Skip to content

Commit 8258ff5

Browse files
committed
order external provider at the end (its an escape hatch, afterall)
1 parent eed815f commit 8258ff5

File tree

4 files changed

+4
-2
lines changed

4 files changed

+4
-2
lines changed

content/docs/esc/integrations/dynamic-secrets/_index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,8 +21,8 @@ To learn how to set up and use each provider, follow the links below. To learn h
2121
| [aws-parameter-store](/docs/pulumi-cloud/esc/providers/aws-parameter-store/) | The `aws-parameter-store` provider enables you to dynamically import parameters from AWS Parameter Store into your Environment. |
2222
| [aws-secrets](/docs/esc/integrations/dynamic-secrets/aws-secrets/) | The `aws-secrets` provider enables you to dynamically import Secrets from AWS Secrets Manager into your Environment. |
2323
| [azure-secrets](/docs/esc/integrations/dynamic-secrets/azure-secrets/) | The `azure-secrets` provider enables you to dynamically import Secrets from Azure Key Vault into your Environment. |
24-
| [external](/docs/esc/integrations/dynamic-secrets/external/) | The `external` provider enables you to dynamically import Secrets from a custom service adapter. |
2524
| [doppler-secrets](/docs/esc/integrations/dynamic-secrets/doppler-secrets/) | The `doppler-secrets` provider enables you to dynamically import Secrets from Doppler into your Environment. |
2625
| [gcp-secrets](/docs/esc/integrations/dynamic-secrets/gcp-secrets/) | The `gcp-secrets` provider enables you to dynamically import Secrets from Google Cloud Secrets Manager into your Environment. |
2726
| [infisical-secrets](/docs/esc/integrations/dynamic-secrets/infisical-secrets/) | The `infisical-secrets` provider enables you to dynamically import Secrets from Infisical Secrets into your Environment. |
2827
| [vault-secrets](/docs/esc/integrations/dynamic-secrets/vault-secrets/) | The `vault-secrets` provider enables you to dynamically import Secrets from HashiCorp Vault into your Environment. |
28+
| [external](/docs/esc/integrations/dynamic-secrets/external/) | The `external` provider enables you to dynamically import Secrets from a custom service adapter. |

content/docs/esc/integrations/dynamic-secrets/external.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@ menu:
77
esc:
88
identifier: external-provider
99
parent: esc-dynamic-secrets
10+
weight: 99
1011
aliases:
1112
- /docs/pulumi-cloud/esc/providers/external/
1213
- /docs/esc/providers/external/

content/docs/esc/integrations/rotated-secrets/_index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,9 +18,9 @@ To learn how to set up and use each rotator, follow the links below. All rotator
1818
| Rotator | Required connector | Description |
1919
|--------------------------------------------------------------------------|----------------------------------------|-------------------------------------------------------------------------------------------------------------------------|
2020
| [aws-iam](/docs/esc/integrations/rotated-secrets/aws-iam/) | None | The `aws-iam` rotator enables you to rotate access credentials for an AWS IAM User. |
21-
| [external](/docs/esc/integrations/rotated-secrets/external/) | None | The `external` rotator enables you to rotate credentials with a custom service adapter. |
2221
| [mysql](/docs/esc/integrations/rotated-secrets/mysql/) | `aws-lambda`(in private networks only) | The `mysql` rotator enables you to rotate user credentials for a MySQL database in your Environment. |
2322
| [password](/docs/esc/integrations/rotated-secrets/password/) | None | The `password` rotator enables you to rotate any user defined key by providing password generation rules. |
2423
| [passphrase](/docs/esc/integrations/rotated-secrets/passphrase/) | None | The `passphrase` rotator enables you to rotate any user defined key by providing memorable passphrase generation rules. |
2524
| [postgres](/docs/esc/integrations/rotated-secrets/postgres/) | `aws-lambda`(in private networks only) | The `postgres` rotator enables you to rotate user credentials for a PostgreSQL database in your Environment. |
2625
| [snowflake-user](/docs/esc/integrations/rotated-secrets/snowflake-user/) | None | The `snowflake-user` rotator enables you to rotate RSA keypairs for a Snowflake database user in your Environment. |
26+
| [external](/docs/esc/integrations/rotated-secrets/external/) | None | The `external` rotator enables you to rotate credentials with a custom service adapter. |

content/docs/esc/integrations/rotated-secrets/external.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@ menu:
77
esc:
88
identifier: external-rotator
99
parent: esc-rotated-secrets
10+
weight: 99
1011
---
1112

1213
The `external` rotator enables you to rotate secrets with custom logic using Pulumi ESC by making authenticated HTTPS requests to user-controlled adapter services.

0 commit comments

Comments
 (0)