Credential Set Args
An object that represents a credential set resource for a container registry. Uses Azure REST API version 2023-01-01-preview. In version 2.x of the Azure Native provider, it used API version 2023-01-01-preview. Other available API versions: 2023-06-01-preview, 2023-07-01, 2023-08-01-preview, 2023-11-01-preview, 2024-11-01-preview. These can be accessed by generating a local SDK package using the CLI command pulumi package add azure-native containerregistry [ApiVersion]
. See the ../../../version-guide/#accessing-any-api-version-via-local-packages for details.
Example Usage
CredentialSetCreate
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using AzureNative = Pulumi.AzureNative;
return await Deployment.RunAsync(() =>
{
var credentialSet = new AzureNative.ContainerRegistry.CredentialSet("credentialSet", new()
{
AuthCredentials = new[]
{
new AzureNative.ContainerRegistry.Inputs.AuthCredentialArgs
{
Name = AzureNative.ContainerRegistry.CredentialName.Credential1,
PasswordSecretIdentifier = "https://myvault.vault.azure.net/secrets/password",
UsernameSecretIdentifier = "https://myvault.vault.azure.net/secrets/username",
},
},
CredentialSetName = "myCredentialSet",
Identity = new AzureNative.ContainerRegistry.Inputs.IdentityPropertiesArgs
{
Type = AzureNative.ContainerRegistry.ResourceIdentityType.SystemAssigned,
},
LoginServer = "docker.io",
RegistryName = "myRegistry",
ResourceGroupName = "myResourceGroup",
});
});
package main
import (
containerregistry "github.com/pulumi/pulumi-azure-native-sdk/containerregistry/v2"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := containerregistry.NewCredentialSet(ctx, "credentialSet", &containerregistry.CredentialSetArgs{
AuthCredentials: containerregistry.AuthCredentialArray{
&containerregistry.AuthCredentialArgs{
Name: pulumi.String(containerregistry.CredentialNameCredential1),
PasswordSecretIdentifier: pulumi.String("https://myvault.vault.azure.net/secrets/password"),
UsernameSecretIdentifier: pulumi.String("https://myvault.vault.azure.net/secrets/username"),
},
},
CredentialSetName: pulumi.String("myCredentialSet"),
Identity: &containerregistry.IdentityPropertiesArgs{
Type: containerregistry.ResourceIdentityTypeSystemAssigned,
},
LoginServer: pulumi.String("docker.io"),
RegistryName: pulumi.String("myRegistry"),
ResourceGroupName: pulumi.String("myResourceGroup"),
})
if err != nil {
return err
}
return nil
})
}
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.azurenative.containerregistry.CredentialSet;
import com.pulumi.azurenative.containerregistry.CredentialSetArgs;
import com.pulumi.azurenative.containerregistry.inputs.AuthCredentialArgs;
import com.pulumi.azurenative.containerregistry.inputs.IdentityPropertiesArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var credentialSet = new CredentialSet("credentialSet", CredentialSetArgs.builder()
.authCredentials(AuthCredentialArgs.builder()
.name("Credential1")
.passwordSecretIdentifier("https://myvault.vault.azure.net/secrets/password")
.usernameSecretIdentifier("https://myvault.vault.azure.net/secrets/username")
.build())
.credentialSetName("myCredentialSet")
.identity(IdentityPropertiesArgs.builder()
.type("SystemAssigned")
.build())
.loginServer("docker.io")
.registryName("myRegistry")
.resourceGroupName("myResourceGroup")
.build());
}
}
Import
An existing resource can be imported using its type token, name, and identifier, e.g.
$ pulumi import azure-native:containerregistry:CredentialSet myCredentialSet /subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ContainerRegistry/registries/{registryName}/credentialSets/{credentialSetName}
Constructors
Properties
List of authentication credentials stored for an upstream. Usually consists of a primary and an optional secondary credential.
The name of the credential set.
Identities associated with the resource. This is used to access the KeyVault secrets.
The credentials are stored for this upstream or login server.
The name of the container registry.
The name of the resource group. The name is case insensitive.