
. The minimum value is0
.
- Constraints: The maximum value is
- name str
- The human-readable name of your secret.
- Constraints: The maximum length is
256
characters. The minimum length is2
characters. The value must match regular expression^[A-Za-z0-9_][A-Za-z0-9_]*(?:_*-*\.*[A-Za-z0-9]*)*[A-Za-z0-9]+$
.
- Constraints: The maximum length is
- next_
rotation_ strdate - (String) The date that the secret is scheduled for automatic rotation.The service automatically creates a new version of the secret on its next rotation date. This field exists only for secrets that have an existing rotation policy.
- region str
- The region of the Secrets Manager instance. If not provided defaults to the region defined in the IBM provider configuration.
- rotation
Sm
Service Credentials Secret Rotation Args - Determines whether Secrets Manager rotates your secrets automatically. Nested scheme for rotation:
- secret_
group_ strid - A UUID identifier, or
default
secret group.- Constraints: The maximum length is
36
characters. The minimum length is7
characters. The value must match regular expression/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/
.
- Constraints: The maximum length is
- secret_
id str - The unique identifier of the ServiceCredentialsSecret.
- secret_
type str - (String) The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials.
- Constraints: Allowable values are:
arbitrary
,imported_cert
,public_cert
,iam_credentials
,kv
,username_password
,private_cert
.
- Constraints: Allowable values are:
- sm_
service_ strcredentials_ secret_ id - source_
service SmService Credentials Secret Source Service Args - The properties required for creating the service credentials for the specified source service instance. Nested scheme for source_service:
- state float
- (Integer) The secret state that is based on NIST SP 800-57. States are integers and correspond to the
Pre-activation = 0
,Active = 1
,Suspended = 2
,Deactivated = 3
, andDestroyed = 5
values.- Constraints: Allowable values are:
0
,1
,2
,3
,5
.
- Constraints: Allowable values are:
- state_
description str - (String) A text representation of the secret state.
- Constraints: Allowable values are:
pre_activation
,active
,suspended
,deactivated
,destroyed
.
- Constraints: Allowable values are:
- ttl str
- The time-to-live (TTL) or lease duration to assign to generated credentials. The TTL defines for how long generated credentials remain valid. The value should be a string that specifies the number of seconds. Minimum duration is 86400 (1 day). Maximum is 7776000 seconds (90 days).
- Constraints: The maximum length is
7
characters. The minimum length is2
characters.
- Constraints: The maximum length is
- updated_
at str - (String) The date when a resource was recently modified. The date format follows RFC 3339.
- version_
custom_ Mapping[str, str]metadata - The secret version metadata that a user can customize.
- versions_
total float - (Integer) The number of versions of the secret.
- Constraints: The maximum value is
50
. The minimum value is0
.
- Constraints: The maximum value is
- created
At String - (String) The date when a resource was created. The date format follows RFC 3339.
- created
By String - (String) The unique identifier that is associated with the entity that created the secret.
- Constraints: The maximum length is
128
characters. The minimum length is4
characters.
- Constraints: The maximum length is
- credentials Map<String>
- (List) The properties of the service credentials secret payload. Nested scheme for credentials:
- crn String
- (String) The resource key CRN of the generated service credentials.
- custom
Metadata Map<String> - The secret metadata that a user can customize.
- description String
- An extended description of your secret.To protect your privacy, do not use personal data, such as your name or location, as a description for your secret group.
- Constraints: The maximum length is
1024
characters. The minimum length is0
characters. The value must match regular expression/(.*?)/
.
- Constraints: The maximum length is
- downloaded Boolean
- (Boolean) Indicates whether the secret data that is associated with a secret version was retrieved in a call to the service API.
- endpoint
Type String - The endpoint type. If not provided the endpoint type is determined by the
visibility
argument provided in the provider configuration.- Constraints: Allowable values are:
private
,public
.
- Constraints: Allowable values are:
- expiration
Date String - (String) The date a secret is expired. The date format follows RFC 3339.
- instance
Id String - The GUID of the Secrets Manager instance.
- labels List<String>
- Labels that you can use to search for secrets in your instance.Up to 30 labels can be created.
- Constraints: The list items must match regular expression
/(.*?)/
. The maximum length is30
items. The minimum length is0
items.
- Constraints: The list items must match regular expression
- locks
Total Number - (Integer) The number of locks of the secret.
- Constraints: The maximum value is
1000
. The minimum value is0
.
- Constraints: The maximum value is
- name String
- The human-readable name of your secret.
- Constraints: The maximum length is
256
characters. The minimum length is2
characters. The value must match regular expression^[A-Za-z0-9_][A-Za-z0-9_]*(?:_*-*\.*[A-Za-z0-9]*)*[A-Za-z0-9]+$
.
- Constraints: The maximum length is
- next
Rotation StringDate - (String) The date that the secret is scheduled for automatic rotation.The service automatically creates a new version of the secret on its next rotation date. This field exists only for secrets that have an existing rotation policy.
- region String
- The region of the Secrets Manager instance. If not provided defaults to the region defined in the IBM provider configuration.
- rotation Property Map
- Determines whether Secrets Manager rotates your secrets automatically. Nested scheme for rotation:
- secret
Group StringId - A UUID identifier, or
default
secret group.- Constraints: The maximum length is
36
characters. The minimum length is7
characters. The value must match regular expression/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/
.
- Constraints: The maximum length is
- secret
Id String - The unique identifier of the ServiceCredentialsSecret.
- secret
Type String - (String) The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials.
- Constraints: Allowable values are:
arbitrary
,imported_cert
,public_cert
,iam_credentials
,kv
,username_password
,private_cert
.
- Constraints: Allowable values are:
- sm
Service StringCredentials Secret Id - source
Service Property Map - The properties required for creating the service credentials for the specified source service instance. Nested scheme for source_service:
- state Number
- (Integer) The secret state that is based on NIST SP 800-57. States are integers and correspond to the
Pre-activation = 0
,Active = 1
,Suspended = 2
,Deactivated = 3
, andDestroyed = 5
values.- Constraints: Allowable values are:
0
,1
,2
,3
,5
.
- Constraints: Allowable values are:
- state
Description String - (String) A text representation of the secret state.
- Constraints: Allowable values are:
pre_activation
,active
,suspended
,deactivated
,destroyed
.
- Constraints: Allowable values are:
- ttl String
- The time-to-live (TTL) or lease duration to assign to generated credentials. The TTL defines for how long generated credentials remain valid. The value should be a string that specifies the number of seconds. Minimum duration is 86400 (1 day). Maximum is 7776000 seconds (90 days).
- Constraints: The maximum length is
7
characters. The minimum length is2
characters.
- Constraints: The maximum length is
- updated
At String - (String) The date when a resource was recently modified. The date format follows RFC 3339.
- version
Custom Map<String>Metadata - The secret version metadata that a user can customize.
- versions
Total Number - (Integer) The number of versions of the secret.
- Constraints: The maximum value is
50
. The minimum value is0
.
- Constraints: The maximum value is
Supporting Types
SmServiceCredentialsSecretRotation, SmServiceCredentialsSecretRotationArgs
- Auto
Rotate bool - Determines whether Secrets Manager rotates your secret automatically.Default is
false
. Ifauto_rotate
is set totrue
the service rotates your secret based on the defined interval. - Interval double
- The length of the secret rotation time interval.
- Constraints: The minimum value is
1
.
- Constraints: The minimum value is
- Unit string
- The units for the secret rotation time interval.
- Constraints: Allowable values are:
day
,month
.
- Constraints: Allowable values are:
- Auto
Rotate bool - Determines whether Secrets Manager rotates your secret automatically.Default is
false
. Ifauto_rotate
is set totrue
the service rotates your secret based on the defined interval. - Interval float64
- The length of the secret rotation time interval.
- Constraints: The minimum value is
1
.
- Constraints: The minimum value is
- Unit string
- The units for the secret rotation time interval.
- Constraints: Allowable values are:
day
,month
.
- Constraints: Allowable values are:
- auto
Rotate Boolean - Determines whether Secrets Manager rotates your secret automatically.Default is
false
. Ifauto_rotate
is set totrue
the service rotates your secret based on the defined interval. - interval Double
- The length of the secret rotation time interval.
- Constraints: The minimum value is
1
.
- Constraints: The minimum value is
- unit String
- The units for the secret rotation time interval.
- Constraints: Allowable values are:
day
,month
.
- Constraints: Allowable values are:
- auto
Rotate boolean - Determines whether Secrets Manager rotates your secret automatically.Default is
false
. Ifauto_rotate
is set totrue
the service rotates your secret based on the defined interval. - interval number
- The length of the secret rotation time interval.
- Constraints: The minimum value is
1
.
- Constraints: The minimum value is
- unit string
- The units for the secret rotation time interval.
- Constraints: Allowable values are:
day
,month
.
- Constraints: Allowable values are:
- auto_
rotate bool - Determines whether Secrets Manager rotates your secret automatically.Default is
false
. Ifauto_rotate
is set totrue
the service rotates your secret based on the defined interval. - interval float
- The length of the secret rotation time interval.
- Constraints: The minimum value is
1
.
- Constraints: The minimum value is
- unit str
- The units for the secret rotation time interval.
- Constraints: Allowable values are:
day
,month
.
- Constraints: Allowable values are:
- auto
Rotate Boolean - Determines whether Secrets Manager rotates your secret automatically.Default is
false
. Ifauto_rotate
is set totrue
the service rotates your secret based on the defined interval. - interval Number
- The length of the secret rotation time interval.
- Constraints: The minimum value is
1
.
- Constraints: The minimum value is
- unit String
- The units for the secret rotation time interval.
- Constraints: Allowable values are:
day
,month
.
- Constraints: Allowable values are:
SmServiceCredentialsSecretSourceService, SmServiceCredentialsSecretSourceServiceArgs
- Instance
Sm
Service Credentials Secret Source Service Instance - The source service instance identifier. Nested scheme for instance:
- Iams
List<Sm
Service Credentials Secret Source Service Iam> - (List) The source service IAM data is returned in case IAM credentials where created for this secret. Nested scheme for iam:
- Parameters Dictionary<string, string>
- Configuration options represented as key-value pairs. Service-defined options are used in the generation of credentials for some services. For example, Cloud Object Storage accepts the optional boolean parameter HMAC for creating specific kind of credentials.
- Resource
Keys List<SmService Credentials Secret Source Service Resource Key> - (List) The source service resource key data of the generated service credentials. Nested scheme for resource_key:
- Role
Sm
Service Credentials Secret Source Service Role - The service-specific custom role object, CRN role is accepted. Refer to the service’s documentation for supported roles. Nested scheme for role:
- Instance
Sm
Service Credentials Secret Source Service Instance - The source service instance identifier. Nested scheme for instance:
- Iams
[]Sm
Service Credentials Secret Source Service Iam - (List) The source service IAM data is returned in case IAM credentials where created for this secret. Nested scheme for iam:
- Parameters map[string]string
- Configuration options represented as key-value pairs. Service-defined options are used in the generation of credentials for some services. For example, Cloud Object Storage accepts the optional boolean parameter HMAC for creating specific kind of credentials.
- Resource
Keys []SmService Credentials Secret Source Service Resource Key - (List) The source service resource key data of the generated service credentials. Nested scheme for resource_key:
- Role
Sm
Service Credentials Secret Source Service Role - The service-specific custom role object, CRN role is accepted. Refer to the service’s documentation for supported roles. Nested scheme for role:
- instance
Sm
Service Credentials Secret Source Service Instance - The source service instance identifier. Nested scheme for instance:
- iams
List<Sm
Service Credentials Secret Source Service Iam> - (List) The source service IAM data is returned in case IAM credentials where created for this secret. Nested scheme for iam:
- parameters Map<String,String>
- Configuration options represented as key-value pairs. Service-defined options are used in the generation of credentials for some services. For example, Cloud Object Storage accepts the optional boolean parameter HMAC for creating specific kind of credentials.
- resource
Keys List<SmService Credentials Secret Source Service Resource Key> - (List) The source service resource key data of the generated service credentials. Nested scheme for resource_key:
- role
Sm
Service Credentials Secret Source Service Role - The service-specific custom role object, CRN role is accepted. Refer to the service’s documentation for supported roles. Nested scheme for role:
- instance
Sm
Service Credentials Secret Source Service Instance - The source service instance identifier. Nested scheme for instance:
- iams
Sm
Service Credentials Secret Source Service Iam[] - (List) The source service IAM data is returned in case IAM credentials where created for this secret. Nested scheme for iam:
- parameters {[key: string]: string}
- Configuration options represented as key-value pairs. Service-defined options are used in the generation of credentials for some services. For example, Cloud Object Storage accepts the optional boolean parameter HMAC for creating specific kind of credentials.
- resource
Keys SmService Credentials Secret Source Service Resource Key[] - (List) The source service resource key data of the generated service credentials. Nested scheme for resource_key:
- role
Sm
Service Credentials Secret Source Service Role - The service-specific custom role object, CRN role is accepted. Refer to the service’s documentation for supported roles. Nested scheme for role:
- instance
Sm
Service Credentials Secret Source Service Instance - The source service instance identifier. Nested scheme for instance:
- iams
Sequence[Sm
Service Credentials Secret Source Service Iam] - (List) The source service IAM data is returned in case IAM credentials where created for this secret. Nested scheme for iam:
- parameters Mapping[str, str]
- Configuration options represented as key-value pairs. Service-defined options are used in the generation of credentials for some services. For example, Cloud Object Storage accepts the optional boolean parameter HMAC for creating specific kind of credentials.
- resource_
keys Sequence[SmService Credentials Secret Source Service Resource Key] - (List) The source service resource key data of the generated service credentials. Nested scheme for resource_key:
- role
Sm
Service Credentials Secret Source Service Role - The service-specific custom role object, CRN role is accepted. Refer to the service’s documentation for supported roles. Nested scheme for role:
- instance Property Map
- The source service instance identifier. Nested scheme for instance:
- iams List<Property Map>
- (List) The source service IAM data is returned in case IAM credentials where created for this secret. Nested scheme for iam:
- parameters Map<String>
- Configuration options represented as key-value pairs. Service-defined options are used in the generation of credentials for some services. For example, Cloud Object Storage accepts the optional boolean parameter HMAC for creating specific kind of credentials.
- resource
Keys List<Property Map> - (List) The source service resource key data of the generated service credentials. Nested scheme for resource_key:
- role Property Map
- The service-specific custom role object, CRN role is accepted. Refer to the service’s documentation for supported roles. Nested scheme for role:
SmServiceCredentialsSecretSourceServiceIam, SmServiceCredentialsSecretSourceServiceIamArgs
- Apikeys
List<Sm
Service Credentials Secret Source Service Iam Apikey> - (String) The IAM apikey metadata for the IAM credentials that were generated. Nested scheme for apikey:
- Roles
List<Sm
Service Credentials Secret Source Service Iam Role> - (String) The IAM role for the generate service credentials. Nested scheme for role:
- Serviceids
List<Sm
Service Credentials Secret Source Service Iam Serviceid> - (String) The IAM serviceid for the generated service credentials. Nested scheme for serviceid:
- Apikeys
[]Sm
Service Credentials Secret Source Service Iam Apikey - (String) The IAM apikey metadata for the IAM credentials that were generated. Nested scheme for apikey:
- Roles
[]Sm
Service Credentials Secret Source Service Iam Role - (String) The IAM role for the generate service credentials. Nested scheme for role:
- Serviceids
[]Sm
Service Credentials Secret Source Service Iam Serviceid - (String) The IAM serviceid for the generated service credentials. Nested scheme for serviceid:
- apikeys
List<Sm
Service Credentials Secret Source Service Iam Apikey> - (String) The IAM apikey metadata for the IAM credentials that were generated. Nested scheme for apikey:
- roles
List<Sm
Service Credentials Secret Source Service Iam Role> - (String) The IAM role for the generate service credentials. Nested scheme for role:
- serviceids
List<Sm
Service Credentials Secret Source Service Iam Serviceid> - (String) The IAM serviceid for the generated service credentials. Nested scheme for serviceid:
- apikeys
Sm
Service Credentials Secret Source Service Iam Apikey[] - (String) The IAM apikey metadata for the IAM credentials that were generated. Nested scheme for apikey:
- roles
Sm
Service Credentials Secret Source Service Iam Role[] - (String) The IAM role for the generate service credentials. Nested scheme for role:
- serviceids
Sm
Service Credentials Secret Source Service Iam Serviceid[] - (String) The IAM serviceid for the generated service credentials. Nested scheme for serviceid:
- apikeys
Sequence[Sm
Service Credentials Secret Source Service Iam Apikey] - (String) The IAM apikey metadata for the IAM credentials that were generated. Nested scheme for apikey:
- roles
Sequence[Sm
Service Credentials Secret Source Service Iam Role] - (String) The IAM role for the generate service credentials. Nested scheme for role:
- serviceids
Sequence[Sm
Service Credentials Secret Source Service Iam Serviceid] - (String) The IAM serviceid for the generated service credentials. Nested scheme for serviceid:
- apikeys List<Property Map>
- (String) The IAM apikey metadata for the IAM credentials that were generated. Nested scheme for apikey:
- roles List<Property Map>
- (String) The IAM role for the generate service credentials. Nested scheme for role:
- serviceids List<Property Map>
- (String) The IAM serviceid for the generated service credentials. Nested scheme for serviceid:
SmServiceCredentialsSecretSourceServiceIamApikey, SmServiceCredentialsSecretSourceServiceIamApikeyArgs
- Description string
- An extended description of your secret.To protect your privacy, do not use personal data, such as your name or location, as a description for your secret group.
- Constraints: The maximum length is
1024
characters. The minimum length is0
characters. The value must match regular expression/(.*?)/
.
- Constraints: The maximum length is
- Name string
- The human-readable name of your secret.
- Constraints: The maximum length is
256
characters. The minimum length is2
characters. The value must match regular expression^[A-Za-z0-9_][A-Za-z0-9_]*(?:_*-*\.*[A-Za-z0-9]*)*[A-Za-z0-9]+$
.
- Constraints: The maximum length is
- Description string
- An extended description of your secret.To protect your privacy, do not use personal data, such as your name or location, as a description for your secret group.
- Constraints: The maximum length is
1024
characters. The minimum length is0
characters. The value must match regular expression/(.*?)/
.
- Constraints: The maximum length is
- Name string
- The human-readable name of your secret.
- Constraints: The maximum length is
256
characters. The minimum length is2
characters. The value must match regular expression^[A-Za-z0-9_][A-Za-z0-9_]*(?:_*-*\.*[A-Za-z0-9]*)*[A-Za-z0-9]+$
.
- Constraints: The maximum length is
- description String
- An extended description of your secret.To protect your privacy, do not use personal data, such as your name or location, as a description for your secret group.
- Constraints: The maximum length is
1024
characters. The minimum length is0
characters. The value must match regular expression/(.*?)/
.
- Constraints: The maximum length is
- name String
- The human-readable name of your secret.
- Constraints: The maximum length is
256
characters. The minimum length is2
characters. The value must match regular expression^[A-Za-z0-9_][A-Za-z0-9_]*(?:_*-*\.*[A-Za-z0-9]*)*[A-Za-z0-9]+$
.
- Constraints: The maximum length is
- description string
- An extended description of your secret.To protect your privacy, do not use personal data, such as your name or location, as a description for your secret group.
- Constraints: The maximum length is
1024
characters. The minimum length is0
characters. The value must match regular expression/(.*?)/
.
- Constraints: The maximum length is
- name string
- The human-readable name of your secret.
- Constraints: The maximum length is
256
characters. The minimum length is2
characters. The value must match regular expression^[A-Za-z0-9_][A-Za-z0-9_]*(?:_*-*\.*[A-Za-z0-9]*)*[A-Za-z0-9]+$
.
- Constraints: The maximum length is
- description str
- An extended description of your secret.To protect your privacy, do not use personal data, such as your name or location, as a description for your secret group.
- Constraints: The maximum length is
1024
characters. The minimum length is0
characters. The value must match regular expression/(.*?)/
.
- Constraints: The maximum length is
- name str
- The human-readable name of your secret.
- Constraints: The maximum length is
256
characters. The minimum length is2
characters. The value must match regular expression^[A-Za-z0-9_][A-Za-z0-9_]*(?:_*-*\.*[A-Za-z0-9]*)*[A-Za-z0-9]+$
.
- Constraints: The maximum length is
- description String
- An extended description of your secret.To protect your privacy, do not use personal data, such as your name or location, as a description for your secret group.
- Constraints: The maximum length is
1024
characters. The minimum length is0
characters. The value must match regular expression/(.*?)/
.
- Constraints: The maximum length is
- name String
- The human-readable name of your secret.
- Constraints: The maximum length is
256
characters. The minimum length is2
characters. The value must match regular expression^[A-Za-z0-9_][A-Za-z0-9_]*(?:_*-*\.*[A-Za-z0-9]*)*[A-Za-z0-9]+$
.
- Constraints: The maximum length is
SmServiceCredentialsSecretSourceServiceIamRole, SmServiceCredentialsSecretSourceServiceIamRoleArgs
- Crn string
- (String) The resource key CRN of the generated service credentials.
- Crn string
- (String) The resource key CRN of the generated service credentials.
- crn String
- (String) The resource key CRN of the generated service credentials.
- crn string
- (String) The resource key CRN of the generated service credentials.
- crn str
- (String) The resource key CRN of the generated service credentials.
- crn String
- (String) The resource key CRN of the generated service credentials.
SmServiceCredentialsSecretSourceServiceIamServiceid, SmServiceCredentialsSecretSourceServiceIamServiceidArgs
- Crn string
- (String) The resource key CRN of the generated service credentials.
- Crn string
- (String) The resource key CRN of the generated service credentials.
- crn String
- (String) The resource key CRN of the generated service credentials.
- crn string
- (String) The resource key CRN of the generated service credentials.
- crn str
- (String) The resource key CRN of the generated service credentials.
- crn String
- (String) The resource key CRN of the generated service credentials.
SmServiceCredentialsSecretSourceServiceInstance, SmServiceCredentialsSecretSourceServiceInstanceArgs
- Crn string
- A CRN that uniquely identifies a service credentials source.
- Crn string
- A CRN that uniquely identifies a service credentials source.
- crn String
- A CRN that uniquely identifies a service credentials source.
- crn string
- A CRN that uniquely identifies a service credentials source.
- crn str
- A CRN that uniquely identifies a service credentials source.
- crn String
- A CRN that uniquely identifies a service credentials source.
SmServiceCredentialsSecretSourceServiceResourceKey, SmServiceCredentialsSecretSourceServiceResourceKeyArgs
- Crn string
- (String) The resource key CRN of the generated service credentials.
- Name string
- The human-readable name of your secret.
- Constraints: The maximum length is
256
characters. The minimum length is2
characters. The value must match regular expression^[A-Za-z0-9_][A-Za-z0-9_]*(?:_*-*\.*[A-Za-z0-9]*)*[A-Za-z0-9]+$
.
- Constraints: The maximum length is
- Crn string
- (String) The resource key CRN of the generated service credentials.
- Name string
- The human-readable name of your secret.
- Constraints: The maximum length is
256
characters. The minimum length is2
characters. The value must match regular expression^[A-Za-z0-9_][A-Za-z0-9_]*(?:_*-*\.*[A-Za-z0-9]*)*[A-Za-z0-9]+$
.
- Constraints: The maximum length is
- crn String
- (String) The resource key CRN of the generated service credentials.
- name String
- The human-readable name of your secret.
- Constraints: The maximum length is
256
characters. The minimum length is2
characters. The value must match regular expression^[A-Za-z0-9_][A-Za-z0-9_]*(?:_*-*\.*[A-Za-z0-9]*)*[A-Za-z0-9]+$
.
- Constraints: The maximum length is
- crn string
- (String) The resource key CRN of the generated service credentials.
- name string
- The human-readable name of your secret.
- Constraints: The maximum length is
256
characters. The minimum length is2
characters. The value must match regular expression^[A-Za-z0-9_][A-Za-z0-9_]*(?:_*-*\.*[A-Za-z0-9]*)*[A-Za-z0-9]+$
.
- Constraints: The maximum length is
- crn str
- (String) The resource key CRN of the generated service credentials.
- name str
- The human-readable name of your secret.
- Constraints: The maximum length is
256
characters. The minimum length is2
characters. The value must match regular expression^[A-Za-z0-9_][A-Za-z0-9_]*(?:_*-*\.*[A-Za-z0-9]*)*[A-Za-z0-9]+$
.
- Constraints: The maximum length is
- crn String
- (String) The resource key CRN of the generated service credentials.
- name String
- The human-readable name of your secret.
- Constraints: The maximum length is
256
characters. The minimum length is2
characters. The value must match regular expression^[A-Za-z0-9_][A-Za-z0-9_]*(?:_*-*\.*[A-Za-z0-9]*)*[A-Za-z0-9]+$
.
- Constraints: The maximum length is
SmServiceCredentialsSecretSourceServiceRole, SmServiceCredentialsSecretSourceServiceRoleArgs
- Crn string
- The service role CRN.
- Crn string
- The service role CRN.
- crn String
- The service role CRN.
- crn string
- The service role CRN.
- crn str
- The service role CRN.
- crn String
- The service role CRN.
Import
You can import the ibm_sm_service_credentials_secret
resource by using region
, instance_id
, and secret_id
.
For more information, see the documentation
Syntax
bash
$ pulumi import ibm:index/smServiceCredentialsSecret:SmServiceCredentialsSecret sm_service_credentials_secret <region>/<instance_id>/<secret_id>
Example
bash
$ pulumi import ibm:index/smServiceCredentialsSecret:SmServiceCredentialsSecret sm_service_credentials_secret us-east/6ebc4224-e983-496a-8a54-f40a0bfa9175/b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- ibm ibm-cloud/terraform-provider-ibm
- License
- Notes
- This Pulumi package is based on the
ibm
Terraform Provider.