* Add CIDR validator * Implement `syncACL`, add it to creation * Rename function * Rename variables * Add mapACLs * Implement instance update * Add ACLs to acc test * Add ACL to schema * Add new line * Fix not using the ACLs read from config * Add test case where ACLs aren't set * Fix lint * Generate docs * Add uniqueness check for ACLs * Add repeated ACLs test cases * Remove debug leftover * Change test cases * Rename data * Add ACL description * Generate docs * Change ACL attribute type * Remove test case --------- Co-authored-by: Henrique Santos <henrique.santos@freiheit.com>
945 B
945 B
| page_title | subcategory | description |
|---|---|---|
| stackit_secretsmanager_instance Data Source - stackit | Secrets Manager instance data source schema. Must have a region specified in the provider configuration. |
stackit_secretsmanager_instance (Data Source)
Secrets Manager instance data source schema. Must have a region specified in the provider configuration.
Schema
Required
instance_id(String) ID of the Secrets Manager instance.project_id(String) STACKIT project ID to which the instance is associated.
Read-Only
acls(List of String) The access control list for this instance. Each entry is an IP or IP range that is permitted to access, in CIDR notationid(String) Terraform's internal resource ID. It is structured as "project_id,instance_id".name(String) Instance name.