-
Notifications
You must be signed in to change notification settings - Fork 160
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #1552 from hashicorp/create-pull-request/patch
release: v0.62.0
- Loading branch information
Showing
40 changed files
with
1,307 additions
and
139 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
78 changes: 78 additions & 0 deletions
78
website/docs/cdktf/csharp/r/audit_trail_token.html.markdown
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,78 @@ | ||
--- | ||
layout: "tfe" | ||
page_title: "Terraform Enterprise: tfe_audit_trail_token" | ||
description: |- | ||
Generates a new audit trail token in organization, replacing any existing token. | ||
--- | ||
|
||
|
||
<!-- Please do not edit this file, it is generated. --> | ||
# tfe_audit_trail_token | ||
|
||
Generates a new audit trail token in organization, replacing any existing token. | ||
|
||
Note that only organizations that have the [audit-logging entitlement](https://developer.hashicorp.com/terraform/cloud-docs/api-docs#audit-logging) may create audit trail tokens. | ||
|
||
## Example Usage | ||
|
||
Basic usage: | ||
|
||
```csharp | ||
using Constructs; | ||
using HashiCorp.Cdktf; | ||
/*Provider bindings are generated by running cdktf get. | ||
See https://cdk.tf/provider-generation for more details.*/ | ||
using Gen.Providers.Tfe; | ||
class MyConvertedCode : TerraformStack | ||
{ | ||
public MyConvertedCode(Construct scope, string name) : base(scope, name) | ||
{ | ||
new AuditTrailToken.AuditTrailToken(this, "test", new AuditTrailTokenConfig { | ||
Organization = "my-org-name" | ||
}); | ||
} | ||
} | ||
``` | ||
|
||
## Argument Reference | ||
|
||
The following arguments are supported: | ||
|
||
* `Organization` - (Optional) Name of the organization. If omitted, organization must be defined in the provider config. | ||
* `ForceRegenerate` - (Optional) If set to `True`, a new token will be | ||
generated even if a token already exists. This will invalidate the existing | ||
token! | ||
* `ExpiredAt` - (Optional) The token's expiration date. The expiration date must be a date/time string in RFC3339 | ||
format (e.g., "2024-12-31T23:59:59Z"). If no expiration date is supplied, the expiration date will default to null and | ||
never expire. | ||
|
||
## Example Usage | ||
|
||
When a token has an expiry: | ||
|
||
```hcl | ||
resource "time_rotating" "example" { | ||
rotation_days = 30 | ||
} | ||
resource "tfe_audit_trail_token" "test" { | ||
organization = data.tfe_organization.org.name | ||
expired_at = time_rotating.example.rotation_rfc3339 | ||
} | ||
``` | ||
|
||
## Attributes Reference | ||
|
||
* `Id` - The ID of the token. | ||
* `Token` - The generated token. | ||
|
||
## Import | ||
|
||
Audit trail tokens can be imported; use `<ORGANIZATION NAME>` as the import ID. | ||
For example: | ||
|
||
```shell | ||
terraform import tfe_audit_trail_token.test my-org-name | ||
``` | ||
|
||
<!-- cache-key: cdktf-0.17.0-pre.15 input-2c87d1201e89a4243d53e9ef85752b50f8797786174b1c7744ecc61fd3ced2cd --> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.