diff --git a/docs/resources/aws_transit_gateway_attachment.md b/docs/resources/aws_transit_gateway_attachment.md index 5847aeb42..59bb3c609 100644 --- a/docs/resources/aws_transit_gateway_attachment.md +++ b/docs/resources/aws_transit_gateway_attachment.md @@ -7,6 +7,8 @@ description: |- # hcp_aws_transit_gateway_attachment (Resource) +~> **Security Notice:** This resource contains sensitive input. Please see this [list of recommendations](https://www.terraform.io/docs/language/state/sensitive-data.html) for storing sensitive information in Terraform. + The AWS transit gateway attachment resource allows you to manage a transit gateway attachment. The transit gateway attachment attaches an HVN to a user-owned transit gateway in AWS. Note that the HVN and transit gateway must be located in the same AWS region. ## Example Usage @@ -72,8 +74,6 @@ resource "aws_ec2_transit_gateway_vpc_attachment_accepter" "example" { } ``` -~> **Security Notice:** This resource contains sensitive input. Please see this [list of recommendations](https://www.terraform.io/docs/language/state/sensitive-data.html) for storing sensitive information in Terraform. - ## Schema diff --git a/docs/resources/vault_cluster_admin_token.md b/docs/resources/vault_cluster_admin_token.md index e75844062..39980b215 100644 --- a/docs/resources/vault_cluster_admin_token.md +++ b/docs/resources/vault_cluster_admin_token.md @@ -9,15 +9,15 @@ description: |- ~> **Security Notice:** Please see this [list of recommendations](https://www.terraform.io/docs/language/state/sensitive-data.html) for storing sensitive information in Terraform. +~> **Known Issue:** An admin token may be generated during a `terraform plan` if the current token is expiring. +Since the Plan phase does not save any state, the Apply phase saves a different generated token, and the token generated during Plan ends up orphaned. +It will expire in six hours. + The Vault cluster admin token resource generates an admin-level token for the HCP Vault cluster. This resource saves a single admin token per Vault cluster and auto-refreshes the token when it is about to expire. Destroying this resource *does not* invalidate the admin token. -~> **Known Issue:** An admin token may be generated during a `terraform plan` if the current token is expiring. -Since the Plan phase does not save any state, the Apply phase saves a different generated token, and the token generated during Plan ends up orphaned. -It will expire in six hours. - ## Example Usage ```terraform diff --git a/templates/resources/aws_transit_gateway_attachment.md.tmpl b/templates/resources/aws_transit_gateway_attachment.md.tmpl index baabc96d9..33674f407 100644 --- a/templates/resources/aws_transit_gateway_attachment.md.tmpl +++ b/templates/resources/aws_transit_gateway_attachment.md.tmpl @@ -7,14 +7,14 @@ description: |- # {{.Type}} ({{.Name}}) +~> **Security Notice:** This resource contains sensitive input. Please see this [list of recommendations](https://www.terraform.io/docs/language/state/sensitive-data.html) for storing sensitive information in Terraform. + {{ .Description | trimspace }} ## Example Usage {{ tffile "examples/resources/hcp_aws_transit_gateway_attachment/resource.tf" }} -~> **Security Notice:** This resource contains sensitive input. Please see this [list of recommendations](https://www.terraform.io/docs/language/state/sensitive-data.html) for storing sensitive information in Terraform. - {{ .SchemaMarkdown | trimspace }} ## Import diff --git a/templates/resources/vault_cluster_admin_token.md.tmpl b/templates/resources/vault_cluster_admin_token.md.tmpl index ba2769022..39151fe6e 100644 --- a/templates/resources/vault_cluster_admin_token.md.tmpl +++ b/templates/resources/vault_cluster_admin_token.md.tmpl @@ -9,15 +9,15 @@ description: |- ~> **Security Notice:** Please see this [list of recommendations](https://www.terraform.io/docs/language/state/sensitive-data.html) for storing sensitive information in Terraform. +~> **Known Issue:** An admin token may be generated during a `terraform plan` if the current token is expiring. +Since the Plan phase does not save any state, the Apply phase saves a different generated token, and the token generated during Plan ends up orphaned. +It will expire in six hours. + {{ .Description | trimspace }} This resource saves a single admin token per Vault cluster and auto-refreshes the token when it is about to expire. Destroying this resource *does not* invalidate the admin token. -~> **Known Issue:** An admin token may be generated during a `terraform plan` if the current token is expiring. -Since the Plan phase does not save any state, the Apply phase saves a different generated token, and the token generated during Plan ends up orphaned. -It will expire in six hours. - ## Example Usage {{ tffile "examples/resources/hcp_vault_cluster_admin_token/resource.tf" }}