outscale 1.0.1 published on Thursday, Mar 13, 2025 by outscale
outscale.getApiAccessPolicy
Explore with Pulumi AI
Provides information about the API access policy.
For more information on this resource, see the User Guide.
For more information on this resource actions, see the API documentation.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as outscale from "@pulumi/outscale";
const unique = outscale.getApiAccessPolicy({});
import pulumi
import pulumi_outscale as outscale
unique = outscale.get_api_access_policy()
package main
import (
"github.com/pulumi/pulumi-terraform-provider/sdks/go/outscale/outscale"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := outscale.LookupApiAccessPolicy(ctx, &outscale.LookupApiAccessPolicyArgs{}, nil)
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Outscale = Pulumi.Outscale;
return await Deployment.RunAsync(() =>
{
var unique = Outscale.GetApiAccessPolicy.Invoke();
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.outscale.OutscaleFunctions;
import com.pulumi.outscale.inputs.GetApiAccessPolicyArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
final var unique = OutscaleFunctions.getApiAccessPolicy();
}
}
variables:
unique:
fn::invoke:
function: outscale:getApiAccessPolicy
arguments: {}
Using getApiAccessPolicy
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getApiAccessPolicy(args: GetApiAccessPolicyArgs, opts?: InvokeOptions): Promise<GetApiAccessPolicyResult>
function getApiAccessPolicyOutput(args: GetApiAccessPolicyOutputArgs, opts?: InvokeOptions): Output<GetApiAccessPolicyResult>
def get_api_access_policy(id: Optional[str] = None,
opts: Optional[InvokeOptions] = None) -> GetApiAccessPolicyResult
def get_api_access_policy_output(id: Optional[pulumi.Input[str]] = None,
opts: Optional[InvokeOptions] = None) -> Output[GetApiAccessPolicyResult]
func LookupApiAccessPolicy(ctx *Context, args *LookupApiAccessPolicyArgs, opts ...InvokeOption) (*LookupApiAccessPolicyResult, error)
func LookupApiAccessPolicyOutput(ctx *Context, args *LookupApiAccessPolicyOutputArgs, opts ...InvokeOption) LookupApiAccessPolicyResultOutput
> Note: This function is named LookupApiAccessPolicy
in the Go SDK.
public static class GetApiAccessPolicy
{
public static Task<GetApiAccessPolicyResult> InvokeAsync(GetApiAccessPolicyArgs args, InvokeOptions? opts = null)
public static Output<GetApiAccessPolicyResult> Invoke(GetApiAccessPolicyInvokeArgs args, InvokeOptions? opts = null)
}
public static CompletableFuture<GetApiAccessPolicyResult> getApiAccessPolicy(GetApiAccessPolicyArgs args, InvokeOptions options)
public static Output<GetApiAccessPolicyResult> getApiAccessPolicy(GetApiAccessPolicyArgs args, InvokeOptions options)
fn::invoke:
function: outscale:index/getApiAccessPolicy:getApiAccessPolicy
arguments:
# arguments dictionary
The following arguments are supported:
- Id string
- Id string
- id String
- id string
- id str
- id String
getApiAccessPolicy Result
The following output properties are available:
- Id string
- Max
Access doubleKey Expiration Seconds - The maximum possible lifetime for your access keys, in seconds. If
0
, your access keys can have unlimited lifetimes. - Request
Id string - Require
Trusted boolEnv - If true, a trusted session is activated, allowing you to bypass Certificate Authorities (CAs) enforcement. For more information, see About Your API Access Policy. If this is enabled, it is required that you and all your users log in to Cockpit v2 using the WebAuthn method for multi-factor authentication. For more information, see About Authentication > Multi-Factor Authentication.
- Id string
- Max
Access float64Key Expiration Seconds - The maximum possible lifetime for your access keys, in seconds. If
0
, your access keys can have unlimited lifetimes. - Request
Id string - Require
Trusted boolEnv - If true, a trusted session is activated, allowing you to bypass Certificate Authorities (CAs) enforcement. For more information, see About Your API Access Policy. If this is enabled, it is required that you and all your users log in to Cockpit v2 using the WebAuthn method for multi-factor authentication. For more information, see About Authentication > Multi-Factor Authentication.
- id String
- max
Access DoubleKey Expiration Seconds - The maximum possible lifetime for your access keys, in seconds. If
0
, your access keys can have unlimited lifetimes. - request
Id String - require
Trusted BooleanEnv - If true, a trusted session is activated, allowing you to bypass Certificate Authorities (CAs) enforcement. For more information, see About Your API Access Policy. If this is enabled, it is required that you and all your users log in to Cockpit v2 using the WebAuthn method for multi-factor authentication. For more information, see About Authentication > Multi-Factor Authentication.
- id string
- max
Access numberKey Expiration Seconds - The maximum possible lifetime for your access keys, in seconds. If
0
, your access keys can have unlimited lifetimes. - request
Id string - require
Trusted booleanEnv - If true, a trusted session is activated, allowing you to bypass Certificate Authorities (CAs) enforcement. For more information, see About Your API Access Policy. If this is enabled, it is required that you and all your users log in to Cockpit v2 using the WebAuthn method for multi-factor authentication. For more information, see About Authentication > Multi-Factor Authentication.
- id str
- max_
access_ floatkey_ expiration_ seconds - The maximum possible lifetime for your access keys, in seconds. If
0
, your access keys can have unlimited lifetimes. - request_
id str - require_
trusted_ boolenv - If true, a trusted session is activated, allowing you to bypass Certificate Authorities (CAs) enforcement. For more information, see About Your API Access Policy. If this is enabled, it is required that you and all your users log in to Cockpit v2 using the WebAuthn method for multi-factor authentication. For more information, see About Authentication > Multi-Factor Authentication.
- id String
- max
Access NumberKey Expiration Seconds - The maximum possible lifetime for your access keys, in seconds. If
0
, your access keys can have unlimited lifetimes. - request
Id String - require
Trusted BooleanEnv - If true, a trusted session is activated, allowing you to bypass Certificate Authorities (CAs) enforcement. For more information, see About Your API Access Policy. If this is enabled, it is required that you and all your users log in to Cockpit v2 using the WebAuthn method for multi-factor authentication. For more information, see About Authentication > Multi-Factor Authentication.
Package Details
- Repository
- outscale outscale/terraform-provider-outscale
- License
- Notes
- This Pulumi package is based on the
outscale
Terraform Provider.