From b4c4301550c43eaf5de31cf814afd1f58d3584c6 Mon Sep 17 00:00:00 2001 From: yonatanyell <69857977+yonatanyell@users.noreply.github.com> Date: Mon, 16 Dec 2024 13:12:10 +0200 Subject: [PATCH] SM docs update (#5857) * SC addition * SC addition * SC addition * update function updated * SC unit tests added * SC unit tests added * d * tests fixes * tests fixes * update sdk * .secrets.baseline update * .secrets.baseline update * .secrets.baseline update * Update sm_service_credentials_secret_metadata.html.markdown * bugs fixes * bugs fixes * bugs fixes * docs bugs fixes * preferred_chain added for public cert lets encrypt configuration * support for creating secret version for username password & version_custom_metadata for all * support for creating secret version for username password & version_custom_metadata for all * support for creating secret version for username password & version_custom_metadata for all * support for creating secret version for username password & version_custom_metadata for all * support for creating secret version for username password & version_custom_metadata for all * support for creating secret version for username password & version_custom_metadata for all * preferred chain docs update * support for creating secret version for username password & version_custom_metadata for all * support for creating secret version for username password & version_custom_metadata for all * support for creating secret version for username password & version_custom_metadata for all * fix public cert bug * update docs * reordering bug in alt_names * name regex fix in docs * imported cert bug fix * crypto_key addition * crypto_key addition * crypto_key addition * crypto_key addition * rejections fixes * rejections fixes * rejections fixes * rejections fixes * rejections fixes * test label name changed * test label name changed * error formating update * go sdk version update * update docs & descriptions for uuid --------- Co-authored-by: Yonathan-Yellin Co-authored-by: Avi Ribchinsky Co-authored-by: Tatyana Co-authored-by: Idan Adar --- examples/ibm-secrets-manager/README.md | 2 +- examples/ibm-secrets-manager/variables.tf | 16 ++--- .../data_source_ibm_sm_arbitrary_secret.go | 2 +- ...source_ibm_sm_arbitrary_secret_metadata.go | 2 +- ...ta_source_ibm_sm_iam_credentials_secret.go | 2 +- ..._ibm_sm_iam_credentials_secret_metadata.go | 2 +- ...data_source_ibm_sm_imported_certificate.go | 2 +- ...ce_ibm_sm_imported_certificate_metadata.go | 2 +- .../data_source_ibm_sm_kv_secret.go | 2 +- .../data_source_ibm_sm_kv_secret_metadata.go | 2 +- .../data_source_ibm_sm_private_certificate.go | 2 +- ...rce_ibm_sm_private_certificate_metadata.go | 2 +- .../data_source_ibm_sm_public_certificate.go | 2 +- ...urce_ibm_sm_public_certificate_metadata.go | 2 +- .../data_source_ibm_sm_secret_groups.go | 2 +- .../data_source_ibm_sm_secrets.go | 4 +- ...ource_ibm_sm_service_credentials_secret.go | 2 +- ..._sm_service_credentials_secret_metadata.go | 2 +- ..._source_ibm_sm_username_password_secret.go | 2 +- ...bm_sm_username_password_secret_metadata.go | 2 +- .../resource_ibm_sm_arbitrary_secret.go | 4 +- .../resource_ibm_sm_iam_credentials_secret.go | 4 +- .../resource_ibm_sm_imported_certificate.go | 4 +- .../resource_ibm_sm_kv_secret.go | 4 +- .../resource_ibm_sm_private_certificate.go | 4 +- .../resource_ibm_sm_public_certificate.go | 4 +- ..._certificate_action_validate_manual_dns.go | 2 +- .../resource_ibm_sm_secret_group.go | 2 +- ...ource_ibm_sm_service_credentials_secret.go | 4 +- ...esource_ibm_sm_username_password_secret.go | 4 +- metadata/provider_metadata.json | 66 +++++++++---------- .../docs/d/sm_arbitrary_secret.html.markdown | 2 +- ...sm_arbitrary_secret_metadata.html.markdown | 2 +- .../d/sm_iam_credentials_secret.html.markdown | 2 +- ..._credentials_secret_metadata.html.markdown | 2 +- .../d/sm_imported_certificate.html.markdown | 2 +- ...mported_certificate_metadata.html.markdown | 2 +- website/docs/d/sm_kv_secret.html.markdown | 2 +- .../d/sm_kv_secret_metadata.html.markdown | 2 +- .../d/sm_private_certificate.html.markdown | 2 +- ...private_certificate_metadata.html.markdown | 2 +- .../d/sm_public_certificate.html.markdown | 2 +- ..._public_certificate_metadata.html.markdown | 2 +- website/docs/d/sm_secret_groups.html.markdown | 2 +- website/docs/d/sm_secrets.html.markdown | 4 +- ...m_service_credentials_secret.html.markdown | 2 +- ..._credentials_secret_metadata.html.markdown | 2 +- .../sm_username_password_secret.html.markdown | 2 +- ...ame_password_secret_metadata.html.markdown | 2 +- .../docs/r/sm_arbitrary_secret.html.markdown | 2 +- .../r/sm_iam_credentials_secret.html.markdown | 2 +- .../r/sm_imported_certificate.html.markdown | 2 +- website/docs/r/sm_kv_secret.html.markdown | 2 +- .../r/sm_private_certificate.html.markdown | 2 +- .../r/sm_public_certificate.html.markdown | 2 +- ...m_service_credentials_secret.html.markdown | 2 +- .../sm_username_password_secret.html.markdown | 2 +- 57 files changed, 106 insertions(+), 106 deletions(-) diff --git a/examples/ibm-secrets-manager/README.md b/examples/ibm-secrets-manager/README.md index b970c84196f..8c278f9e12d 100644 --- a/examples/ibm-secrets-manager/README.md +++ b/examples/ibm-secrets-manager/README.md @@ -555,7 +555,7 @@ data "sm_en_registration" "sm_en_registration_instance" { | description | An extended description of your secret.To protect your privacy, do not use personal data, such as your name or location, as a description for your secret group. | `string` | false | | expiration_date | The date a secret is expired. The date format follows RFC 3339. | `` | false | | labels | Labels that you can use to search for secrets in your instance.Up to 30 labels can be created. | `list(string)` | false | -| secret_group_id | A v4 UUID identifier, or `default` secret group. | `string` | false | +| secret_group_id | A UUID identifier, or `default` secret group. | `string` | false | | secret_type | The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials. | `string` | false | | certificate | The PEM-encoded contents of your certificate. | `string` | false | | intermediate | (Optional) The PEM-encoded intermediate certificate to associate with the root certificate. | `string` | false | diff --git a/examples/ibm-secrets-manager/variables.tf b/examples/ibm-secrets-manager/variables.tf index a0a123adde4..51510e73e99 100644 --- a/examples/ibm-secrets-manager/variables.tf +++ b/examples/ibm-secrets-manager/variables.tf @@ -59,7 +59,7 @@ variable "sm_imported_certificate_labels" { default = [ "my-label" ] } variable "sm_imported_certificate_secret_group_id" { - description = "A v4 UUID identifier, or `default` secret group." + description = "A UUID identifier, or `default` secret group." type = string default = "default" } @@ -106,7 +106,7 @@ variable "sm_public_certificate_labels" { default = [ "my-label" ] } variable "sm_public_certificate_secret_group_id" { - description = "A v4 UUID identifier, or `default` secret group." + description = "A UUID identifier, or `default` secret group." type = string default = "default" } @@ -140,7 +140,7 @@ variable "sm_kv_secret_labels" { default = [ "my-label" ] } variable "sm_kv_secret_secret_group_id" { - description = "A v4 UUID identifier, or `default` secret group." + description = "A UUID identifier, or `default` secret group." type = string default = "default" } @@ -172,7 +172,7 @@ variable "sm_iam_credentials_secret_labels" { default = [ "my-label" ] } variable "sm_iam_credentials_secret_secret_group_id" { - description = "A v4 UUID identifier, or `default` secret group." + description = "A UUID identifier, or `default` secret group." type = string default = "default" } @@ -214,7 +214,7 @@ variable "sm_service_credentials_secret_labels" { default = [ "my-label" ] } variable "sm_service_credentials_secret_secret_group_id" { - description = "A v4 UUID identifier, or `default` secret group." + description = "A UUID identifier, or `default` secret group." type = string default = "default" } @@ -267,7 +267,7 @@ variable "sm_arbitrary_secret_labels" { default = [ "my-label" ] } variable "sm_arbitrary_secret_secret_group_id" { - description = "A v4 UUID identifier, or `default` secret group." + description = "A UUID identifier, or `default` secret group." type = string default = "default" } @@ -304,7 +304,7 @@ variable "sm_username_password_secret_labels" { default = [ "my-label" ] } variable "sm_username_password_secret_secret_group_id" { - description = "A v4 UUID identifier, or `default` secret group." + description = "A UUID identifier, or `default` secret group." type = string default = "default" } @@ -346,7 +346,7 @@ variable "sm_private_certificate_labels" { default = [ "my-label" ] } variable "sm_private_certificate_secret_group_id" { - description = "A v4 UUID identifier, or `default` secret group." + description = "A UUID identifier, or `default` secret group." type = string default = "default" } diff --git a/ibm/service/secretsmanager/data_source_ibm_sm_arbitrary_secret.go b/ibm/service/secretsmanager/data_source_ibm_sm_arbitrary_secret.go index 2cd8853a852..6a979f71038 100644 --- a/ibm/service/secretsmanager/data_source_ibm_sm_arbitrary_secret.go +++ b/ibm/service/secretsmanager/data_source_ibm_sm_arbitrary_secret.go @@ -82,7 +82,7 @@ func DataSourceIbmSmArbitrarySecret() *schema.Resource { "secret_group_id": &schema.Schema{ Type: schema.TypeString, Computed: true, - Description: "A v4 UUID identifier, or `default` secret group.", + Description: "A UUID identifier, or `default` secret group.", }, "secret_group_name": &schema.Schema{ Type: schema.TypeString, diff --git a/ibm/service/secretsmanager/data_source_ibm_sm_arbitrary_secret_metadata.go b/ibm/service/secretsmanager/data_source_ibm_sm_arbitrary_secret_metadata.go index c822a89341d..f677c9c4cf5 100644 --- a/ibm/service/secretsmanager/data_source_ibm_sm_arbitrary_secret_metadata.go +++ b/ibm/service/secretsmanager/data_source_ibm_sm_arbitrary_secret_metadata.go @@ -80,7 +80,7 @@ func DataSourceIbmSmArbitrarySecretMetadata() *schema.Resource { "secret_group_id": &schema.Schema{ Type: schema.TypeString, Computed: true, - Description: "A v4 UUID identifier, or `default` secret group.", + Description: "A UUID identifier, or `default` secret group.", }, "secret_type": &schema.Schema{ Type: schema.TypeString, diff --git a/ibm/service/secretsmanager/data_source_ibm_sm_iam_credentials_secret.go b/ibm/service/secretsmanager/data_source_ibm_sm_iam_credentials_secret.go index 753bc047baa..be1da668661 100644 --- a/ibm/service/secretsmanager/data_source_ibm_sm_iam_credentials_secret.go +++ b/ibm/service/secretsmanager/data_source_ibm_sm_iam_credentials_secret.go @@ -81,7 +81,7 @@ func DataSourceIbmSmIamCredentialsSecret() *schema.Resource { "secret_group_id": &schema.Schema{ Type: schema.TypeString, Computed: true, - Description: "A v4 UUID identifier, or `default` secret group.", + Description: "A UUID identifier, or `default` secret group.", }, "secret_group_name": &schema.Schema{ Type: schema.TypeString, diff --git a/ibm/service/secretsmanager/data_source_ibm_sm_iam_credentials_secret_metadata.go b/ibm/service/secretsmanager/data_source_ibm_sm_iam_credentials_secret_metadata.go index 175a5c3e5dc..9c3e5dc3ff4 100644 --- a/ibm/service/secretsmanager/data_source_ibm_sm_iam_credentials_secret_metadata.go +++ b/ibm/service/secretsmanager/data_source_ibm_sm_iam_credentials_secret_metadata.go @@ -80,7 +80,7 @@ func DataSourceIbmSmIamCredentialsSecretMetadata() *schema.Resource { "secret_group_id": &schema.Schema{ Type: schema.TypeString, Computed: true, - Description: "A v4 UUID identifier, or `default` secret group.", + Description: "A UUID identifier, or `default` secret group.", }, "secret_type": &schema.Schema{ Type: schema.TypeString, diff --git a/ibm/service/secretsmanager/data_source_ibm_sm_imported_certificate.go b/ibm/service/secretsmanager/data_source_ibm_sm_imported_certificate.go index 1a0310db035..a505f3be9b1 100644 --- a/ibm/service/secretsmanager/data_source_ibm_sm_imported_certificate.go +++ b/ibm/service/secretsmanager/data_source_ibm_sm_imported_certificate.go @@ -82,7 +82,7 @@ func DataSourceIbmSmImportedCertificate() *schema.Resource { "secret_group_id": &schema.Schema{ Type: schema.TypeString, Computed: true, - Description: "A v4 UUID identifier, or `default` secret group.", + Description: "A UUID identifier, or `default` secret group.", }, "secret_group_name": &schema.Schema{ Type: schema.TypeString, diff --git a/ibm/service/secretsmanager/data_source_ibm_sm_imported_certificate_metadata.go b/ibm/service/secretsmanager/data_source_ibm_sm_imported_certificate_metadata.go index d44b056af8d..6b98ab3c141 100644 --- a/ibm/service/secretsmanager/data_source_ibm_sm_imported_certificate_metadata.go +++ b/ibm/service/secretsmanager/data_source_ibm_sm_imported_certificate_metadata.go @@ -80,7 +80,7 @@ func DataSourceIbmSmImportedCertificateMetadata() *schema.Resource { "secret_group_id": &schema.Schema{ Type: schema.TypeString, Computed: true, - Description: "A v4 UUID identifier, or `default` secret group.", + Description: "A UUID identifier, or `default` secret group.", }, "secret_type": &schema.Schema{ Type: schema.TypeString, diff --git a/ibm/service/secretsmanager/data_source_ibm_sm_kv_secret.go b/ibm/service/secretsmanager/data_source_ibm_sm_kv_secret.go index 8ad39c1e081..25ea72dc068 100644 --- a/ibm/service/secretsmanager/data_source_ibm_sm_kv_secret.go +++ b/ibm/service/secretsmanager/data_source_ibm_sm_kv_secret.go @@ -82,7 +82,7 @@ func DataSourceIbmSmKvSecret() *schema.Resource { "secret_group_id": &schema.Schema{ Type: schema.TypeString, Computed: true, - Description: "A v4 UUID identifier, or `default` secret group.", + Description: "A UUID identifier, or `default` secret group.", }, "secret_group_name": &schema.Schema{ Type: schema.TypeString, diff --git a/ibm/service/secretsmanager/data_source_ibm_sm_kv_secret_metadata.go b/ibm/service/secretsmanager/data_source_ibm_sm_kv_secret_metadata.go index 11f82b269e6..efa0c948b8c 100644 --- a/ibm/service/secretsmanager/data_source_ibm_sm_kv_secret_metadata.go +++ b/ibm/service/secretsmanager/data_source_ibm_sm_kv_secret_metadata.go @@ -80,7 +80,7 @@ func DataSourceIbmSmKvSecretMetadata() *schema.Resource { "secret_group_id": &schema.Schema{ Type: schema.TypeString, Computed: true, - Description: "A v4 UUID identifier, or `default` secret group.", + Description: "A UUID identifier, or `default` secret group.", }, "secret_type": &schema.Schema{ Type: schema.TypeString, diff --git a/ibm/service/secretsmanager/data_source_ibm_sm_private_certificate.go b/ibm/service/secretsmanager/data_source_ibm_sm_private_certificate.go index d8aa2181a7c..6f7fdaa265d 100644 --- a/ibm/service/secretsmanager/data_source_ibm_sm_private_certificate.go +++ b/ibm/service/secretsmanager/data_source_ibm_sm_private_certificate.go @@ -82,7 +82,7 @@ func DataSourceIbmSmPrivateCertificate() *schema.Resource { "secret_group_id": &schema.Schema{ Type: schema.TypeString, Computed: true, - Description: "A v4 UUID identifier, or `default` secret group.", + Description: "A UUID identifier, or `default` secret group.", }, "secret_group_name": &schema.Schema{ Type: schema.TypeString, diff --git a/ibm/service/secretsmanager/data_source_ibm_sm_private_certificate_metadata.go b/ibm/service/secretsmanager/data_source_ibm_sm_private_certificate_metadata.go index 12706e4f584..7bb07ff26d6 100644 --- a/ibm/service/secretsmanager/data_source_ibm_sm_private_certificate_metadata.go +++ b/ibm/service/secretsmanager/data_source_ibm_sm_private_certificate_metadata.go @@ -80,7 +80,7 @@ func DataSourceIbmSmPrivateCertificateMetadata() *schema.Resource { "secret_group_id": &schema.Schema{ Type: schema.TypeString, Computed: true, - Description: "A v4 UUID identifier, or `default` secret group.", + Description: "A UUID identifier, or `default` secret group.", }, "secret_type": &schema.Schema{ Type: schema.TypeString, diff --git a/ibm/service/secretsmanager/data_source_ibm_sm_public_certificate.go b/ibm/service/secretsmanager/data_source_ibm_sm_public_certificate.go index 17bc5ead32e..6e4efac2302 100644 --- a/ibm/service/secretsmanager/data_source_ibm_sm_public_certificate.go +++ b/ibm/service/secretsmanager/data_source_ibm_sm_public_certificate.go @@ -82,7 +82,7 @@ func DataSourceIbmSmPublicCertificate() *schema.Resource { "secret_group_id": &schema.Schema{ Type: schema.TypeString, Computed: true, - Description: "A v4 UUID identifier, or `default` secret group.", + Description: "A UUID identifier, or `default` secret group.", }, "secret_group_name": &schema.Schema{ Type: schema.TypeString, diff --git a/ibm/service/secretsmanager/data_source_ibm_sm_public_certificate_metadata.go b/ibm/service/secretsmanager/data_source_ibm_sm_public_certificate_metadata.go index 569fb67cec2..46dc8dd367b 100644 --- a/ibm/service/secretsmanager/data_source_ibm_sm_public_certificate_metadata.go +++ b/ibm/service/secretsmanager/data_source_ibm_sm_public_certificate_metadata.go @@ -80,7 +80,7 @@ func DataSourceIbmSmPublicCertificateMetadata() *schema.Resource { "secret_group_id": &schema.Schema{ Type: schema.TypeString, Computed: true, - Description: "A v4 UUID identifier, or `default` secret group.", + Description: "A UUID identifier, or `default` secret group.", }, "secret_type": &schema.Schema{ Type: schema.TypeString, diff --git a/ibm/service/secretsmanager/data_source_ibm_sm_secret_groups.go b/ibm/service/secretsmanager/data_source_ibm_sm_secret_groups.go index ea1ee4dc89e..41cde9434b2 100644 --- a/ibm/service/secretsmanager/data_source_ibm_sm_secret_groups.go +++ b/ibm/service/secretsmanager/data_source_ibm_sm_secret_groups.go @@ -31,7 +31,7 @@ func DataSourceIbmSmSecretGroups() *schema.Resource { "id": &schema.Schema{ Type: schema.TypeString, Computed: true, - Description: "A v4 UUID identifier.", + Description: "A UUID identifier.", }, "name": &schema.Schema{ Type: schema.TypeString, diff --git a/ibm/service/secretsmanager/data_source_ibm_sm_secrets.go b/ibm/service/secretsmanager/data_source_ibm_sm_secrets.go index a921d68cb9f..b6afa31be89 100644 --- a/ibm/service/secretsmanager/data_source_ibm_sm_secrets.go +++ b/ibm/service/secretsmanager/data_source_ibm_sm_secrets.go @@ -95,7 +95,7 @@ func DataSourceIbmSmSecrets() *schema.Resource { "id": &schema.Schema{ Type: schema.TypeString, Computed: true, - Description: "A v4 UUID identifier.", + Description: "A UUID identifier.", }, "labels": &schema.Schema{ Type: schema.TypeList, @@ -118,7 +118,7 @@ func DataSourceIbmSmSecrets() *schema.Resource { "secret_group_id": &schema.Schema{ Type: schema.TypeString, Computed: true, - Description: "A v4 UUID identifier, or `default` secret group.", + Description: "A UUID identifier, or `default` secret group.", }, "secret_type": &schema.Schema{ Type: schema.TypeString, diff --git a/ibm/service/secretsmanager/data_source_ibm_sm_service_credentials_secret.go b/ibm/service/secretsmanager/data_source_ibm_sm_service_credentials_secret.go index 205328b7905..bc0a36a0472 100644 --- a/ibm/service/secretsmanager/data_source_ibm_sm_service_credentials_secret.go +++ b/ibm/service/secretsmanager/data_source_ibm_sm_service_credentials_secret.go @@ -80,7 +80,7 @@ func DataSourceIbmSmServiceCredentialsSecret() *schema.Resource { Type: schema.TypeString, Computed: true, ForceNew: true, - Description: "A v4 UUID identifier, or `default` secret group.", + Description: "A UUID identifier, or `default` secret group.", }, "secret_group_name": &schema.Schema{ Type: schema.TypeString, diff --git a/ibm/service/secretsmanager/data_source_ibm_sm_service_credentials_secret_metadata.go b/ibm/service/secretsmanager/data_source_ibm_sm_service_credentials_secret_metadata.go index 11147067364..036b1cfce41 100644 --- a/ibm/service/secretsmanager/data_source_ibm_sm_service_credentials_secret_metadata.go +++ b/ibm/service/secretsmanager/data_source_ibm_sm_service_credentials_secret_metadata.go @@ -75,7 +75,7 @@ func DataSourceIbmSmServiceCredentialsSecretMetadata() *schema.Resource { Type: schema.TypeString, Computed: true, ForceNew: true, - Description: "A v4 UUID identifier, or `default` secret group.", + Description: "A UUID identifier, or `default` secret group.", }, "secret_type": &schema.Schema{ Type: schema.TypeString, diff --git a/ibm/service/secretsmanager/data_source_ibm_sm_username_password_secret.go b/ibm/service/secretsmanager/data_source_ibm_sm_username_password_secret.go index 2ef644bd185..217b9989a9f 100644 --- a/ibm/service/secretsmanager/data_source_ibm_sm_username_password_secret.go +++ b/ibm/service/secretsmanager/data_source_ibm_sm_username_password_secret.go @@ -82,7 +82,7 @@ func DataSourceIbmSmUsernamePasswordSecret() *schema.Resource { "secret_group_id": &schema.Schema{ Type: schema.TypeString, Computed: true, - Description: "A v4 UUID identifier, or `default` secret group.", + Description: "A UUID identifier, or `default` secret group.", }, "secret_group_name": &schema.Schema{ Type: schema.TypeString, diff --git a/ibm/service/secretsmanager/data_source_ibm_sm_username_password_secret_metadata.go b/ibm/service/secretsmanager/data_source_ibm_sm_username_password_secret_metadata.go index a1bdb8ce35d..b184b4905f5 100644 --- a/ibm/service/secretsmanager/data_source_ibm_sm_username_password_secret_metadata.go +++ b/ibm/service/secretsmanager/data_source_ibm_sm_username_password_secret_metadata.go @@ -80,7 +80,7 @@ func DataSourceIbmSmUsernamePasswordSecretMetadata() *schema.Resource { "secret_group_id": &schema.Schema{ Type: schema.TypeString, Computed: true, - Description: "A v4 UUID identifier, or `default` secret group.", + Description: "A UUID identifier, or `default` secret group.", }, "secret_type": &schema.Schema{ Type: schema.TypeString, diff --git a/ibm/service/secretsmanager/resource_ibm_sm_arbitrary_secret.go b/ibm/service/secretsmanager/resource_ibm_sm_arbitrary_secret.go index 88a3336911c..a484538f5ee 100644 --- a/ibm/service/secretsmanager/resource_ibm_sm_arbitrary_secret.go +++ b/ibm/service/secretsmanager/resource_ibm_sm_arbitrary_secret.go @@ -78,7 +78,7 @@ func ResourceIbmSmArbitrarySecret() *schema.Resource { Optional: true, Computed: true, ForceNew: true, - Description: "A v4 UUID identifier, or `default` secret group.", + Description: "A UUID identifier, or `default` secret group.", }, "version_custom_metadata": &schema.Schema{ @@ -110,7 +110,7 @@ func ResourceIbmSmArbitrarySecret() *schema.Resource { "secret_id": &schema.Schema{ Type: schema.TypeString, Computed: true, - Description: "A v4 UUID identifier.", + Description: "A UUID identifier.", }, "locks_total": &schema.Schema{ Type: schema.TypeInt, diff --git a/ibm/service/secretsmanager/resource_ibm_sm_iam_credentials_secret.go b/ibm/service/secretsmanager/resource_ibm_sm_iam_credentials_secret.go index d8855437fe9..f455d2ce517 100644 --- a/ibm/service/secretsmanager/resource_ibm_sm_iam_credentials_secret.go +++ b/ibm/service/secretsmanager/resource_ibm_sm_iam_credentials_secret.go @@ -50,7 +50,7 @@ func ResourceIbmSmIamCredentialsSecret() *schema.Resource { Optional: true, Computed: true, ForceNew: true, - Description: "A v4 UUID identifier, or `default` secret group.", + Description: "A UUID identifier, or `default` secret group.", }, "labels": &schema.Schema{ Type: schema.TypeList, @@ -164,7 +164,7 @@ func ResourceIbmSmIamCredentialsSecret() *schema.Resource { "secret_id": &schema.Schema{ Type: schema.TypeString, Computed: true, - Description: "A v4 UUID identifier.", + Description: "A UUID identifier.", }, "locks_total": &schema.Schema{ Type: schema.TypeInt, diff --git a/ibm/service/secretsmanager/resource_ibm_sm_imported_certificate.go b/ibm/service/secretsmanager/resource_ibm_sm_imported_certificate.go index adc731ae967..c124568a149 100644 --- a/ibm/service/secretsmanager/resource_ibm_sm_imported_certificate.go +++ b/ibm/service/secretsmanager/resource_ibm_sm_imported_certificate.go @@ -61,14 +61,14 @@ func ResourceIbmSmImportedCertificate() *schema.Resource { "secret_id": &schema.Schema{ Type: schema.TypeString, Computed: true, - Description: "A v4 UUID identifier.", + Description: "A UUID identifier.", }, "secret_group_id": &schema.Schema{ Type: schema.TypeString, Optional: true, Computed: true, ForceNew: true, - Description: "A v4 UUID identifier, or `default` secret group.", + Description: "A UUID identifier, or `default` secret group.", }, "secret_type": &schema.Schema{ Type: schema.TypeString, diff --git a/ibm/service/secretsmanager/resource_ibm_sm_kv_secret.go b/ibm/service/secretsmanager/resource_ibm_sm_kv_secret.go index 81a6f44be1d..f1b26b27aaf 100644 --- a/ibm/service/secretsmanager/resource_ibm_sm_kv_secret.go +++ b/ibm/service/secretsmanager/resource_ibm_sm_kv_secret.go @@ -49,7 +49,7 @@ func ResourceIbmSmKvSecret() *schema.Resource { Optional: true, Computed: true, ForceNew: true, - Description: "A v4 UUID identifier, or `default` secret group.", + Description: "A UUID identifier, or `default` secret group.", }, "labels": &schema.Schema{ Type: schema.TypeList, @@ -126,7 +126,7 @@ func ResourceIbmSmKvSecret() *schema.Resource { "secret_id": &schema.Schema{ Type: schema.TypeString, Computed: true, - Description: "A v4 UUID identifier.", + Description: "A UUID identifier.", }, }, } diff --git a/ibm/service/secretsmanager/resource_ibm_sm_private_certificate.go b/ibm/service/secretsmanager/resource_ibm_sm_private_certificate.go index 8a2e424619c..0da1229d2b3 100644 --- a/ibm/service/secretsmanager/resource_ibm_sm_private_certificate.go +++ b/ibm/service/secretsmanager/resource_ibm_sm_private_certificate.go @@ -49,7 +49,7 @@ func ResourceIbmSmPrivateCertificate() *schema.Resource { ForceNew: true, Optional: true, Computed: true, - Description: "A v4 UUID identifier, or `default` secret group.", + Description: "A UUID identifier, or `default` secret group.", }, "labels": &schema.Schema{ Type: schema.TypeList, @@ -196,7 +196,7 @@ func ResourceIbmSmPrivateCertificate() *schema.Resource { "secret_id": &schema.Schema{ Type: schema.TypeString, Computed: true, - Description: "A v4 UUID identifier.", + Description: "A UUID identifier.", }, "locks_total": &schema.Schema{ Type: schema.TypeInt, diff --git a/ibm/service/secretsmanager/resource_ibm_sm_public_certificate.go b/ibm/service/secretsmanager/resource_ibm_sm_public_certificate.go index 17aa926c7da..0f8172c81e2 100644 --- a/ibm/service/secretsmanager/resource_ibm_sm_public_certificate.go +++ b/ibm/service/secretsmanager/resource_ibm_sm_public_certificate.go @@ -58,7 +58,7 @@ func ResourceIbmSmPublicCertificate() *schema.Resource { ForceNew: true, Optional: true, Computed: true, - Description: "A v4 UUID identifier, or `default` secret group.", + Description: "A UUID identifier, or `default` secret group.", }, "labels": &schema.Schema{ Type: schema.TypeList, @@ -237,7 +237,7 @@ func ResourceIbmSmPublicCertificate() *schema.Resource { "secret_id": &schema.Schema{ Type: schema.TypeString, Computed: true, - Description: "A v4 UUID identifier.", + Description: "A UUID identifier.", }, "locks_total": &schema.Schema{ Type: schema.TypeInt, diff --git a/ibm/service/secretsmanager/resource_ibm_sm_public_certificate_action_validate_manual_dns.go b/ibm/service/secretsmanager/resource_ibm_sm_public_certificate_action_validate_manual_dns.go index 4180dba3479..a845acfc322 100644 --- a/ibm/service/secretsmanager/resource_ibm_sm_public_certificate_action_validate_manual_dns.go +++ b/ibm/service/secretsmanager/resource_ibm_sm_public_certificate_action_validate_manual_dns.go @@ -28,7 +28,7 @@ func ResourceIbmSmPublicCertificateActionValidateManualDns() *schema.Resource { "secret_id": &schema.Schema{ Type: schema.TypeString, Required: true, - Description: "A v4 UUID identifier.", + Description: "A UUID identifier.", ForceNew: true, }, }, diff --git a/ibm/service/secretsmanager/resource_ibm_sm_secret_group.go b/ibm/service/secretsmanager/resource_ibm_sm_secret_group.go index 0fb9fbcd0b0..d0106d151eb 100644 --- a/ibm/service/secretsmanager/resource_ibm_sm_secret_group.go +++ b/ibm/service/secretsmanager/resource_ibm_sm_secret_group.go @@ -30,7 +30,7 @@ func ResourceIbmSmSecretGroup() *schema.Resource { "secret_group_id": &schema.Schema{ Type: schema.TypeString, Computed: true, - Description: "A v4 UUID identifier.", + Description: "A UUID identifier.", }, "name": &schema.Schema{ Type: schema.TypeString, diff --git a/ibm/service/secretsmanager/resource_ibm_sm_service_credentials_secret.go b/ibm/service/secretsmanager/resource_ibm_sm_service_credentials_secret.go index b4dc68f99d4..92b2584e53a 100644 --- a/ibm/service/secretsmanager/resource_ibm_sm_service_credentials_secret.go +++ b/ibm/service/secretsmanager/resource_ibm_sm_service_credentials_secret.go @@ -47,7 +47,7 @@ func ResourceIbmSmServiceCredentialsSecret() *schema.Resource { Optional: true, Computed: true, ForceNew: true, - Description: "A v4 UUID identifier, or `default` secret group.", + Description: "A UUID identifier, or `default` secret group.", }, "labels": &schema.Schema{ Type: schema.TypeList, @@ -298,7 +298,7 @@ func ResourceIbmSmServiceCredentialsSecret() *schema.Resource { "secret_id": &schema.Schema{ Type: schema.TypeString, Computed: true, - Description: "A v4 UUID identifier.", + Description: "A UUID identifier.", }, }, } diff --git a/ibm/service/secretsmanager/resource_ibm_sm_username_password_secret.go b/ibm/service/secretsmanager/resource_ibm_sm_username_password_secret.go index 267928197af..4a9562e3d34 100644 --- a/ibm/service/secretsmanager/resource_ibm_sm_username_password_secret.go +++ b/ibm/service/secretsmanager/resource_ibm_sm_username_password_secret.go @@ -65,12 +65,12 @@ func ResourceIbmSmUsernamePasswordSecret() *schema.Resource { Optional: true, Computed: true, ForceNew: true, - Description: "A v4 UUID identifier, or `default` secret group.", + Description: "A UUID identifier, or `default` secret group.", }, "secret_id": &schema.Schema{ Type: schema.TypeString, Computed: true, - Description: "A v4 UUID identifier.", + Description: "A UUID identifier.", }, "secret_type": &schema.Schema{ Type: schema.TypeString, diff --git a/metadata/provider_metadata.json b/metadata/provider_metadata.json index 63805d34fb9..dd8c722097d 100644 --- a/metadata/provider_metadata.json +++ b/metadata/provider_metadata.json @@ -80045,7 +80045,7 @@ { "name": "secret_group_id", "type": "TypeString", - "description": "A v4 UUID identifier, or `default` secret group.", + "description": "A UUID identifier, or `default` secret group.", "computed": true }, { @@ -80101,7 +80101,7 @@ { "name": "secret_group_id", "type": "TypeString", - "description": "A v4 UUID identifier, or `default` secret group.", + "description": "A UUID identifier, or `default` secret group.", "computed": true }, { @@ -80619,7 +80619,7 @@ { "name": "secret_group_id", "type": "TypeString", - "description": "A v4 UUID identifier, or `default` secret group.", + "description": "A UUID identifier, or `default` secret group.", "computed": true }, { @@ -80725,7 +80725,7 @@ { "name": "secret_group_id", "type": "TypeString", - "description": "A v4 UUID identifier, or `default` secret group.", + "description": "A UUID identifier, or `default` secret group.", "computed": true }, { @@ -80939,7 +80939,7 @@ { "name": "secret_group_id", "type": "TypeString", - "description": "A v4 UUID identifier, or `default` secret group.", + "description": "A UUID identifier, or `default` secret group.", "computed": true }, { @@ -81247,7 +81247,7 @@ { "name": "secret_group_id", "type": "TypeString", - "description": "A v4 UUID identifier, or `default` secret group.", + "description": "A UUID identifier, or `default` secret group.", "computed": true }, { @@ -81467,7 +81467,7 @@ { "name": "secret_group_id", "type": "TypeString", - "description": "A v4 UUID identifier, or `default` secret group.", + "description": "A UUID identifier, or `default` secret group.", "computed": true }, { @@ -81557,7 +81557,7 @@ { "name": "secret_group_id", "type": "TypeString", - "description": "A v4 UUID identifier, or `default` secret group.", + "description": "A UUID identifier, or `default` secret group.", "computed": true }, { @@ -81656,7 +81656,7 @@ { "name": "secret_group_id", "type": "TypeString", - "description": "A v4 UUID identifier, or `default` secret group.", + "description": "A UUID identifier, or `default` secret group.", "computed": true }, { @@ -82901,7 +82901,7 @@ { "name": "secret_group_id", "type": "TypeString", - "description": "A v4 UUID identifier, or `default` secret group.", + "description": "A UUID identifier, or `default` secret group.", "computed": true }, { @@ -83177,7 +83177,7 @@ { "name": "secret_group_id", "type": "TypeString", - "description": "A v4 UUID identifier, or `default` secret group.", + "description": "A UUID identifier, or `default` secret group.", "computed": true }, { @@ -83703,7 +83703,7 @@ { "name": "secret_group_id", "type": "TypeString", - "description": "A v4 UUID identifier, or `default` secret group.", + "description": "A UUID identifier, or `default` secret group.", "computed": true }, { @@ -84086,7 +84086,7 @@ "id": { "name": "id", "type": "TypeString", - "description": "A v4 UUID identifier.", + "description": "A UUID identifier.", "computed": true }, "name": { @@ -84245,7 +84245,7 @@ "id": { "name": "id", "type": "TypeString", - "description": "A v4 UUID identifier.", + "description": "A UUID identifier.", "computed": true }, "intermediate_included": { @@ -84440,7 +84440,7 @@ "secret_group_id": { "name": "secret_group_id", "type": "TypeString", - "description": "A v4 UUID identifier, or `default` secret group.", + "description": "A UUID identifier, or `default` secret group.", "computed": true }, "secret_type": { @@ -84662,7 +84662,7 @@ { "name": "secret_group_id", "type": "TypeString", - "description": "A v4 UUID identifier, or `default` secret group.", + "description": "A UUID identifier, or `default` secret group.", "computed": true }, { @@ -84803,7 +84803,7 @@ { "name": "secret_group_id", "type": "TypeString", - "description": "A v4 UUID identifier, or `default` secret group.", + "description": "A UUID identifier, or `default` secret group.", "computed": true }, { @@ -147903,7 +147903,7 @@ { "name": "secret_id", "type": "TypeString", - "description": "A v4 UUID identifier.", + "description": "A UUID identifier.", "computed": true }, { @@ -147998,7 +147998,7 @@ { "name": "secret_group_id", "type": "TypeString", - "description": "A v4 UUID identifier, or `default` secret group.", + "description": "A UUID identifier, or `default` secret group.", "immutable": true, "optional": true, "computed": true @@ -148201,7 +148201,7 @@ { "name": "secret_group_id", "type": "TypeString", - "description": "A v4 UUID identifier, or `default` secret group.", + "description": "A UUID identifier, or `default` secret group.", "immutable": true, "optional": true, "computed": true @@ -148253,7 +148253,7 @@ { "name": "secret_id", "type": "TypeString", - "description": "A v4 UUID identifier.", + "description": "A UUID identifier.", "computed": true }, { @@ -148407,13 +148407,13 @@ { "name": "secret_id", "type": "TypeString", - "description": "A v4 UUID identifier.", + "description": "A UUID identifier.", "computed": true }, { "name": "secret_group_id", "type": "TypeString", - "description": "A v4 UUID identifier, or `default` secret group.", + "description": "A UUID identifier, or `default` secret group.", "immutable": true, "optional": true, "computed": true @@ -148692,7 +148692,7 @@ { "name": "secret_group_id", "type": "TypeString", - "description": "A v4 UUID identifier, or `default` secret group.", + "description": "A UUID identifier, or `default` secret group.", "immutable": true, "optional": true, "computed": true @@ -148722,7 +148722,7 @@ { "name": "secret_id", "type": "TypeString", - "description": "A v4 UUID identifier.", + "description": "A UUID identifier.", "computed": true }, { @@ -148864,7 +148864,7 @@ { "name": "secret_id", "type": "TypeString", - "description": "A v4 UUID identifier.", + "description": "A UUID identifier.", "computed": true }, { @@ -149043,7 +149043,7 @@ { "name": "secret_group_id", "type": "TypeString", - "description": "A v4 UUID identifier, or `default` secret group.", + "description": "A UUID identifier, or `default` secret group.", "immutable": true, "optional": true, "computed": true @@ -150710,7 +150710,7 @@ { "name": "secret_group_id", "type": "TypeString", - "description": "A v4 UUID identifier, or `default` secret group.", + "description": "A UUID identifier, or `default` secret group.", "immutable": true, "optional": true, "computed": true @@ -150830,7 +150830,7 @@ { "name": "secret_id", "type": "TypeString", - "description": "A v4 UUID identifier.", + "description": "A UUID identifier.", "computed": true }, { @@ -151000,7 +151000,7 @@ { "name": "secret_id", "type": "TypeString", - "description": "A v4 UUID identifier.", + "description": "A UUID identifier.", "immutable": true, "required": true }, @@ -151272,7 +151272,7 @@ { "name": "secret_group_id", "type": "TypeString", - "description": "A v4 UUID identifier.", + "description": "A UUID identifier.", "computed": true }, { @@ -151429,7 +151429,7 @@ { "name": "secret_group_id", "type": "TypeString", - "description": "A v4 UUID identifier, or `default` secret group.", + "description": "A UUID identifier, or `default` secret group.", "immutable": true, "optional": true, "computed": true @@ -151500,7 +151500,7 @@ { "name": "secret_id", "type": "TypeString", - "description": "A v4 UUID identifier.", + "description": "A UUID identifier.", "computed": true } ], diff --git a/website/docs/d/sm_arbitrary_secret.html.markdown b/website/docs/d/sm_arbitrary_secret.html.markdown index 80c207e8d89..7633c9e1fe4 100644 --- a/website/docs/d/sm_arbitrary_secret.html.markdown +++ b/website/docs/d/sm_arbitrary_secret.html.markdown @@ -79,7 +79,7 @@ In addition to all argument references listed, you can access the following attr * `payload` - (String) The arbitrary secret's data payload. * Constraints: The maximum length is `100000` characters. The minimum length is `0` characters. The value must match regular expression `/(.*?)/`. -* `secret_group_id` - (String) A v4 UUID identifier, or `default` secret group. +* `secret_group_id` - (String) A UUID identifier, or `default` secret group. * Constraints: The maximum length is `36` characters. The minimum length is `7` characters. The value must match regular expression `/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/`. * `secret_type` - (String) The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials. diff --git a/website/docs/d/sm_arbitrary_secret_metadata.html.markdown b/website/docs/d/sm_arbitrary_secret_metadata.html.markdown index 0d33cfd1c19..949e1164e03 100644 --- a/website/docs/d/sm_arbitrary_secret_metadata.html.markdown +++ b/website/docs/d/sm_arbitrary_secret_metadata.html.markdown @@ -62,7 +62,7 @@ In addition to all argument references listed, you can access the following attr * `name` - (String) The human-readable name of your secret. * Constraints: The maximum length is `256` characters. The minimum length is `2` characters. -* `secret_group_id` - (String) A v4 UUID identifier, or `default` secret group. +* `secret_group_id` - (String) A UUID identifier, or `default` secret group. * Constraints: The maximum length is `36` characters. The minimum length is `7` characters. The value must match regular expression `/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/`. * `secret_type` - (String) The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials. diff --git a/website/docs/d/sm_iam_credentials_secret.html.markdown b/website/docs/d/sm_iam_credentials_secret.html.markdown index c6618bfcdaa..9dad6b0ce4c 100644 --- a/website/docs/d/sm_iam_credentials_secret.html.markdown +++ b/website/docs/d/sm_iam_credentials_secret.html.markdown @@ -98,7 +98,7 @@ Nested scheme for **rotation**: * `unit` - (String) The units for the secret rotation time interval. * Constraints: Allowable values are: `day`, `month`. -* `secret_group_id` - (String) A v4 UUID identifier, or `default` secret group. +* `secret_group_id` - (String) A UUID identifier, or `default` secret group. * Constraints: The maximum length is `36` characters. The minimum length is `7` characters. The value must match regular expression `/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/`. * `secret_type` - (String) The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials. diff --git a/website/docs/d/sm_iam_credentials_secret_metadata.html.markdown b/website/docs/d/sm_iam_credentials_secret_metadata.html.markdown index 9ccda1a8f88..81d9ee8271f 100644 --- a/website/docs/d/sm_iam_credentials_secret_metadata.html.markdown +++ b/website/docs/d/sm_iam_credentials_secret_metadata.html.markdown @@ -79,7 +79,7 @@ Nested scheme for **rotation**: * `unit` - (String) The units for the secret rotation time interval. * Constraints: Allowable values are: `day`, `month`. -* `secret_group_id` - (String) A v4 UUID identifier, or `default` secret group. +* `secret_group_id` - (String) A UUID identifier, or `default` secret group. * Constraints: The maximum length is `36` characters. The minimum length is `7` characters. The value must match regular expression `/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/`. * `secret_type` - (String) The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials. diff --git a/website/docs/d/sm_imported_certificate.html.markdown b/website/docs/d/sm_imported_certificate.html.markdown index 09ce6e0768c..a832d240ae0 100644 --- a/website/docs/d/sm_imported_certificate.html.markdown +++ b/website/docs/d/sm_imported_certificate.html.markdown @@ -102,7 +102,7 @@ In addition to all argument references listed, you can access the following attr * `private_key_included` - (Boolean) Indicates whether the certificate was imported with an associated private key. -* `secret_group_id` - (String) A v4 UUID identifier, or `default` secret group. +* `secret_group_id` - (String) A UUID identifier, or `default` secret group. * Constraints: The maximum length is `36` characters. The minimum length is `7` characters. The value must match regular expression `/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/`. * `secret_type` - (String) The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials. diff --git a/website/docs/d/sm_imported_certificate_metadata.html.markdown b/website/docs/d/sm_imported_certificate_metadata.html.markdown index 5f2bb4e510e..400c89273ad 100644 --- a/website/docs/d/sm_imported_certificate_metadata.html.markdown +++ b/website/docs/d/sm_imported_certificate_metadata.html.markdown @@ -76,7 +76,7 @@ In addition to all argument references listed, you can access the following attr * `private_key_included` - (Boolean) Indicates whether the certificate was imported with an associated private key. -* `secret_group_id` - (String) A v4 UUID identifier, or `default` secret group. +* `secret_group_id` - (String) A UUID identifier, or `default` secret group. * Constraints: The maximum length is `36` characters. The minimum length is `7` characters. The value must match regular expression `/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/`. * `secret_type` - (String) The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials. diff --git a/website/docs/d/sm_kv_secret.html.markdown b/website/docs/d/sm_kv_secret.html.markdown index bc5ff3474dd..627d6d14271 100644 --- a/website/docs/d/sm_kv_secret.html.markdown +++ b/website/docs/d/sm_kv_secret.html.markdown @@ -80,7 +80,7 @@ In addition to all argument references listed, you can access the following attr * `name` - (String) The human-readable name of your secret. * Constraints: The maximum length is `256` characters. The minimum length is `2` characters. -* `secret_group_id` - (String) A v4 UUID identifier, or `default` secret group. +* `secret_group_id` - (String) A UUID identifier, or `default` secret group. * Constraints: The maximum length is `36` characters. The minimum length is `7` characters. The value must match regular expression `/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/`. * `secret_type` - (String) The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials. diff --git a/website/docs/d/sm_kv_secret_metadata.html.markdown b/website/docs/d/sm_kv_secret_metadata.html.markdown index b333ecfc8ab..0dbfd055f5a 100644 --- a/website/docs/d/sm_kv_secret_metadata.html.markdown +++ b/website/docs/d/sm_kv_secret_metadata.html.markdown @@ -60,7 +60,7 @@ In addition to all argument references listed, you can access the following attr * `name` - (String) The human-readable name of your secret. * Constraints: The maximum length is `256` characters. The minimum length is `2` characters. -* `secret_group_id` - (String) A v4 UUID identifier, or `default` secret group. +* `secret_group_id` - (String) A UUID identifier, or `default` secret group. * Constraints: The maximum length is `36` characters. The minimum length is `7` characters. The value must match regular expression `/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/`. * `secret_type` - (String) The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials. diff --git a/website/docs/d/sm_private_certificate.html.markdown b/website/docs/d/sm_private_certificate.html.markdown index abecd98dc08..83658bc7a5c 100644 --- a/website/docs/d/sm_private_certificate.html.markdown +++ b/website/docs/d/sm_private_certificate.html.markdown @@ -122,7 +122,7 @@ In addition to all argument references listed, you can access the following attr * `unit` - (String) The units for the secret rotation time interval. * Constraints: Allowable values are: `day`, `month`. -* `secret_group_id` - (String) A v4 UUID identifier, or `default` secret group. +* `secret_group_id` - (String) A UUID identifier, or `default` secret group. * Constraints: The maximum length is `36` characters. The minimum length is `7` characters. The value must match regular expression `/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/`. * `secret_type` - (String) The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials. diff --git a/website/docs/d/sm_private_certificate_metadata.html.markdown b/website/docs/d/sm_private_certificate_metadata.html.markdown index 4d16d2b1a8d..8f8c39de2ce 100644 --- a/website/docs/d/sm_private_certificate_metadata.html.markdown +++ b/website/docs/d/sm_private_certificate_metadata.html.markdown @@ -93,7 +93,7 @@ Nested scheme for **rotation**: * `unit` - (String) The units for the secret rotation time interval. * Constraints: Allowable values are: `day`, `month`. -* `secret_group_id` - (String) A v4 UUID identifier, or `default` secret group. +* `secret_group_id` - (String) A UUID identifier, or `default` secret group. * Constraints: The maximum length is `36` characters. The minimum length is `7` characters. The value must match regular expression `/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/`. * `secret_type` - (String) The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials. diff --git a/website/docs/d/sm_public_certificate.html.markdown b/website/docs/d/sm_public_certificate.html.markdown index c997a1775c1..b7533e1fa47 100644 --- a/website/docs/d/sm_public_certificate.html.markdown +++ b/website/docs/d/sm_public_certificate.html.markdown @@ -130,7 +130,7 @@ Nested scheme for **rotation**: * `auto_rotate` - (Boolean) Determines whether Secrets Manager rotates your secret automatically.Default is `false`. * `rotate_keys` - (Boolean) Determines whether Secrets Manager rotates the private key for your public certificate automatically.Default is `false`. If it is set to `true`, the service generates and stores a new private key for your rotated certificate. -* `secret_group_id` - (String) A v4 UUID identifier, or `default` secret group. +* `secret_group_id` - (String) A UUID identifier, or `default` secret group. * Constraints: The maximum length is `36` characters. The minimum length is `7` characters. The value must match regular expression `/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/`. * `secret_type` - (String) The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials. diff --git a/website/docs/d/sm_public_certificate_metadata.html.markdown b/website/docs/d/sm_public_certificate_metadata.html.markdown index 5e1227a4ca7..527851e5b2a 100644 --- a/website/docs/d/sm_public_certificate_metadata.html.markdown +++ b/website/docs/d/sm_public_certificate_metadata.html.markdown @@ -109,7 +109,7 @@ Nested scheme for **rotation**: * `unit` - (String) The units for the secret rotation time interval. * Constraints: Allowable values are: `day`, `month`. -* `secret_group_id` - (String) A v4 UUID identifier, or `default` secret group. +* `secret_group_id` - (String) A UUID identifier, or `default` secret group. * Constraints: The maximum length is `36` characters. The minimum length is `7` characters. The value must match regular expression `/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/`. * `secret_type` - (String) The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials. diff --git a/website/docs/d/sm_secret_groups.html.markdown b/website/docs/d/sm_secret_groups.html.markdown index 0ab81945d60..160fa2e0ebd 100644 --- a/website/docs/d/sm_secret_groups.html.markdown +++ b/website/docs/d/sm_secret_groups.html.markdown @@ -39,7 +39,7 @@ Nested scheme for **secret_groups**: * `created_at` - (String) The date when a resource was created. The date format follows RFC 3339. * `description` - (String) An extended description of your secret group.To protect your privacy, do not use personal data, such as your name or location, as a description for your secret group. * Constraints: The maximum length is `1024` characters. The minimum length is `0` characters. The value must match regular expression `/(.*?)/`. - * `id` - (String) A v4 UUID identifier, or `default` secret group. + * `id` - (String) A UUID identifier, or `default` secret group. * Constraints: The maximum length is `36` characters. The minimum length is `7` characters. The value must match regular expression `/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/`. * `name` - (String) The name of your existing secret group. * Constraints: The maximum length is `64` characters. The minimum length is `2` characters. The value must match regular expression `/(.*?)/`. diff --git a/website/docs/d/sm_secrets.html.markdown b/website/docs/d/sm_secrets.html.markdown index ed32aae2980..4152a141109 100644 --- a/website/docs/d/sm_secrets.html.markdown +++ b/website/docs/d/sm_secrets.html.markdown @@ -65,7 +65,7 @@ Nested scheme for **secrets**: * `dns` - (String) The name that is assigned to the DNS provider configuration. * `downloaded` - (Boolean) Indicates whether the secret data that is associated with a secret version was retrieved in a call to the service API. * `expiration_date` - (String) The date a secret is expired. The date format follows RFC 3339. - * `id` - (String) A v4 UUID identifier. + * `id` - (String) A UUID identifier. * Constraints: The maximum length is `36` characters. The minimum length is `36` characters. The value must match regular expression `/[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}/`. * `intermediate_included` - (Boolean) Indicates whether the certificate was imported with an associated intermediate certificate. * `issuance_info` - (List) Issuance information that is associated with your certificate. @@ -110,7 +110,7 @@ Nested scheme for **secrets**: * `rotate_keys` - (Boolean) Determines whether Secrets Manager rotates the private key for your public certificate automatically.Default is `false`. If it is set to `true`, the service generates and stores a new private key for your rotated certificate. * `unit` - (String) The units for the secret rotation time interval. * Constraints: Allowable values are: `day`, `month`. - * `secret_group_id` - (String) A v4 UUID identifier, or `default` secret group. + * `secret_group_id` - (String) A UUID identifier, or `default` secret group. * Constraints: The maximum length is `36` characters. The minimum length is `7` characters. The value must match regular expression `/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/`. * `secret_type` - (String) The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials. * Constraints: Allowable values are: `arbitrary`, `imported_cert`, `public_cert`, `iam_credentials`, `kv`, `username_password`, `private_cert`. diff --git a/website/docs/d/sm_service_credentials_secret.html.markdown b/website/docs/d/sm_service_credentials_secret.html.markdown index b69a19b09e2..3de035def45 100644 --- a/website/docs/d/sm_service_credentials_secret.html.markdown +++ b/website/docs/d/sm_service_credentials_secret.html.markdown @@ -115,7 +115,7 @@ In addition to all argument references listed, you can access the following attr * `unit` - (String) The units for the secret rotation time interval. * Constraints: Allowable values are: `day`, `month`. -* `secret_group_id` - (String) A v4 UUID identifier, or `default` secret group. +* `secret_group_id` - (String) A UUID identifier, or `default` secret group. * Constraints: The maximum length is `36` characters. The minimum length is `7` characters. The value must match regular expression `/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/`. * `secret_type` - (String) The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials. diff --git a/website/docs/d/sm_service_credentials_secret_metadata.html.markdown b/website/docs/d/sm_service_credentials_secret_metadata.html.markdown index 004e867c44e..ff776d804c5 100644 --- a/website/docs/d/sm_service_credentials_secret_metadata.html.markdown +++ b/website/docs/d/sm_service_credentials_secret_metadata.html.markdown @@ -72,7 +72,7 @@ In addition to all argument references listed, you can access the following attr * `unit` - (String) The units for the secret rotation time interval. * Constraints: Allowable values are: `day`, `month`. -* `secret_group_id` - (String) A v4 UUID identifier, or `default` secret group. +* `secret_group_id` - (String) A UUID identifier, or `default` secret group. * Constraints: The maximum length is `36` characters. The minimum length is `7` characters. The value must match regular expression `/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/`. * `secret_type` - (String) The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials. diff --git a/website/docs/d/sm_username_password_secret.html.markdown b/website/docs/d/sm_username_password_secret.html.markdown index a376c69cb5d..9e27beb632e 100644 --- a/website/docs/d/sm_username_password_secret.html.markdown +++ b/website/docs/d/sm_username_password_secret.html.markdown @@ -98,7 +98,7 @@ Nested scheme for **rotation**: * `unit` - (String) The units for the secret rotation time interval. * Constraints: Allowable values are: `day`, `month`. -* `secret_group_id` - (String) A v4 UUID identifier, or `default` secret group. +* `secret_group_id` - (String) A UUID identifier, or `default` secret group. * Constraints: The maximum length is `36` characters. The minimum length is `7` characters. The value must match regular expression `/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/`. * `secret_type` - (String) The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials. diff --git a/website/docs/d/sm_username_password_secret_metadata.html.markdown b/website/docs/d/sm_username_password_secret_metadata.html.markdown index 9e26afd4315..6b2a46c3e4a 100644 --- a/website/docs/d/sm_username_password_secret_metadata.html.markdown +++ b/website/docs/d/sm_username_password_secret_metadata.html.markdown @@ -79,7 +79,7 @@ Nested scheme for **rotation**: * `unit` - (String) The units for the secret rotation time interval. * Constraints: Allowable values are: `day`, `month`. -* `secret_group_id` - (String) A v4 UUID identifier, or `default` secret group. +* `secret_group_id` - (String) A UUID identifier, or `default` secret group. * Constraints: The maximum length is `36` characters. The minimum length is `7` characters. The value must match regular expression `/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/`. * `secret_type` - (String) The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials. diff --git a/website/docs/r/sm_arbitrary_secret.html.markdown b/website/docs/r/sm_arbitrary_secret.html.markdown index ec60f7d09e2..ffac3e55b78 100644 --- a/website/docs/r/sm_arbitrary_secret.html.markdown +++ b/website/docs/r/sm_arbitrary_secret.html.markdown @@ -44,7 +44,7 @@ Review the argument reference that you can specify for your resource. * `region` - (Optional, Forces new resource, String) The region of the Secrets Manager instance. If not provided defaults to the region defined in the IBM provider configuration. * `payload` - (Required, String) The arbitrary secret's data payload. You can manually rotate the secret by modifying this argument. Modifying the payload creates a new version of the secret. * Constraints: The maximum length is `100000` characters. The minimum length is `0` characters. The value must match regular expression `/(.*?)/`. -* `secret_group_id` - (Optional, Forces new resource, String) A v4 UUID identifier, or `default` secret group. +* `secret_group_id` - (Optional, Forces new resource, String) A UUID identifier, or `default` secret group. * Constraints: The maximum length is `36` characters. The minimum length is `7` characters. The value must match regular expression `/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/`. ## Attribute Reference diff --git a/website/docs/r/sm_iam_credentials_secret.html.markdown b/website/docs/r/sm_iam_credentials_secret.html.markdown index 3fe24e50627..24a030cb34b 100644 --- a/website/docs/r/sm_iam_credentials_secret.html.markdown +++ b/website/docs/r/sm_iam_credentials_secret.html.markdown @@ -58,7 +58,7 @@ Nested scheme for **rotation**: * Constraints: The minimum value is `1`. * `unit` - (Optional, String) The units for the secret rotation time interval. * Constraints: Allowable values are: `day`, `month`. -* `secret_group_id` - (Optional, Forces new resource, String) A v4 UUID identifier, or `default` secret group. +* `secret_group_id` - (Optional, Forces new resource, String) A UUID identifier, or `default` secret group. * Constraints: The maximum length is `36` characters. The minimum length is `7` characters. The value must match regular expression `/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/`. * `service_id` - (Optional, Forces new resource, String) The service ID under which the API key (see the `api_key` field) is created.If you omit this parameter, Secrets Manager generates a new service ID for your secret at its creation and adds it to the access groups that you assign.Optionally, you can use this field to provide your own service ID if you prefer to manage its access directly or retain the service ID after your secret expires, is rotated, or deleted. If you provide a service ID, do not include the `access_groups` parameter. * Constraints: The maximum length is `50` characters. The minimum length is `40` characters. The value must match regular expression `/^[A-Za-z0-9][A-Za-z0-9]*(?:-?[A-Za-z0-9]+)*$/`. diff --git a/website/docs/r/sm_imported_certificate.html.markdown b/website/docs/r/sm_imported_certificate.html.markdown index 3ba5e12ae69..4322f1d63d5 100644 --- a/website/docs/r/sm_imported_certificate.html.markdown +++ b/website/docs/r/sm_imported_certificate.html.markdown @@ -47,7 +47,7 @@ Review the argument reference that you can specify for your resource. * Constraints: The maximum length is `256` characters. The minimum length is `2` characters. The value must match regular expression `^[A-Za-z0-9_][A-Za-z0-9_]*(?:_*-*\.*[A-Za-z0-9]*)*[A-Za-z0-9]+$`. * `private_key` - (Computed, String) (Optional) The PEM-encoded private key to associate with the certificate. * Constraints: The maximum length is `100000` characters. The minimum length is `50` characters. The value must match regular expression `/^(-{5}BEGIN.+?-{5}[\\s\\S]+-{5}END.+?-{5})$/`. -* `secret_group_id` - (Optional, Forces new resource, String) A v4 UUID identifier, or `default` secret group. +* `secret_group_id` - (Optional, Forces new resource, String) A UUID identifier, or `default` secret group. * Constraints: The maximum length is `36` characters. The minimum length is `7` characters. The value must match regular expression `/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/`. ## Attribute Reference diff --git a/website/docs/r/sm_kv_secret.html.markdown b/website/docs/r/sm_kv_secret.html.markdown index 6620fcc2d7d..8f6c7fbc886 100644 --- a/website/docs/r/sm_kv_secret.html.markdown +++ b/website/docs/r/sm_kv_secret.html.markdown @@ -42,7 +42,7 @@ Review the argument reference that you can specify for your resource. * Constraints: The list items must match regular expression `/(.*?)/`. The maximum length is `30` items. The minimum length is `0` items. * `name` - (Required, String) The human-readable name of your secret. * Constraints: The maximum length is `256` characters. The minimum length is `2` characters. The value must match regular expression `^[A-Za-z0-9_][A-Za-z0-9_]*(?:_*-*\.*[A-Za-z0-9]*)*[A-Za-z0-9]+$`. -* `secret_group_id` - (Optional, Forces new resource, String) A v4 UUID identifier, or `default` secret group. +* `secret_group_id` - (Optional, Forces new resource, String) A UUID identifier, or `default` secret group. * Constraints: The maximum length is `36` characters. The minimum length is `7` characters. The value must match regular expression `/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/`. ## Attribute Reference diff --git a/website/docs/r/sm_private_certificate.html.markdown b/website/docs/r/sm_private_certificate.html.markdown index b6746b39d00..65937ce9f5d 100644 --- a/website/docs/r/sm_private_certificate.html.markdown +++ b/website/docs/r/sm_private_certificate.html.markdown @@ -58,7 +58,7 @@ Nested scheme for **rotation**: * Constraints: The minimum value is `1`. * `unit` - (Optional, String) The units for the secret rotation time interval. * Constraints: Allowable values are: `day`, `month`. -* `secret_group_id` - (Optional, Forces new resource, String) A v4 UUID identifier, or `default` secret group. +* `secret_group_id` - (Optional, Forces new resource, String) A UUID identifier, or `default` secret group. * Constraints: The maximum length is `36` characters. The minimum length is `7` characters. The value must match regular expression `/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/`. * `ttl` - (Optional, Forces new resource, String) The time-to-live (TTL) to assign to the private certificate. The value can be supplied as a string duration with time unit suffix - `d` for days, `h` for hours, `m` for minutes, or `s` for seconds. For example, `2d` or `48h` or `172800s`. diff --git a/website/docs/r/sm_public_certificate.html.markdown b/website/docs/r/sm_public_certificate.html.markdown index 1d6251acbc5..54c3597d5b1 100644 --- a/website/docs/r/sm_public_certificate.html.markdown +++ b/website/docs/r/sm_public_certificate.html.markdown @@ -55,7 +55,7 @@ Review the argument reference that you can specify for your resource. Nested scheme for **rotation**: * `auto_rotate` - (Optional, Boolean) Determines whether Secrets Manager rotates your secret automatically.Default is `false`. * `rotate_keys` - (Optional, Boolean) Determines whether Secrets Manager rotates the private key for your public certificate automatically.Default is `false`. If it is set to `true`, the service generates and stores a new private key for your rotated certificate. -* `secret_group_id` - (Optional, Forces new resource, String) A v4 UUID identifier, or `default` secret group. +* `secret_group_id` - (Optional, Forces new resource, String) A UUID identifier, or `default` secret group. * Constraints: The maximum length is `36` characters. The minimum length is `7` characters. The value must match regular expression `/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/`. * `alt_names` - (Optional, Forces new resource, List) With the Subject Alternative Name field, you can specify additional host names to be protected by a single SSL certificate. * Constraints: The list items must match regular expression `/^(.*?)$/`. The maximum length is `99` items. The minimum length is `0` items. diff --git a/website/docs/r/sm_service_credentials_secret.html.markdown b/website/docs/r/sm_service_credentials_secret.html.markdown index 625b1f9f7d7..13d9e4a872c 100644 --- a/website/docs/r/sm_service_credentials_secret.html.markdown +++ b/website/docs/r/sm_service_credentials_secret.html.markdown @@ -117,7 +117,7 @@ Nested scheme for **rotation**: * Constraints: The minimum value is `1`. * `unit` - (Optional, String) The units for the secret rotation time interval. * Constraints: Allowable values are: `day`, `month`. -* `secret_group_id` - (Optional, Forces new resource, String) A v4 UUID identifier, or `default` secret group. +* `secret_group_id` - (Optional, Forces new resource, String) A UUID identifier, or `default` secret group. * Constraints: The maximum length is `36` characters. The minimum length is `7` characters. The value must match regular expression `/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/`. * `source_service` - (Required, List) The properties required for creating the service credentials for the specified source service instance. Nested scheme for **source_service**: diff --git a/website/docs/r/sm_username_password_secret.html.markdown b/website/docs/r/sm_username_password_secret.html.markdown index cc57b228ecf..c297e4467be 100644 --- a/website/docs/r/sm_username_password_secret.html.markdown +++ b/website/docs/r/sm_username_password_secret.html.markdown @@ -70,7 +70,7 @@ Nested scheme for **rotation**: * Constraints: The minimum value is `1`. * `unit` - (Optional, String) The units for the secret rotation time interval. * Constraints: Allowable values are: `day`, `month`. -* `secret_group_id` - (Optional, Forces new resource, String) A v4 UUID identifier, or `default` secret group. +* `secret_group_id` - (Optional, Forces new resource, String) A UUID identifier, or `default` secret group. * Constraints: The maximum length is `36` characters. The minimum length is `7` characters. The value must match regular expression `/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/`. * `username` - (Required, Forces new resource, String) The username that is assigned to the secret. * Constraints: The maximum length is `64` characters. The minimum length is `2` characters. The value must match regular expression `/[A-Za-z0-9+-=.]*/`.