From dddb10f8f9e53c59edfb71b05382bfa0d07b6ffb Mon Sep 17 00:00:00 2001 From: sridhar <47156711+srikrishmurthy@users.noreply.github.com> Date: Mon, 24 Jan 2022 13:19:55 -0800 Subject: [PATCH] Update resource_consul_cluster_root_token.go (#241) * Update resource_consul_cluster_root_token.go Changed the description a) Existing text about invalidation is incorrect b) Clarified that this token is similar to the one provided in the HCP Consul UI * add space * regen docs Co-authored-by: Brenna Hewer-Darroch <21015366+bcmdarroch@users.noreply.github.com> --- docs/resources/consul_cluster_root_token.md | 4 ++-- internal/provider/resource_consul_cluster_root_token.go | 4 ++-- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/docs/resources/consul_cluster_root_token.md b/docs/resources/consul_cluster_root_token.md index d201ccfd3..c79c9e436 100644 --- a/docs/resources/consul_cluster_root_token.md +++ b/docs/resources/consul_cluster_root_token.md @@ -2,14 +2,14 @@ page_title: "hcp_consul_cluster_root_token Resource - terraform-provider-hcp" subcategory: "" description: |- - The cluster root token resource is the token used to bootstrap the cluster's ACL system. Using this resource to create a new root token for a cluster will invalidate the consul root token accessor id and Consul root token secret id properties of the cluster. + The cluster root token resource is the token used to bootstrap the cluster's ACL system. You can also generate this root token from the HCP Consul UI. --- # hcp_consul_cluster_root_token (Resource) ~> **Security Notice:** Please see this [list of recommendations](https://www.terraform.io/docs/language/state/sensitive-data.html) for storing sensitive information in Terraform. -The cluster root token resource is the token used to bootstrap the cluster's ACL system. Using this resource to create a new root token for a cluster will invalidate the consul root token accessor id and Consul root token secret id properties of the cluster. +The cluster root token resource is the token used to bootstrap the cluster's ACL system. You can also generate this root token from the HCP Consul UI. ## Example Usage diff --git a/internal/provider/resource_consul_cluster_root_token.go b/internal/provider/resource_consul_cluster_root_token.go index 76abcc946..664169b45 100644 --- a/internal/provider/resource_consul_cluster_root_token.go +++ b/internal/provider/resource_consul_cluster_root_token.go @@ -33,8 +33,8 @@ data: // resourceConsulClusterRootToken represents an HCP Consul cluster. func resourceConsulClusterRootToken() *schema.Resource { return &schema.Resource{ - Description: "The cluster root token resource is the token used to bootstrap the cluster's ACL system." + - " Using this resource to create a new root token for a cluster will invalidate the consul root token accessor id and Consul root token secret id properties of the cluster.", + Description: "The cluster root token resource is the token used to bootstrap the cluster's ACL system. " + + "You can also generate this root token from the HCP Consul UI.", CreateContext: resourceConsulClusterRootTokenCreate, ReadContext: resourceConsulClusterRootTokenRead, DeleteContext: resourceConsulClusterRootTokenDelete,