From b4c4301550c43eaf5de31cf814afd1f58d3584c6 Mon Sep 17 00:00:00 2001 From: yonatanyell <69857977+yonatanyell@users.noreply.github.com> Date: Mon, 16 Dec 2024 13:12:10 +0200 Subject: [PATCH] SM docs update (#5857) * SC addition * SC addition * SC addition * update function updated * SC unit tests added * SC unit tests added * d * tests fixes * tests fixes * update sdk * .secrets.baseline update * .secrets.baseline update * .secrets.baseline update * Update sm_service_credentials_secret_metadata.html.markdown * bugs fixes * bugs fixes * bugs fixes * docs bugs fixes * preferred_chain added for public cert lets encrypt configuration * support for creating secret version for username password & version_custom_metadata for all * support for creating secret version for username password & version_custom_metadata for all * support for creating secret version for username password & version_custom_metadata for all * support for creating secret version for username password & version_custom_metadata for all * support for creating secret version for username password & version_custom_metadata for all * support for creating secret version for username password & version_custom_metadata for all * preferred chain docs update * support for creating secret version for username password & version_custom_metadata for all * support for creating secret version for username password & version_custom_metadata for all * support for creating secret version for username password & version_custom_metadata for all * fix public cert bug * update docs * reordering bug in alt_names * name regex fix in docs * imported cert bug fix * crypto_key addition * crypto_key addition * crypto_key addition * crypto_key addition * rejections fixes * rejections fixes * rejections fixes * rejections fixes * rejections fixes * test label name changed * test label name changed * error formating update * go sdk version update * update docs & descriptions for uuid --------- Co-authored-by: Yonathan-Yellin Co-authored-by: Avi Ribchinsky Co-authored-by: Tatyana Co-authored-by: Idan Adar --- examples/ibm-secrets-manager/README.md | 2 +- examples/ibm-secrets-manager/variables.tf | 16 ++--- .../data_source_ibm_sm_arbitrary_secret.go | 2 +- ...source_ibm_sm_arbitrary_secret_metadata.go | 2 +- ...ta_source_ibm_sm_iam_credentials_secret.go | 2 +- ..._ibm_sm_iam_credentials_secret_metadata.go | 2 +- ...data_source_ibm_sm_imported_certificate.go | 2 +- ...ce_ibm_sm_imported_certificate_metadata.go | 2 +- .../data_source_ibm_sm_kv_secret.go | 2 +- .../data_source_ibm_sm_kv_secret_metadata.go | 2 +- .../data_source_ibm_sm_private_certificate.go | 2 +- ...rce_ibm_sm_private_certificate_metadata.go | 2 +- .../data_source_ibm_sm_public_certificate.go | 2 +- ...urce_ibm_sm_public_certificate_metadata.go | 2 +- .../data_source_ibm_sm_secret_groups.go | 2 +- .../data_source_ibm_sm_secrets.go | 4 +- ...ource_ibm_sm_service_credentials_secret.go | 2 +- ..._sm_service_credentials_secret_metadata.go | 2 +- ..._source_ibm_sm_username_password_secret.go | 2 +- ...bm_sm_username_password_secret_metadata.go | 2 +- .../resource_ibm_sm_arbitrary_secret.go | 4 +- .../resource_ibm_sm_iam_credentials_secret.go | 4 +- .../resource_ibm_sm_imported_certificate.go | 4 +- .../resource_ibm_sm_kv_secret.go | 4 +- .../resource_ibm_sm_private_certificate.go | 4 +- .../resource_ibm_sm_public_certificate.go | 4 +- ..._certificate_action_validate_manual_dns.go | 2 +- .../resource_ibm_sm_secret_group.go | 2 +- ...ource_ibm_sm_service_credentials_secret.go | 4 +- ...esource_ibm_sm_username_password_secret.go | 4 +- metadata/provider_metadata.json | 66 +++++++++---------- .../docs/d/sm_arbitrary_secret.html.markdown | 2 +- ...sm_arbitrary_secret_metadata.html.markdown | 2 +- .../d/sm_iam_credentials_secret.html.markdown | 2 +- ..._credentials_secret_metadata.html.markdown | 2 +- .../d/sm_imported_certificate.html.markdown | 2 +- ...mported_certificate_metadata.html.markdown | 2 +- website/docs/d/sm_kv_secret.html.markdown | 2 +- .../d/sm_kv_secret_metadata.html.markdown | 2 +- .../d/sm_private_certificate.html.markdown | 2 +- ...private_certificate_metadata.html.markdown | 2 +- .../d/sm_public_certificate.html.markdown | 2 +- ..._public_certificate_metadata.html.markdown | 2 +- website/docs/d/sm_secret_groups.html.markdown | 2 +- website/docs/d/sm_secrets.html.markdown | 4 +- ...m_service_credentials_secret.html.markdown | 2 +- ..._credentials_secret_metadata.html.markdown | 2 +- .../sm_username_password_secret.html.markdown | 2 +- ...ame_password_secret_metadata.html.markdown | 2 +- .../docs/r/sm_arbitrary_secret.html.markdown | 2 +- .../r/sm_iam_credentials_secret.html.markdown | 2 +- .../r/sm_imported_certificate.html.markdown | 2 +- website/docs/r/sm_kv_secret.html.markdown | 2 +- .../r/sm_private_certificate.html.markdown | 2 +- .../r/sm_public_certificate.html.markdown | 2 +- ...m_service_credentials_secret.html.markdown | 2 +- .../sm_username_password_secret.html.markdown | 2 +- 57 files changed, 106 insertions(+), 106 deletions(-) diff --git a/examples/ibm-secrets-manager/README.md b/examples/ibm-secrets-manager/README.md index b970c84196..8c278f9e12 100644 --- a/examples/ibm-secrets-manager/README.md +++ b/examples/ibm-secrets-manager/README.md @@ -555,7 +555,7 @@ data "sm_en_registration" "sm_en_registration_instance" { | description | An extended description of your secret.To protect your privacy, do not use personal data, such as your name or location, as a description for your secret group. | `string` | false | | expiration_date | The date a secret is expired. The date format follows RFC 3339. | `` | false | | labels | Labels that you can use to search for secrets in your instance.Up to 30 labels can be created. | `list(string)` | false | -| secret_group_id | A v4 UUID identifier, or `default` secret group. | `string` | false | +| secret_group_id | A UUID identifier, or `default` secret group. | `string` | false | | secret_type | The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials. | `string` | false | | certificate | The PEM-encoded contents of your certificate. | `string` | false | | intermediate | (Optional) The PEM-encoded intermediate certificate to associate with the root certificate. | `string` | false | diff --git a/examples/ibm-secrets-manager/variables.tf b/examples/ibm-secrets-manager/variables.tf index a0a123adde..51510e73e9 100644 --- a/examples/ibm-secrets-manager/variables.tf +++ b/examples/ibm-secrets-manager/variables.tf @@ -59,7 +59,7 @@ variable "sm_imported_certificate_labels" { default = [ "my-label" ] } variable "sm_imported_certificate_secret_group_id" { - description = "A v4 UUID identifier, or `default` secret group." + description = "A UUID identifier, or `default` secret group." type = string default = "default" } @@ -106,7 +106,7 @@ variable "sm_public_certificate_labels" { default = [ "my-label" ] } variable "sm_public_certificate_secret_group_id" { - description = "A v4 UUID identifier, or `default` secret group." + description = "A UUID identifier, or `default` secret group." type = string default = "default" } @@ -140,7 +140,7 @@ variable "sm_kv_secret_labels" { default = [ "my-label" ] } variable "sm_kv_secret_secret_group_id" { - description = "A v4 UUID identifier, or `default` secret group." + description = "A UUID identifier, or `default` secret group." type = string default = "default" } @@ -172,7 +172,7 @@ variable "sm_iam_credentials_secret_labels" { default = [ "my-label" ] } variable "sm_iam_credentials_secret_secret_group_id" { - description = "A v4 UUID identifier, or `default` secret group." + description = "A UUID identifier, or `default` secret group." type = string default = "default" } @@ -214,7 +214,7 @@ variable "sm_service_credentials_secret_labels" { default = [ "my-label" ] } variable "sm_service_credentials_secret_secret_group_id" { - description = "A v4 UUID identifier, or `default` secret group." + description = "A UUID identifier, or `default` secret group." type = string default = "default" } @@ -267,7 +267,7 @@ variable "sm_arbitrary_secret_labels" { default = [ "my-label" ] } variable "sm_arbitrary_secret_secret_group_id" { - description = "A v4 UUID identifier, or `default` secret group." + description = "A UUID identifier, or `default` secret group." type = string default = "default" } @@ -304,7 +304,7 @@ variable "sm_username_password_secret_labels" { default = [ "my-label" ] } variable "sm_username_password_secret_secret_group_id" { - description = "A v4 UUID identifier, or `default` secret group." + description = "A UUID identifier, or `default` secret group." type = string default = "default" } @@ -346,7 +346,7 @@ variable "sm_private_certificate_labels" { default = [ "my-label" ] } variable "sm_private_certificate_secret_group_id" { - description = "A v4 UUID identifier, or `default` secret group." + description = "A UUID identifier, or `default` secret group." type = string default = "default" } diff --git a/ibm/service/secretsmanager/data_source_ibm_sm_arbitrary_secret.go b/ibm/service/secretsmanager/data_source_ibm_sm_arbitrary_secret.go index 2cd8853a85..6a979f7103 100644 --- a/ibm/service/secretsmanager/data_source_ibm_sm_arbitrary_secret.go +++ b/ibm/service/secretsmanager/data_source_ibm_sm_arbitrary_secret.go @@ -82,7 +82,7 @@ func DataSourceIbmSmArbitrarySecret() *schema.Resource { "secret_group_id": &schema.Schema{ Type: schema.TypeString, Computed: true, - Description: "A v4 UUID identifier, or `default` secret group.", + Description: "A UUID identifier, or `default` secret group.", }, "secret_group_name": &schema.Schema{ Type: schema.TypeString, diff --git a/ibm/service/secretsmanager/data_source_ibm_sm_arbitrary_secret_metadata.go b/ibm/service/secretsmanager/data_source_ibm_sm_arbitrary_secret_metadata.go index c822a89341..f677c9c4cf 100644 --- a/ibm/service/secretsmanager/data_source_ibm_sm_arbitrary_secret_metadata.go +++ b/ibm/service/secretsmanager/data_source_ibm_sm_arbitrary_secret_metadata.go @@ -80,7 +80,7 @@ func DataSourceIbmSmArbitrarySecretMetadata() *schema.Resource { "secret_group_id": &schema.Schema{ Type: schema.TypeString, Computed: true, - Description: "A v4 UUID identifier, or `default` secret group.", + Description: "A UUID identifier, or `default` secret group.", }, "secret_type": &schema.Schema{ Type: schema.TypeString, diff --git a/ibm/service/secretsmanager/data_source_ibm_sm_iam_credentials_secret.go b/ibm/service/secretsmanager/data_source_ibm_sm_iam_credentials_secret.go index 753bc047ba..be1da66866 100644 --- a/ibm/service/secretsmanager/data_source_ibm_sm_iam_credentials_secret.go +++ b/ibm/service/secretsmanager/data_source_ibm_sm_iam_credentials_secret.go @@ -81,7 +81,7 @@ func DataSourceIbmSmIamCredentialsSecret() *schema.Resource { "secret_group_id": &schema.Schema{ Type: schema.TypeString, Computed: true, - Description: "A v4 UUID identifier, or `default` secret group.", + Description: "A UUID identifier, or `default` secret group.", }, "secret_group_name": &schema.Schema{ Type: schema.TypeString, diff --git a/ibm/service/secretsmanager/data_source_ibm_sm_iam_credentials_secret_metadata.go b/ibm/service/secretsmanager/data_source_ibm_sm_iam_credentials_secret_metadata.go index 175a5c3e5d..9c3e5dc3ff 100644 --- a/ibm/service/secretsmanager/data_source_ibm_sm_iam_credentials_secret_metadata.go +++ b/ibm/service/secretsmanager/data_source_ibm_sm_iam_credentials_secret_metadata.go @@ -80,7 +80,7 @@ func DataSourceIbmSmIamCredentialsSecretMetadata() *schema.Resource { "secret_group_id": &schema.Schema{ Type: schema.TypeString, Computed: true, - Description: "A v4 UUID identifier, or `default` secret group.", + Description: "A UUID identifier, or `default` secret group.", }, "secret_type": &schema.Schema{ Type: schema.TypeString, diff --git a/ibm/service/secretsmanager/data_source_ibm_sm_imported_certificate.go b/ibm/service/secretsmanager/data_source_ibm_sm_imported_certificate.go index 1a0310db03..a505f3be9b 100644 --- a/ibm/service/secretsmanager/data_source_ibm_sm_imported_certificate.go +++ b/ibm/service/secretsmanager/data_source_ibm_sm_imported_certificate.go @@ -82,7 +82,7 @@ func DataSourceIbmSmImportedCertificate() *schema.Resource { "secret_group_id": &schema.Schema{ Type: schema.TypeString, Computed: true, - Description: "A v4 UUID identifier, or `default` secret group.", + Description: "A UUID identifier, or `default` secret group.", }, "secret_group_name": &schema.Schema{ Type: schema.TypeString, diff --git a/ibm/service/secretsmanager/data_source_ibm_sm_imported_certificate_metadata.go b/ibm/service/secretsmanager/data_source_ibm_sm_imported_certificate_metadata.go index d44b056af8..6b98ab3c14 100644 --- a/ibm/service/secretsmanager/data_source_ibm_sm_imported_certificate_metadata.go +++ b/ibm/service/secretsmanager/data_source_ibm_sm_imported_certificate_metadata.go @@ -80,7 +80,7 @@ func DataSourceIbmSmImportedCertificateMetadata() *schema.Resource { "secret_group_id": &schema.Schema{ Type: schema.TypeString, Computed: true, - Description: "A v4 UUID identifier, or `default` secret group.", + Description: "A UUID identifier, or `default` secret group.", }, "secret_type": &schema.Schema{ Type: schema.TypeString, diff --git a/ibm/service/secretsmanager/data_source_ibm_sm_kv_secret.go b/ibm/service/secretsmanager/data_source_ibm_sm_kv_secret.go index 8ad39c1e08..25ea72dc06 100644 --- a/ibm/service/secretsmanager/data_source_ibm_sm_kv_secret.go +++ b/ibm/service/secretsmanager/data_source_ibm_sm_kv_secret.go @@ -82,7 +82,7 @@ func DataSourceIbmSmKvSecret() *schema.Resource { "secret_group_id": &schema.Schema{ Type: schema.TypeString, Computed: true, - Description: "A v4 UUID identifier, or `default` secret group.", + Description: "A UUID identifier, or `default` secret group.", }, "secret_group_name": &schema.Schema{ Type: schema.TypeString, diff --git a/ibm/service/secretsmanager/data_source_ibm_sm_kv_secret_metadata.go b/ibm/service/secretsmanager/data_source_ibm_sm_kv_secret_metadata.go index 11f82b269e..efa0c948b8 100644 --- a/ibm/service/secretsmanager/data_source_ibm_sm_kv_secret_metadata.go +++ b/ibm/service/secretsmanager/data_source_ibm_sm_kv_secret_metadata.go @@ -80,7 +80,7 @@ func DataSourceIbmSmKvSecretMetadata() *schema.Resource { "secret_group_id": &schema.Schema{ Type: schema.TypeString, Computed: true, - Description: "A v4 UUID identifier, or `default` secret group.", + Description: "A UUID identifier, or `default` secret group.", }, "secret_type": &schema.Schema{ Type: schema.TypeString, diff --git a/ibm/service/secretsmanager/data_source_ibm_sm_private_certificate.go b/ibm/service/secretsmanager/data_source_ibm_sm_private_certificate.go index d8aa2181a7..6f7fdaa265 100644 --- a/ibm/service/secretsmanager/data_source_ibm_sm_private_certificate.go +++ b/ibm/service/secretsmanager/data_source_ibm_sm_private_certificate.go @@ -82,7 +82,7 @@ func DataSourceIbmSmPrivateCertificate() *schema.Resource { "secret_group_id": &schema.Schema{ Type: schema.TypeString, Computed: true, - Description: "A v4 UUID identifier, or `default` secret group.", + Description: "A UUID identifier, or `default` secret group.", }, "secret_group_name": &schema.Schema{ Type: schema.TypeString, diff --git a/ibm/service/secretsmanager/data_source_ibm_sm_private_certificate_metadata.go b/ibm/service/secretsmanager/data_source_ibm_sm_private_certificate_metadata.go index 12706e4f58..7bb07ff26d 100644 --- a/ibm/service/secretsmanager/data_source_ibm_sm_private_certificate_metadata.go +++ b/ibm/service/secretsmanager/data_source_ibm_sm_private_certificate_metadata.go @@ -80,7 +80,7 @@ func DataSourceIbmSmPrivateCertificateMetadata() *schema.Resource { "secret_group_id": &schema.Schema{ Type: schema.TypeString, Computed: true, - Description: "A v4 UUID identifier, or `default` secret group.", + Description: "A UUID identifier, or `default` secret group.", }, "secret_type": &schema.Schema{ Type: schema.TypeString, diff --git a/ibm/service/secretsmanager/data_source_ibm_sm_public_certificate.go b/ibm/service/secretsmanager/data_source_ibm_sm_public_certificate.go index 17bc5ead32..6e4efac230 100644 --- a/ibm/service/secretsmanager/data_source_ibm_sm_public_certificate.go +++ b/ibm/service/secretsmanager/data_source_ibm_sm_public_certificate.go @@ -82,7 +82,7 @@ func DataSourceIbmSmPublicCertificate() *schema.Resource { "secret_group_id": &schema.Schema{ Type: schema.TypeString, Computed: true, - Description: "A v4 UUID identifier, or `default` secret group.", + Description: "A UUID identifier, or `default` secret group.", }, "secret_group_name": &schema.Schema{ Type: schema.TypeString, diff --git a/ibm/service/secretsmanager/data_source_ibm_sm_public_certificate_metadata.go b/ibm/service/secretsmanager/data_source_ibm_sm_public_certificate_metadata.go index 569fb67cec..46dc8dd367 100644 --- a/ibm/service/secretsmanager/data_source_ibm_sm_public_certificate_metadata.go +++ b/ibm/service/secretsmanager/data_source_ibm_sm_public_certificate_metadata.go @@ -80,7 +80,7 @@ func DataSourceIbmSmPublicCertificateMetadata() *schema.Resource { "secret_group_id": &schema.Schema{ Type: schema.TypeString, Computed: true, - Description: "A v4 UUID identifier, or `default` secret group.", + Description: "A UUID identifier, or `default` secret group.", }, "secret_type": &schema.Schema{ Type: schema.TypeString, diff --git a/ibm/service/secretsmanager/data_source_ibm_sm_secret_groups.go b/ibm/service/secretsmanager/data_source_ibm_sm_secret_groups.go index ea1ee4dc89..41cde9434b 100644 --- a/ibm/service/secretsmanager/data_source_ibm_sm_secret_groups.go +++ b/ibm/service/secretsmanager/data_source_ibm_sm_secret_groups.go @@ -31,7 +31,7 @@ func DataSourceIbmSmSecretGroups() *schema.Resource { "id": &schema.Schema{ Type: schema.TypeString, Computed: true, - Description: "A v4 UUID identifier.", + Description: "A UUID identifier.", }, "name": &schema.Schema{ Type: schema.TypeString, diff --git a/ibm/service/secretsmanager/data_source_ibm_sm_secrets.go b/ibm/service/secretsmanager/data_source_ibm_sm_secrets.go index a921d68cb9..b6afa31be8 100644 --- a/ibm/service/secretsmanager/data_source_ibm_sm_secrets.go +++ b/ibm/service/secretsmanager/data_source_ibm_sm_secrets.go @@ -95,7 +95,7 @@ func DataSourceIbmSmSecrets() *schema.Resource { "id": &schema.Schema{ Type: schema.TypeString, Computed: true, - Description: "A v4 UUID identifier.", + Description: "A UUID identifier.", }, "labels": &schema.Schema{ Type: schema.TypeList, @@ -118,7 +118,7 @@ func DataSourceIbmSmSecrets() *schema.Resource { "secret_group_id": &schema.Schema{ Type: schema.TypeString, Computed: true, - Description: "A v4 UUID identifier, or `default` secret group.", + Description: "A UUID identifier, or `default` secret group.", }, "secret_type": &schema.Schema{ Type: schema.TypeString, diff --git a/ibm/service/secretsmanager/data_source_ibm_sm_service_credentials_secret.go b/ibm/service/secretsmanager/data_source_ibm_sm_service_credentials_secret.go index 205328b790..bc0a36a047 100644 --- a/ibm/service/secretsmanager/data_source_ibm_sm_service_credentials_secret.go +++ b/ibm/service/secretsmanager/data_source_ibm_sm_service_credentials_secret.go @@ -80,7 +80,7 @@ func DataSourceIbmSmServiceCredentialsSecret() *schema.Resource { Type: schema.TypeString, Computed: true, ForceNew: true, - Description: "A v4 UUID identifier, or `default` secret group.", + Description: "A UUID identifier, or `default` secret group.", }, "secret_group_name": &schema.Schema{ Type: schema.TypeString, diff --git a/ibm/service/secretsmanager/data_source_ibm_sm_service_credentials_secret_metadata.go b/ibm/service/secretsmanager/data_source_ibm_sm_service_credentials_secret_metadata.go index 1114706736..036b1cfce4 100644 --- a/ibm/service/secretsmanager/data_source_ibm_sm_service_credentials_secret_metadata.go +++ b/ibm/service/secretsmanager/data_source_ibm_sm_service_credentials_secret_metadata.go @@ -75,7 +75,7 @@ func DataSourceIbmSmServiceCredentialsSecretMetadata() *schema.Resource { Type: schema.TypeString, Computed: true, ForceNew: true, - Description: "A v4 UUID identifier, or `default` secret group.", + Description: "A UUID identifier, or `default` secret group.", }, "secret_type": &schema.Schema{ Type: schema.TypeString, diff --git a/ibm/service/secretsmanager/data_source_ibm_sm_username_password_secret.go b/ibm/service/secretsmanager/data_source_ibm_sm_username_password_secret.go index 2ef644bd18..217b9989a9 100644 --- a/ibm/service/secretsmanager/data_source_ibm_sm_username_password_secret.go +++ b/ibm/service/secretsmanager/data_source_ibm_sm_username_password_secret.go @@ -82,7 +82,7 @@ func DataSourceIbmSmUsernamePasswordSecret() *schema.Resource { "secret_group_id": &schema.Schema{ Type: schema.TypeString, Computed: true, - Description: "A v4 UUID identifier, or `default` secret group.", + Description: "A UUID identifier, or `default` secret group.", }, "secret_group_name": &schema.Schema{ Type: schema.TypeString, diff --git a/ibm/service/secretsmanager/data_source_ibm_sm_username_password_secret_metadata.go b/ibm/service/secretsmanager/data_source_ibm_sm_username_password_secret_metadata.go index a1bdb8ce35..b184b4905f 100644 --- a/ibm/service/secretsmanager/data_source_ibm_sm_username_password_secret_metadata.go +++ b/ibm/service/secretsmanager/data_source_ibm_sm_username_password_secret_metadata.go @@ -80,7 +80,7 @@ func DataSourceIbmSmUsernamePasswordSecretMetadata() *schema.Resource { "secret_group_id": &schema.Schema{ Type: schema.TypeString, Computed: true, - Description: "A v4 UUID identifier, or `default` secret group.", + Description: "A UUID identifier, or `default` secret group.", }, "secret_type": &schema.Schema{ Type: schema.TypeString, diff --git a/ibm/service/secretsmanager/resource_ibm_sm_arbitrary_secret.go b/ibm/service/secretsmanager/resource_ibm_sm_arbitrary_secret.go index 88a3336911..a484538f5e 100644 --- a/ibm/service/secretsmanager/resource_ibm_sm_arbitrary_secret.go +++ b/ibm/service/secretsmanager/resource_ibm_sm_arbitrary_secret.go @@ -78,7 +78,7 @@ func ResourceIbmSmArbitrarySecret() *schema.Resource { Optional: true, Computed: true, ForceNew: true, - Description: "A v4 UUID identifier, or `default` secret group.", + Description: "A UUID identifier, or `default` secret group.", }, "version_custom_metadata": &schema.Schema{ @@ -110,7 +110,7 @@ func ResourceIbmSmArbitrarySecret() *schema.Resource { "secret_id": &schema.Schema{ Type: schema.TypeString, Computed: true, - Description: "A v4 UUID identifier.", + Description: "A UUID identifier.", }, "locks_total": &schema.Schema{ Type: schema.TypeInt, diff --git a/ibm/service/secretsmanager/resource_ibm_sm_iam_credentials_secret.go b/ibm/service/secretsmanager/resource_ibm_sm_iam_credentials_secret.go index d8855437fe..f455d2ce51 100644 --- a/ibm/service/secretsmanager/resource_ibm_sm_iam_credentials_secret.go +++ b/ibm/service/secretsmanager/resource_ibm_sm_iam_credentials_secret.go @@ -50,7 +50,7 @@ func ResourceIbmSmIamCredentialsSecret() *schema.Resource { Optional: true, Computed: true, ForceNew: true, - Description: "A v4 UUID identifier, or `default` secret group.", + Description: "A UUID identifier, or `default` secret group.", }, "labels": &schema.Schema{ Type: schema.TypeList, @@ -164,7 +164,7 @@ func ResourceIbmSmIamCredentialsSecret() *schema.Resource { "secret_id": &schema.Schema{ Type: schema.TypeString, Computed: true, - Description: "A v4 UUID identifier.", + Description: "A UUID identifier.", }, "locks_total": &schema.Schema{ Type: schema.TypeInt, diff --git a/ibm/service/secretsmanager/resource_ibm_sm_imported_certificate.go b/ibm/service/secretsmanager/resource_ibm_sm_imported_certificate.go index adc731ae96..c124568a14 100644 --- a/ibm/service/secretsmanager/resource_ibm_sm_imported_certificate.go +++ b/ibm/service/secretsmanager/resource_ibm_sm_imported_certificate.go @@ -61,14 +61,14 @@ func ResourceIbmSmImportedCertificate() *schema.Resource { "secret_id": &schema.Schema{ Type: schema.TypeString, Computed: true, - Description: "A v4 UUID identifier.", + Description: "A UUID identifier.", }, "secret_group_id": &schema.Schema{ Type: schema.TypeString, Optional: true, Computed: true, ForceNew: true, - Description: "A v4 UUID identifier, or `default` secret group.", + Description: "A UUID identifier, or `default` secret group.", }, "secret_type": &schema.Schema{ Type: schema.TypeString, diff --git a/ibm/service/secretsmanager/resource_ibm_sm_kv_secret.go b/ibm/service/secretsmanager/resource_ibm_sm_kv_secret.go index 81a6f44be1..f1b26b27aa 100644 --- a/ibm/service/secretsmanager/resource_ibm_sm_kv_secret.go +++ b/ibm/service/secretsmanager/resource_ibm_sm_kv_secret.go @@ -49,7 +49,7 @@ func ResourceIbmSmKvSecret() *schema.Resource { Optional: true, Computed: true, ForceNew: true, - Description: "A v4 UUID identifier, or `default` secret group.", + Description: "A UUID identifier, or `default` secret group.", }, "labels": &schema.Schema{ Type: schema.TypeList, @@ -126,7 +126,7 @@ func ResourceIbmSmKvSecret() *schema.Resource { "secret_id": &schema.Schema{ Type: schema.TypeString, Computed: true, - Description: "A v4 UUID identifier.", + Description: "A UUID identifier.", }, }, } diff --git a/ibm/service/secretsmanager/resource_ibm_sm_private_certificate.go b/ibm/service/secretsmanager/resource_ibm_sm_private_certificate.go index 8a2e424619..0da1229d2b 100644 --- a/ibm/service/secretsmanager/resource_ibm_sm_private_certificate.go +++ b/ibm/service/secretsmanager/resource_ibm_sm_private_certificate.go @@ -49,7 +49,7 @@ func ResourceIbmSmPrivateCertificate() *schema.Resource { ForceNew: true, Optional: true, Computed: true, - Description: "A v4 UUID identifier, or `default` secret group.", + Description: "A UUID identifier, or `default` secret group.", }, "labels": &schema.Schema{ Type: schema.TypeList, @@ -196,7 +196,7 @@ func ResourceIbmSmPrivateCertificate() *schema.Resource { "secret_id": &schema.Schema{ Type: schema.TypeString, Computed: true, - Description: "A v4 UUID identifier.", + Description: "A UUID identifier.", }, "locks_total": &schema.Schema{ Type: schema.TypeInt, diff --git a/ibm/service/secretsmanager/resource_ibm_sm_public_certificate.go b/ibm/service/secretsmanager/resource_ibm_sm_public_certificate.go index 17aa926c7d..0f8172c81e 100644 --- a/ibm/service/secretsmanager/resource_ibm_sm_public_certificate.go +++ b/ibm/service/secretsmanager/resource_ibm_sm_public_certificate.go @@ -58,7 +58,7 @@ func ResourceIbmSmPublicCertificate() *schema.Resource { ForceNew: true, Optional: true, Computed: true, - Description: "A v4 UUID identifier, or `default` secret group.", + Description: "A UUID identifier, or `default` secret group.", }, "labels": &schema.Schema{ Type: schema.TypeList, @@ -237,7 +237,7 @@ func ResourceIbmSmPublicCertificate() *schema.Resource { "secret_id": &schema.Schema{ Type: schema.TypeString, Computed: true, - Description: "A v4 UUID identifier.", + Description: "A UUID identifier.", }, "locks_total": &schema.Schema{ Type: schema.TypeInt, diff --git a/ibm/service/secretsmanager/resource_ibm_sm_public_certificate_action_validate_manual_dns.go b/ibm/service/secretsmanager/resource_ibm_sm_public_certificate_action_validate_manual_dns.go index 4180dba347..a845acfc32 100644 --- a/ibm/service/secretsmanager/resource_ibm_sm_public_certificate_action_validate_manual_dns.go +++ b/ibm/service/secretsmanager/resource_ibm_sm_public_certificate_action_validate_manual_dns.go @@ -28,7 +28,7 @@ func ResourceIbmSmPublicCertificateActionValidateManualDns() *schema.Resource { "secret_id": &schema.Schema{ Type: schema.TypeString, Required: true, - Description: "A v4 UUID identifier.", + Description: "A UUID identifier.", ForceNew: true, }, }, diff --git a/ibm/service/secretsmanager/resource_ibm_sm_secret_group.go b/ibm/service/secretsmanager/resource_ibm_sm_secret_group.go index 0fb9fbcd0b..d0106d151e 100644 --- a/ibm/service/secretsmanager/resource_ibm_sm_secret_group.go +++ b/ibm/service/secretsmanager/resource_ibm_sm_secret_group.go @@ -30,7 +30,7 @@ func ResourceIbmSmSecretGroup() *schema.Resource { "secret_group_id": &schema.Schema{ Type: schema.TypeString, Computed: true, - Description: "A v4 UUID identifier.", + Description: "A UUID identifier.", }, "name": &schema.Schema{ Type: schema.TypeString, diff --git a/ibm/service/secretsmanager/resource_ibm_sm_service_credentials_secret.go b/ibm/service/secretsmanager/resource_ibm_sm_service_credentials_secret.go index b4dc68f99d..92b2584e53 100644 --- a/ibm/service/secretsmanager/resource_ibm_sm_service_credentials_secret.go +++ b/ibm/service/secretsmanager/resource_ibm_sm_service_credentials_secret.go @@ -47,7 +47,7 @@ func ResourceIbmSmServiceCredentialsSecret() *schema.Resource { Optional: true, Computed: true, ForceNew: true, - Description: "A v4 UUID identifier, or `default` secret group.", + Description: "A UUID identifier, or `default` secret group.", }, "labels": &schema.Schema{ Type: schema.TypeList, @@ -298,7 +298,7 @@ func ResourceIbmSmServiceCredentialsSecret() *schema.Resource { "secret_id": &schema.Schema{ Type: schema.TypeString, Computed: true, - Description: "A v4 UUID identifier.", + Description: "A UUID identifier.", }, }, } diff --git a/ibm/service/secretsmanager/resource_ibm_sm_username_password_secret.go b/ibm/service/secretsmanager/resource_ibm_sm_username_password_secret.go index 267928197a..4a9562e3d3 100644 --- a/ibm/service/secretsmanager/resource_ibm_sm_username_password_secret.go +++ b/ibm/service/secretsmanager/resource_ibm_sm_username_password_secret.go @@ -65,12 +65,12 @@ func ResourceIbmSmUsernamePasswordSecret() *schema.Resource { Optional: true, Computed: true, ForceNew: true, - Description: "A v4 UUID identifier, or `default` secret group.", + Description: "A UUID identifier, or `default` secret group.", }, "secret_id": &schema.Schema{ Type: schema.TypeString, Computed: true, - Description: "A v4 UUID identifier.", + Description: "A UUID identifier.", }, "secret_type": &schema.Schema{ Type: schema.TypeString, diff --git a/metadata/provider_metadata.json b/metadata/provider_metadata.json index 63805d34fb..dd8c722097 100644 --- a/metadata/provider_metadata.json +++ b/metadata/provider_metadata.json @@ -80045,7 +80045,7 @@ { "name": "secret_group_id", "type": "TypeString", - "description": "A v4 UUID identifier, or `default` secret group.", + "description": "A UUID identifier, or `default` secret group.", "computed": true }, { @@ -80101,7 +80101,7 @@ { "name": "secret_group_id", "type": "TypeString", - "description": "A v4 UUID identifier, or `default` secret group.", + "description": "A UUID identifier, or `default` secret group.", "computed": true }, { @@ -80619,7 +80619,7 @@ { "name": "secret_group_id", "type": "TypeString", - "description": "A v4 UUID identifier, or `default` secret group.", + "description": "A UUID identifier, or `default` secret group.", "computed": true }, { @@ -80725,7 +80725,7 @@ { "name": "secret_group_id", "type": "TypeString", - "description": "A v4 UUID identifier, or `default` secret group.", + "description": "A UUID identifier, or `default` secret group.", "computed": true }, { @@ -80939,7 +80939,7 @@ { "name": "secret_group_id", "type": "TypeString", - "description": "A v4 UUID identifier, or `default` secret group.", + "description": "A UUID identifier, or `default` secret group.", "computed": true }, { @@ -81247,7 +81247,7 @@ { "name": "secret_group_id", "type": "TypeString", - "description": "A v4 UUID identifier, or `default` secret group.", + "description": "A UUID identifier, or `default` secret group.", "computed": true }, { @@ -81467,7 +81467,7 @@ { "name": "secret_group_id", "type": "TypeString", - "description": "A v4 UUID identifier, or `default` secret group.", + "description": "A UUID identifier, or `default` secret group.", "computed": true }, { @@ -81557,7 +81557,7 @@ { "name": "secret_group_id", "type": "TypeString", - "description": "A v4 UUID identifier, or `default` secret group.", + "description": "A UUID identifier, or `default` secret group.", "computed": true }, { @@ -81656,7 +81656,7 @@ { "name": "secret_group_id", "type": "TypeString", - "description": "A v4 UUID identifier, or `default` secret group.", + "description": "A UUID identifier, or `default` secret group.", "computed": true }, { @@ -82901,7 +82901,7 @@ { "name": "secret_group_id", "type": "TypeString", - "description": "A v4 UUID identifier, or `default` secret group.", + "description": "A UUID identifier, or `default` secret group.", "computed": true }, { @@ -83177,7 +83177,7 @@ { "name": "secret_group_id", "type": "TypeString", - "description": "A v4 UUID identifier, or `default` secret group.", + "description": "A UUID identifier, or `default` secret group.", "computed": true }, { @@ -83703,7 +83703,7 @@ { "name": "secret_group_id", "type": "TypeString", - "description": "A v4 UUID identifier, or `default` secret group.", + "description": "A UUID identifier, or `default` secret group.", "computed": true }, { @@ -84086,7 +84086,7 @@ "id": { "name": "id", "type": "TypeString", - "description": "A v4 UUID identifier.", + "description": "A UUID identifier.", "computed": true }, "name": { @@ -84245,7 +84245,7 @@ "id": { "name": "id", "type": "TypeString", - "description": "A v4 UUID identifier.", + "description": "A UUID identifier.", "computed": true }, "intermediate_included": { @@ -84440,7 +84440,7 @@ "secret_group_id": { "name": "secret_group_id", "type": "TypeString", - "description": "A v4 UUID identifier, or `default` secret group.", + "description": "A UUID identifier, or `default` secret group.", "computed": true }, "secret_type": { @@ -84662,7 +84662,7 @@ { "name": "secret_group_id", "type": "TypeString", - "description": "A v4 UUID identifier, or `default` secret group.", + "description": "A UUID identifier, or `default` secret group.", "computed": true }, { @@ -84803,7 +84803,7 @@ { "name": "secret_group_id", "type": "TypeString", - "description": "A v4 UUID identifier, or `default` secret group.", + "description": "A UUID identifier, or `default` secret group.", "computed": true }, { @@ -147903,7 +147903,7 @@ { "name": "secret_id", "type": "TypeString", - "description": "A v4 UUID identifier.", + "description": "A UUID identifier.", "computed": true }, { @@ -147998,7 +147998,7 @@ { "name": "secret_group_id", "type": "TypeString", - "description": "A v4 UUID identifier, or `default` secret group.", + "description": "A UUID identifier, or `default` secret group.", "immutable": true, "optional": true, "computed": true @@ -148201,7 +148201,7 @@ { "name": "secret_group_id", "type": "TypeString", - "description": "A v4 UUID identifier, or `default` secret group.", + "description": "A UUID identifier, or `default` secret group.", "immutable": true, "optional": true, "computed": true @@ -148253,7 +148253,7 @@ { "name": "secret_id", "type": "TypeString", - "description": "A v4 UUID identifier.", + "description": "A UUID identifier.", "computed": true }, { @@ -148407,13 +148407,13 @@ { "name": "secret_id", "type": "TypeString", - "description": "A v4 UUID identifier.", + "description": "A UUID identifier.", "computed": true }, { "name": "secret_group_id", "type": "TypeString", - "description": "A v4 UUID identifier, or `default` secret group.", + "description": "A UUID identifier, or `default` secret group.", "immutable": true, "optional": true, "computed": true @@ -148692,7 +148692,7 @@ { "name": "secret_group_id", "type": "TypeString", - "description": "A v4 UUID identifier, or `default` secret group.", + "description": "A UUID identifier, or `default` secret group.", "immutable": true, "optional": true, "computed": true @@ -148722,7 +148722,7 @@ { "name": "secret_id", "type": "TypeString", - "description": "A v4 UUID identifier.", + "description": "A UUID identifier.", "computed": true }, { @@ -148864,7 +148864,7 @@ { "name": "secret_id", "type": "TypeString", - "description": "A v4 UUID identifier.", + "description": "A UUID identifier.", "computed": true }, { @@ -149043,7 +149043,7 @@ { "name": "secret_group_id", "type": "TypeString", - "description": "A v4 UUID identifier, or `default` secret group.", + "description": "A UUID identifier, or `default` secret group.", "immutable": true, "optional": true, "computed": true @@ -150710,7 +150710,7 @@ { "name": "secret_group_id", "type": "TypeString", - "description": "A v4 UUID identifier, or `default` secret group.", + "description": "A UUID identifier, or `default` secret group.", "immutable": true, "optional": true, "computed": true @@ -150830,7 +150830,7 @@ { "name": "secret_id", "type": "TypeString", - "description": "A v4 UUID identifier.", + "description": "A UUID identifier.", "computed": true }, { @@ -151000,7 +151000,7 @@ { "name": "secret_id", "type": "TypeString", - "description": "A v4 UUID identifier.", + "description": "A UUID identifier.", "immutable": true, "required": true }, @@ -151272,7 +151272,7 @@ { "name": "secret_group_id", "type": "TypeString", - "description": "A v4 UUID identifier.", + "description": "A UUID identifier.", "computed": true }, { @@ -151429,7 +151429,7 @@ { "name": "secret_group_id", "type": "TypeString", - "description": "A v4 UUID identifier, or `default` secret group.", + "description": "A UUID identifier, or `default` secret group.", "immutable": true, "optional": true, "computed": true @@ -151500,7 +151500,7 @@ { "name": "secret_id", "type": "TypeString", - "description": "A v4 UUID identifier.", + "description": "A UUID identifier.", "computed": true } ], diff --git a/website/docs/d/sm_arbitrary_secret.html.markdown b/website/docs/d/sm_arbitrary_secret.html.markdown index 80c207e8d8..7633c9e1fe 100644 --- a/website/docs/d/sm_arbitrary_secret.html.markdown +++ b/website/docs/d/sm_arbitrary_secret.html.markdown @@ -79,7 +79,7 @@ In addition to all argument references listed, you can access the following attr * `payload` - (String) The arbitrary secret's data payload. * Constraints: The maximum length is `100000` characters. The minimum length is `0` characters. The value must match regular expression `/(.*?)/`. -* `secret_group_id` - (String) A v4 UUID identifier, or `default` secret group. +* `secret_group_id` - (String) A UUID identifier, or `default` secret group. * Constraints: The maximum length is `36` characters. The minimum length is `7` characters. The value must match regular expression `/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/`. * `secret_type` - (String) The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials. diff --git a/website/docs/d/sm_arbitrary_secret_metadata.html.markdown b/website/docs/d/sm_arbitrary_secret_metadata.html.markdown index 0d33cfd1c1..949e1164e0 100644 --- a/website/docs/d/sm_arbitrary_secret_metadata.html.markdown +++ b/website/docs/d/sm_arbitrary_secret_metadata.html.markdown @@ -62,7 +62,7 @@ In addition to all argument references listed, you can access the following attr * `name` - (String) The human-readable name of your secret. * Constraints: The maximum length is `256` characters. The minimum length is `2` characters. -* `secret_group_id` - (String) A v4 UUID identifier, or `default` secret group. +* `secret_group_id` - (String) A UUID identifier, or `default` secret group. * Constraints: The maximum length is `36` characters. The minimum length is `7` characters. The value must match regular expression `/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/`. * `secret_type` - (String) The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials. diff --git a/website/docs/d/sm_iam_credentials_secret.html.markdown b/website/docs/d/sm_iam_credentials_secret.html.markdown index c6618bfcda..9dad6b0ce4 100644 --- a/website/docs/d/sm_iam_credentials_secret.html.markdown +++ b/website/docs/d/sm_iam_credentials_secret.html.markdown @@ -98,7 +98,7 @@ Nested scheme for **rotation**: * `unit` - (String) The units for the secret rotation time interval. * Constraints: Allowable values are: `day`, `month`. -* `secret_group_id` - (String) A v4 UUID identifier, or `default` secret group. +* `secret_group_id` - (String) A UUID identifier, or `default` secret group. * Constraints: The maximum length is `36` characters. The minimum length is `7` characters. The value must match regular expression `/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/`. * `secret_type` - (String) The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials. diff --git a/website/docs/d/sm_iam_credentials_secret_metadata.html.markdown b/website/docs/d/sm_iam_credentials_secret_metadata.html.markdown index 9ccda1a8f8..81d9ee8271 100644 --- a/website/docs/d/sm_iam_credentials_secret_metadata.html.markdown +++ b/website/docs/d/sm_iam_credentials_secret_metadata.html.markdown @@ -79,7 +79,7 @@ Nested scheme for **rotation**: * `unit` - (String) The units for the secret rotation time interval. * Constraints: Allowable values are: `day`, `month`. -* `secret_group_id` - (String) A v4 UUID identifier, or `default` secret group. +* `secret_group_id` - (String) A UUID identifier, or `default` secret group. * Constraints: The maximum length is `36` characters. The minimum length is `7` characters. The value must match regular expression `/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/`. * `secret_type` - (String) The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials. diff --git a/website/docs/d/sm_imported_certificate.html.markdown b/website/docs/d/sm_imported_certificate.html.markdown index 09ce6e0768..a832d240ae 100644 --- a/website/docs/d/sm_imported_certificate.html.markdown +++ b/website/docs/d/sm_imported_certificate.html.markdown @@ -102,7 +102,7 @@ In addition to all argument references listed, you can access the following attr * `private_key_included` - (Boolean) Indicates whether the certificate was imported with an associated private key. -* `secret_group_id` - (String) A v4 UUID identifier, or `default` secret group. +* `secret_group_id` - (String) A UUID identifier, or `default` secret group. * Constraints: The maximum length is `36` characters. The minimum length is `7` characters. The value must match regular expression `/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/`. * `secret_type` - (String) The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials. diff --git a/website/docs/d/sm_imported_certificate_metadata.html.markdown b/website/docs/d/sm_imported_certificate_metadata.html.markdown index 5f2bb4e510..400c89273a 100644 --- a/website/docs/d/sm_imported_certificate_metadata.html.markdown +++ b/website/docs/d/sm_imported_certificate_metadata.html.markdown @@ -76,7 +76,7 @@ In addition to all argument references listed, you can access the following attr * `private_key_included` - (Boolean) Indicates whether the certificate was imported with an associated private key. -* `secret_group_id` - (String) A v4 UUID identifier, or `default` secret group. +* `secret_group_id` - (String) A UUID identifier, or `default` secret group. * Constraints: The maximum length is `36` characters. The minimum length is `7` characters. The value must match regular expression `/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/`. * `secret_type` - (String) The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials. diff --git a/website/docs/d/sm_kv_secret.html.markdown b/website/docs/d/sm_kv_secret.html.markdown index bc5ff3474d..627d6d1427 100644 --- a/website/docs/d/sm_kv_secret.html.markdown +++ b/website/docs/d/sm_kv_secret.html.markdown @@ -80,7 +80,7 @@ In addition to all argument references listed, you can access the following attr * `name` - (String) The human-readable name of your secret. * Constraints: The maximum length is `256` characters. The minimum length is `2` characters. -* `secret_group_id` - (String) A v4 UUID identifier, or `default` secret group. +* `secret_group_id` - (String) A UUID identifier, or `default` secret group. * Constraints: The maximum length is `36` characters. The minimum length is `7` characters. The value must match regular expression `/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/`. * `secret_type` - (String) The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials. diff --git a/website/docs/d/sm_kv_secret_metadata.html.markdown b/website/docs/d/sm_kv_secret_metadata.html.markdown index b333ecfc8a..0dbfd055f5 100644 --- a/website/docs/d/sm_kv_secret_metadata.html.markdown +++ b/website/docs/d/sm_kv_secret_metadata.html.markdown @@ -60,7 +60,7 @@ In addition to all argument references listed, you can access the following attr * `name` - (String) The human-readable name of your secret. * Constraints: The maximum length is `256` characters. The minimum length is `2` characters. -* `secret_group_id` - (String) A v4 UUID identifier, or `default` secret group. +* `secret_group_id` - (String) A UUID identifier, or `default` secret group. * Constraints: The maximum length is `36` characters. The minimum length is `7` characters. The value must match regular expression `/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/`. * `secret_type` - (String) The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials. diff --git a/website/docs/d/sm_private_certificate.html.markdown b/website/docs/d/sm_private_certificate.html.markdown index abecd98dc0..83658bc7a5 100644 --- a/website/docs/d/sm_private_certificate.html.markdown +++ b/website/docs/d/sm_private_certificate.html.markdown @@ -122,7 +122,7 @@ In addition to all argument references listed, you can access the following attr * `unit` - (String) The units for the secret rotation time interval. * Constraints: Allowable values are: `day`, `month`. -* `secret_group_id` - (String) A v4 UUID identifier, or `default` secret group. +* `secret_group_id` - (String) A UUID identifier, or `default` secret group. * Constraints: The maximum length is `36` characters. The minimum length is `7` characters. The value must match regular expression `/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/`. * `secret_type` - (String) The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials. diff --git a/website/docs/d/sm_private_certificate_metadata.html.markdown b/website/docs/d/sm_private_certificate_metadata.html.markdown index 4d16d2b1a8..8f8c39de2c 100644 --- a/website/docs/d/sm_private_certificate_metadata.html.markdown +++ b/website/docs/d/sm_private_certificate_metadata.html.markdown @@ -93,7 +93,7 @@ Nested scheme for **rotation**: * `unit` - (String) The units for the secret rotation time interval. * Constraints: Allowable values are: `day`, `month`. -* `secret_group_id` - (String) A v4 UUID identifier, or `default` secret group. +* `secret_group_id` - (String) A UUID identifier, or `default` secret group. * Constraints: The maximum length is `36` characters. The minimum length is `7` characters. The value must match regular expression `/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/`. * `secret_type` - (String) The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials. diff --git a/website/docs/d/sm_public_certificate.html.markdown b/website/docs/d/sm_public_certificate.html.markdown index c997a1775c..b7533e1fa4 100644 --- a/website/docs/d/sm_public_certificate.html.markdown +++ b/website/docs/d/sm_public_certificate.html.markdown @@ -130,7 +130,7 @@ Nested scheme for **rotation**: * `auto_rotate` - (Boolean) Determines whether Secrets Manager rotates your secret automatically.Default is `false`. * `rotate_keys` - (Boolean) Determines whether Secrets Manager rotates the private key for your public certificate automatically.Default is `false`. If it is set to `true`, the service generates and stores a new private key for your rotated certificate. -* `secret_group_id` - (String) A v4 UUID identifier, or `default` secret group. +* `secret_group_id` - (String) A UUID identifier, or `default` secret group. * Constraints: The maximum length is `36` characters. The minimum length is `7` characters. The value must match regular expression `/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/`. * `secret_type` - (String) The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials. diff --git a/website/docs/d/sm_public_certificate_metadata.html.markdown b/website/docs/d/sm_public_certificate_metadata.html.markdown index 5e1227a4ca..527851e5b2 100644 --- a/website/docs/d/sm_public_certificate_metadata.html.markdown +++ b/website/docs/d/sm_public_certificate_metadata.html.markdown @@ -109,7 +109,7 @@ Nested scheme for **rotation**: * `unit` - (String) The units for the secret rotation time interval. * Constraints: Allowable values are: `day`, `month`. -* `secret_group_id` - (String) A v4 UUID identifier, or `default` secret group. +* `secret_group_id` - (String) A UUID identifier, or `default` secret group. * Constraints: The maximum length is `36` characters. The minimum length is `7` characters. The value must match regular expression `/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/`. * `secret_type` - (String) The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials. diff --git a/website/docs/d/sm_secret_groups.html.markdown b/website/docs/d/sm_secret_groups.html.markdown index 0ab81945d6..160fa2e0eb 100644 --- a/website/docs/d/sm_secret_groups.html.markdown +++ b/website/docs/d/sm_secret_groups.html.markdown @@ -39,7 +39,7 @@ Nested scheme for **secret_groups**: * `created_at` - (String) The date when a resource was created. The date format follows RFC 3339. * `description` - (String) An extended description of your secret group.To protect your privacy, do not use personal data, such as your name or location, as a description for your secret group. * Constraints: The maximum length is `1024` characters. The minimum length is `0` characters. The value must match regular expression `/(.*?)/`. - * `id` - (String) A v4 UUID identifier, or `default` secret group. + * `id` - (String) A UUID identifier, or `default` secret group. * Constraints: The maximum length is `36` characters. The minimum length is `7` characters. The value must match regular expression `/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/`. * `name` - (String) The name of your existing secret group. * Constraints: The maximum length is `64` characters. The minimum length is `2` characters. The value must match regular expression `/(.*?)/`. diff --git a/website/docs/d/sm_secrets.html.markdown b/website/docs/d/sm_secrets.html.markdown index ed32aae298..4152a14110 100644 --- a/website/docs/d/sm_secrets.html.markdown +++ b/website/docs/d/sm_secrets.html.markdown @@ -65,7 +65,7 @@ Nested scheme for **secrets**: * `dns` - (String) The name that is assigned to the DNS provider configuration. * `downloaded` - (Boolean) Indicates whether the secret data that is associated with a secret version was retrieved in a call to the service API. * `expiration_date` - (String) The date a secret is expired. The date format follows RFC 3339. - * `id` - (String) A v4 UUID identifier. + * `id` - (String) A UUID identifier. * Constraints: The maximum length is `36` characters. The minimum length is `36` characters. The value must match regular expression `/[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}/`. * `intermediate_included` - (Boolean) Indicates whether the certificate was imported with an associated intermediate certificate. * `issuance_info` - (List) Issuance information that is associated with your certificate. @@ -110,7 +110,7 @@ Nested scheme for **secrets**: * `rotate_keys` - (Boolean) Determines whether Secrets Manager rotates the private key for your public certificate automatically.Default is `false`. If it is set to `true`, the service generates and stores a new private key for your rotated certificate. * `unit` - (String) The units for the secret rotation time interval. * Constraints: Allowable values are: `day`, `month`. - * `secret_group_id` - (String) A v4 UUID identifier, or `default` secret group. + * `secret_group_id` - (String) A UUID identifier, or `default` secret group. * Constraints: The maximum length is `36` characters. The minimum length is `7` characters. The value must match regular expression `/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/`. * `secret_type` - (String) The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials. * Constraints: Allowable values are: `arbitrary`, `imported_cert`, `public_cert`, `iam_credentials`, `kv`, `username_password`, `private_cert`. diff --git a/website/docs/d/sm_service_credentials_secret.html.markdown b/website/docs/d/sm_service_credentials_secret.html.markdown index b69a19b09e..3de035def4 100644 --- a/website/docs/d/sm_service_credentials_secret.html.markdown +++ b/website/docs/d/sm_service_credentials_secret.html.markdown @@ -115,7 +115,7 @@ In addition to all argument references listed, you can access the following attr * `unit` - (String) The units for the secret rotation time interval. * Constraints: Allowable values are: `day`, `month`. -* `secret_group_id` - (String) A v4 UUID identifier, or `default` secret group. +* `secret_group_id` - (String) A UUID identifier, or `default` secret group. * Constraints: The maximum length is `36` characters. The minimum length is `7` characters. The value must match regular expression `/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/`. * `secret_type` - (String) The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials. diff --git a/website/docs/d/sm_service_credentials_secret_metadata.html.markdown b/website/docs/d/sm_service_credentials_secret_metadata.html.markdown index 004e867c44..ff776d804c 100644 --- a/website/docs/d/sm_service_credentials_secret_metadata.html.markdown +++ b/website/docs/d/sm_service_credentials_secret_metadata.html.markdown @@ -72,7 +72,7 @@ In addition to all argument references listed, you can access the following attr * `unit` - (String) The units for the secret rotation time interval. * Constraints: Allowable values are: `day`, `month`. -* `secret_group_id` - (String) A v4 UUID identifier, or `default` secret group. +* `secret_group_id` - (String) A UUID identifier, or `default` secret group. * Constraints: The maximum length is `36` characters. The minimum length is `7` characters. The value must match regular expression `/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/`. * `secret_type` - (String) The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials. diff --git a/website/docs/d/sm_username_password_secret.html.markdown b/website/docs/d/sm_username_password_secret.html.markdown index a376c69cb5..9e27beb632 100644 --- a/website/docs/d/sm_username_password_secret.html.markdown +++ b/website/docs/d/sm_username_password_secret.html.markdown @@ -98,7 +98,7 @@ Nested scheme for **rotation**: * `unit` - (String) The units for the secret rotation time interval. * Constraints: Allowable values are: `day`, `month`. -* `secret_group_id` - (String) A v4 UUID identifier, or `default` secret group. +* `secret_group_id` - (String) A UUID identifier, or `default` secret group. * Constraints: The maximum length is `36` characters. The minimum length is `7` characters. The value must match regular expression `/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/`. * `secret_type` - (String) The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials. diff --git a/website/docs/d/sm_username_password_secret_metadata.html.markdown b/website/docs/d/sm_username_password_secret_metadata.html.markdown index 9e26afd431..6b2a46c3e4 100644 --- a/website/docs/d/sm_username_password_secret_metadata.html.markdown +++ b/website/docs/d/sm_username_password_secret_metadata.html.markdown @@ -79,7 +79,7 @@ Nested scheme for **rotation**: * `unit` - (String) The units for the secret rotation time interval. * Constraints: Allowable values are: `day`, `month`. -* `secret_group_id` - (String) A v4 UUID identifier, or `default` secret group. +* `secret_group_id` - (String) A UUID identifier, or `default` secret group. * Constraints: The maximum length is `36` characters. The minimum length is `7` characters. The value must match regular expression `/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/`. * `secret_type` - (String) The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials. diff --git a/website/docs/r/sm_arbitrary_secret.html.markdown b/website/docs/r/sm_arbitrary_secret.html.markdown index ec60f7d09e..ffac3e55b7 100644 --- a/website/docs/r/sm_arbitrary_secret.html.markdown +++ b/website/docs/r/sm_arbitrary_secret.html.markdown @@ -44,7 +44,7 @@ Review the argument reference that you can specify for your resource. * `region` - (Optional, Forces new resource, String) The region of the Secrets Manager instance. If not provided defaults to the region defined in the IBM provider configuration. * `payload` - (Required, String) The arbitrary secret's data payload. You can manually rotate the secret by modifying this argument. Modifying the payload creates a new version of the secret. * Constraints: The maximum length is `100000` characters. The minimum length is `0` characters. The value must match regular expression `/(.*?)/`. -* `secret_group_id` - (Optional, Forces new resource, String) A v4 UUID identifier, or `default` secret group. +* `secret_group_id` - (Optional, Forces new resource, String) A UUID identifier, or `default` secret group. * Constraints: The maximum length is `36` characters. The minimum length is `7` characters. The value must match regular expression `/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/`. ## Attribute Reference diff --git a/website/docs/r/sm_iam_credentials_secret.html.markdown b/website/docs/r/sm_iam_credentials_secret.html.markdown index 3fe24e5062..24a030cb34 100644 --- a/website/docs/r/sm_iam_credentials_secret.html.markdown +++ b/website/docs/r/sm_iam_credentials_secret.html.markdown @@ -58,7 +58,7 @@ Nested scheme for **rotation**: * Constraints: The minimum value is `1`. * `unit` - (Optional, String) The units for the secret rotation time interval. * Constraints: Allowable values are: `day`, `month`. -* `secret_group_id` - (Optional, Forces new resource, String) A v4 UUID identifier, or `default` secret group. +* `secret_group_id` - (Optional, Forces new resource, String) A UUID identifier, or `default` secret group. * Constraints: The maximum length is `36` characters. The minimum length is `7` characters. The value must match regular expression `/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/`. * `service_id` - (Optional, Forces new resource, String) The service ID under which the API key (see the `api_key` field) is created.If you omit this parameter, Secrets Manager generates a new service ID for your secret at its creation and adds it to the access groups that you assign.Optionally, you can use this field to provide your own service ID if you prefer to manage its access directly or retain the service ID after your secret expires, is rotated, or deleted. If you provide a service ID, do not include the `access_groups` parameter. * Constraints: The maximum length is `50` characters. The minimum length is `40` characters. The value must match regular expression `/^[A-Za-z0-9][A-Za-z0-9]*(?:-?[A-Za-z0-9]+)*$/`. diff --git a/website/docs/r/sm_imported_certificate.html.markdown b/website/docs/r/sm_imported_certificate.html.markdown index 3ba5e12ae6..4322f1d63d 100644 --- a/website/docs/r/sm_imported_certificate.html.markdown +++ b/website/docs/r/sm_imported_certificate.html.markdown @@ -47,7 +47,7 @@ Review the argument reference that you can specify for your resource. * Constraints: The maximum length is `256` characters. The minimum length is `2` characters. The value must match regular expression `^[A-Za-z0-9_][A-Za-z0-9_]*(?:_*-*\.*[A-Za-z0-9]*)*[A-Za-z0-9]+$`. * `private_key` - (Computed, String) (Optional) The PEM-encoded private key to associate with the certificate. * Constraints: The maximum length is `100000` characters. The minimum length is `50` characters. The value must match regular expression `/^(-{5}BEGIN.+?-{5}[\\s\\S]+-{5}END.+?-{5})$/`. -* `secret_group_id` - (Optional, Forces new resource, String) A v4 UUID identifier, or `default` secret group. +* `secret_group_id` - (Optional, Forces new resource, String) A UUID identifier, or `default` secret group. * Constraints: The maximum length is `36` characters. The minimum length is `7` characters. The value must match regular expression `/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/`. ## Attribute Reference diff --git a/website/docs/r/sm_kv_secret.html.markdown b/website/docs/r/sm_kv_secret.html.markdown index 6620fcc2d7..8f6c7fbc88 100644 --- a/website/docs/r/sm_kv_secret.html.markdown +++ b/website/docs/r/sm_kv_secret.html.markdown @@ -42,7 +42,7 @@ Review the argument reference that you can specify for your resource. * Constraints: The list items must match regular expression `/(.*?)/`. The maximum length is `30` items. The minimum length is `0` items. * `name` - (Required, String) The human-readable name of your secret. * Constraints: The maximum length is `256` characters. The minimum length is `2` characters. The value must match regular expression `^[A-Za-z0-9_][A-Za-z0-9_]*(?:_*-*\.*[A-Za-z0-9]*)*[A-Za-z0-9]+$`. -* `secret_group_id` - (Optional, Forces new resource, String) A v4 UUID identifier, or `default` secret group. +* `secret_group_id` - (Optional, Forces new resource, String) A UUID identifier, or `default` secret group. * Constraints: The maximum length is `36` characters. The minimum length is `7` characters. The value must match regular expression `/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/`. ## Attribute Reference diff --git a/website/docs/r/sm_private_certificate.html.markdown b/website/docs/r/sm_private_certificate.html.markdown index b6746b39d0..65937ce9f5 100644 --- a/website/docs/r/sm_private_certificate.html.markdown +++ b/website/docs/r/sm_private_certificate.html.markdown @@ -58,7 +58,7 @@ Nested scheme for **rotation**: * Constraints: The minimum value is `1`. * `unit` - (Optional, String) The units for the secret rotation time interval. * Constraints: Allowable values are: `day`, `month`. -* `secret_group_id` - (Optional, Forces new resource, String) A v4 UUID identifier, or `default` secret group. +* `secret_group_id` - (Optional, Forces new resource, String) A UUID identifier, or `default` secret group. * Constraints: The maximum length is `36` characters. The minimum length is `7` characters. The value must match regular expression `/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/`. * `ttl` - (Optional, Forces new resource, String) The time-to-live (TTL) to assign to the private certificate. The value can be supplied as a string duration with time unit suffix - `d` for days, `h` for hours, `m` for minutes, or `s` for seconds. For example, `2d` or `48h` or `172800s`. diff --git a/website/docs/r/sm_public_certificate.html.markdown b/website/docs/r/sm_public_certificate.html.markdown index 1d6251acbc..54c3597d5b 100644 --- a/website/docs/r/sm_public_certificate.html.markdown +++ b/website/docs/r/sm_public_certificate.html.markdown @@ -55,7 +55,7 @@ Review the argument reference that you can specify for your resource. Nested scheme for **rotation**: * `auto_rotate` - (Optional, Boolean) Determines whether Secrets Manager rotates your secret automatically.Default is `false`. * `rotate_keys` - (Optional, Boolean) Determines whether Secrets Manager rotates the private key for your public certificate automatically.Default is `false`. If it is set to `true`, the service generates and stores a new private key for your rotated certificate. -* `secret_group_id` - (Optional, Forces new resource, String) A v4 UUID identifier, or `default` secret group. +* `secret_group_id` - (Optional, Forces new resource, String) A UUID identifier, or `default` secret group. * Constraints: The maximum length is `36` characters. The minimum length is `7` characters. The value must match regular expression `/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/`. * `alt_names` - (Optional, Forces new resource, List) With the Subject Alternative Name field, you can specify additional host names to be protected by a single SSL certificate. * Constraints: The list items must match regular expression `/^(.*?)$/`. The maximum length is `99` items. The minimum length is `0` items. diff --git a/website/docs/r/sm_service_credentials_secret.html.markdown b/website/docs/r/sm_service_credentials_secret.html.markdown index 625b1f9f7d..13d9e4a872 100644 --- a/website/docs/r/sm_service_credentials_secret.html.markdown +++ b/website/docs/r/sm_service_credentials_secret.html.markdown @@ -117,7 +117,7 @@ Nested scheme for **rotation**: * Constraints: The minimum value is `1`. * `unit` - (Optional, String) The units for the secret rotation time interval. * Constraints: Allowable values are: `day`, `month`. -* `secret_group_id` - (Optional, Forces new resource, String) A v4 UUID identifier, or `default` secret group. +* `secret_group_id` - (Optional, Forces new resource, String) A UUID identifier, or `default` secret group. * Constraints: The maximum length is `36` characters. The minimum length is `7` characters. The value must match regular expression `/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/`. * `source_service` - (Required, List) The properties required for creating the service credentials for the specified source service instance. Nested scheme for **source_service**: diff --git a/website/docs/r/sm_username_password_secret.html.markdown b/website/docs/r/sm_username_password_secret.html.markdown index cc57b228ec..c297e4467b 100644 --- a/website/docs/r/sm_username_password_secret.html.markdown +++ b/website/docs/r/sm_username_password_secret.html.markdown @@ -70,7 +70,7 @@ Nested scheme for **rotation**: * Constraints: The minimum value is `1`. * `unit` - (Optional, String) The units for the secret rotation time interval. * Constraints: Allowable values are: `day`, `month`. -* `secret_group_id` - (Optional, Forces new resource, String) A v4 UUID identifier, or `default` secret group. +* `secret_group_id` - (Optional, Forces new resource, String) A UUID identifier, or `default` secret group. * Constraints: The maximum length is `36` characters. The minimum length is `7` characters. The value must match regular expression `/^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|default)$/`. * `username` - (Required, Forces new resource, String) The username that is assigned to the secret. * Constraints: The maximum length is `64` characters. The minimum length is `2` characters. The value must match regular expression `/[A-Za-z0-9+-=.]*/`.