Skip to content

Commit

Permalink
Chore: better docs for secret reference usage in credentials on self-…
Browse files Browse the repository at this point in the history
…hosted organizations (#592)
  • Loading branch information
yaronya authored Feb 15, 2023
1 parent 7910a0a commit 29d034d
Show file tree
Hide file tree
Showing 3 changed files with 3 additions and 3 deletions.
2 changes: 1 addition & 1 deletion env0/resource_aws_credentials.go
Original file line number Diff line number Diff line change
Expand Up @@ -50,7 +50,7 @@ func resourceAwsCredentials() *schema.Resource {
},
"secret_access_key": {
Type: schema.TypeString,
Description: "the aws access key secret",
Description: "the aws access key secret. In case your organization is self-hosted, please use a secret reference in the shape of ${ssm:<secret-id>}",
Optional: true,
Sensitive: true,
ForceNew: true,
Expand Down
2 changes: 1 addition & 1 deletion env0/resource_azure_credentials.go
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,7 @@ func resourceAzureCredentials() *schema.Resource {
},
"client_secret": {
Type: schema.TypeString,
Description: "the azure client secret",
Description: "the azure client secret. In case your organization is self-hosted, please use a secret reference in the shape of ${azure:<secret-name>@<vault-name>}",
Required: true,
Sensitive: true,
ForceNew: true,
Expand Down
2 changes: 1 addition & 1 deletion env0/resource_gcp_credentials.go
Original file line number Diff line number Diff line change
Expand Up @@ -32,7 +32,7 @@ func resourceGcpCredentials() *schema.Resource {
},
"service_account_key": {
Type: schema.TypeString,
Description: "the gcp service account key",
Description: "the gcp service account key. In case your organization is self-hosted, please use a secret reference in the shape of ${gcp:<secret-id>}",
Required: true,
Sensitive: true,
ForceNew: true,
Expand Down

0 comments on commit 29d034d

Please sign in to comment.