You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/index.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,19 +1,19 @@
1
1
---
2
2
# generated by https://github.com/hashicorp/terraform-plugin-docs
3
-
page_title: "vaultsecret Provider"
3
+
page_title: "vaultprov Provider"
4
4
subcategory: ""
5
5
description: |-
6
6
A provider to generate secrets and have them stored directly into Vault without any copy in the Terraform State. Once the secret has been generated, its value only exist into Vault. Terraform will not track any change in the value, only in the secret attribute (metadata, etc.`).
7
7
---
8
8
9
-
# vaultsecret Provider
9
+
# vaultprov Provider
10
10
11
11
A provider to generate secrets and have them stored directly into Vault without any copy in the Terraform State. Once the secret has been generated, its value only exist into Vault. Terraform will not track any change in the value, only in the secret attribute (`metadata`, etc.`).
A cryptographic randomly generated secret stored as bytes in a Vault secret. The resulting Vault secret will have a custom metadata secret_type with the value random_secret and a custom metadata secret_length with the same value as the length attribute.
7
7
---
8
8
9
-
# vaultsecret_random (Resource)
9
+
# vaultprov_random_secret (Resource)
10
10
11
11
A cryptographic randomly generated secret stored as bytes in a Vault secret. The resulting Vault secret will have a custom metadata `secret_type` with the value `random_secret` and a custom metadata `secret_length` with the same value as the `length` attribute.
MarkdownDescription: "A provider to generate secrets and have them stored directly into Vault without any copy in the Terraform State. Once the secret has been generated, its value only exist into Vault. Terraform will not track any change in the value, only in the secret attribute (`metadata`, etc.`).",
resp.Diagnostics.AddError("Error updating random key", fmt.Sprintf("Invalid path change. Random key can't have their path changed (old: %s, new: %s). Only metadata changes are authorized. Delete and recreate the key instead.", state.Path.ValueString(), plan.Path.ValueString()))
217
230
return
@@ -224,6 +237,9 @@ func (s *RandomSecret) Update(ctx context.Context, req resource.UpdateRequest, r
0 commit comments