Skip to content

Commit

Permalink
Merge pull request #126 from cdktf/auto/provider-upgrade
Browse files Browse the repository at this point in the history
  • Loading branch information
team-tf-cdk authored Oct 6, 2022
2 parents 2483267 + 8d427d7 commit 0814cc5
Show file tree
Hide file tree
Showing 157 changed files with 60,498 additions and 42,886 deletions.
98,175 changes: 55,446 additions & 42,729 deletions API.md

Large diffs are not rendered by default.

2 changes: 1 addition & 1 deletion package.json

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

26 changes: 25 additions & 1 deletion src/ad-secret-backend/index.ts
Original file line number Diff line number Diff line change
Expand Up @@ -74,6 +74,12 @@ export interface AdSecretBackendConfig extends cdktf.TerraformMetaArguments {
*/
readonly description?: string;
/**
* If set, opts out of mount migration on path updates.
*
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/ad_secret_backend#disable_remount AdSecretBackend#disable_remount}
*/
readonly disableRemount?: boolean | cdktf.IResolvable;
/**
* Use anonymous bind to discover the bind DN of a user.
*
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/ad_secret_backend#discoverdn AdSecretBackend#discoverdn}
Expand Down Expand Up @@ -252,7 +258,7 @@ export class AdSecretBackend extends cdktf.TerraformResource {
terraformResourceType: 'vault_ad_secret_backend',
terraformGeneratorMetadata: {
providerName: 'vault',
providerVersion: '3.8.2',
providerVersion: '3.9.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
Expand All @@ -274,6 +280,7 @@ export class AdSecretBackend extends cdktf.TerraformResource {
this._defaultLeaseTtlSeconds = config.defaultLeaseTtlSeconds;
this._denyNullBind = config.denyNullBind;
this._description = config.description;
this._disableRemount = config.disableRemount;
this._discoverdn = config.discoverdn;
this._formatter = config.formatter;
this._groupattr = config.groupattr;
Expand Down Expand Up @@ -475,6 +482,22 @@ export class AdSecretBackend extends cdktf.TerraformResource {
return this._description;
}

// disable_remount - computed: false, optional: true, required: false
private _disableRemount?: boolean | cdktf.IResolvable;
public get disableRemount() {
return this.getBooleanAttribute('disable_remount');
}
public set disableRemount(value: boolean | cdktf.IResolvable) {
this._disableRemount = value;
}
public resetDisableRemount() {
this._disableRemount = undefined;
}
// Temporarily expose input value. Use with caution.
public get disableRemountInput() {
return this._disableRemount;
}

// discoverdn - computed: false, optional: true, required: false
private _discoverdn?: boolean | cdktf.IResolvable;
public get discoverdn() {
Expand Down Expand Up @@ -892,6 +915,7 @@ export class AdSecretBackend extends cdktf.TerraformResource {
default_lease_ttl_seconds: cdktf.numberToTerraform(this._defaultLeaseTtlSeconds),
deny_null_bind: cdktf.booleanToTerraform(this._denyNullBind),
description: cdktf.stringToTerraform(this._description),
disable_remount: cdktf.booleanToTerraform(this._disableRemount),
discoverdn: cdktf.booleanToTerraform(this._discoverdn),
formatter: cdktf.stringToTerraform(this._formatter),
groupattr: cdktf.stringToTerraform(this._groupattr),
Expand Down
2 changes: 1 addition & 1 deletion src/ad-secret-library/index.ts
Original file line number Diff line number Diff line change
Expand Up @@ -84,7 +84,7 @@ export class AdSecretLibrary extends cdktf.TerraformResource {
terraformResourceType: 'vault_ad_secret_library',
terraformGeneratorMetadata: {
providerName: 'vault',
providerVersion: '3.8.2',
providerVersion: '3.9.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
Expand Down
2 changes: 1 addition & 1 deletion src/ad-secret-role/index.ts
Original file line number Diff line number Diff line change
Expand Up @@ -72,7 +72,7 @@ export class AdSecretRole extends cdktf.TerraformResource {
terraformResourceType: 'vault_ad_secret_role',
terraformGeneratorMetadata: {
providerName: 'vault',
providerVersion: '3.8.2',
providerVersion: '3.9.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
Expand Down
2 changes: 1 addition & 1 deletion src/alicloud-auth-backend-role/index.ts
Original file line number Diff line number Diff line change
Expand Up @@ -120,7 +120,7 @@ export class AlicloudAuthBackendRole extends cdktf.TerraformResource {
terraformResourceType: 'vault_alicloud_auth_backend_role',
terraformGeneratorMetadata: {
providerName: 'vault',
providerVersion: '3.8.2',
providerVersion: '3.9.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
Expand Down
2 changes: 1 addition & 1 deletion src/approle-auth-backend-login/index.ts
Original file line number Diff line number Diff line change
Expand Up @@ -66,7 +66,7 @@ export class ApproleAuthBackendLogin extends cdktf.TerraformResource {
terraformResourceType: 'vault_approle_auth_backend_login',
terraformGeneratorMetadata: {
providerName: 'vault',
providerVersion: '3.8.2',
providerVersion: '3.9.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
Expand Down
2 changes: 1 addition & 1 deletion src/approle-auth-backend-role-secret-id/index.ts
Original file line number Diff line number Diff line change
Expand Up @@ -90,7 +90,7 @@ export class ApproleAuthBackendRoleSecretId extends cdktf.TerraformResource {
terraformResourceType: 'vault_approle_auth_backend_role_secret_id',
terraformGeneratorMetadata: {
providerName: 'vault',
providerVersion: '3.8.2',
providerVersion: '3.9.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
Expand Down
2 changes: 1 addition & 1 deletion src/approle-auth-backend-role/index.ts
Original file line number Diff line number Diff line change
Expand Up @@ -144,7 +144,7 @@ export class ApproleAuthBackendRole extends cdktf.TerraformResource {
terraformResourceType: 'vault_approle_auth_backend_role',
terraformGeneratorMetadata: {
providerName: 'vault',
providerVersion: '3.8.2',
providerVersion: '3.9.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
Expand Down
2 changes: 1 addition & 1 deletion src/audit/index.ts
Original file line number Diff line number Diff line change
Expand Up @@ -78,7 +78,7 @@ export class Audit extends cdktf.TerraformResource {
terraformResourceType: 'vault_audit',
terraformGeneratorMetadata: {
providerName: 'vault',
providerVersion: '3.8.2',
providerVersion: '3.9.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
Expand Down
26 changes: 25 additions & 1 deletion src/auth-backend/index.ts
Original file line number Diff line number Diff line change
Expand Up @@ -14,6 +14,12 @@ export interface AuthBackendConfig extends cdktf.TerraformMetaArguments {
*/
readonly description?: string;
/**
* If set, opts out of mount migration on path updates.
*
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/auth_backend#disable_remount AuthBackend#disable_remount}
*/
readonly disableRemount?: boolean | cdktf.IResolvable;
/**
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/auth_backend#id AuthBackend#id}
*
* Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
Expand Down Expand Up @@ -362,7 +368,7 @@ export class AuthBackend extends cdktf.TerraformResource {
terraformResourceType: 'vault_auth_backend',
terraformGeneratorMetadata: {
providerName: 'vault',
providerVersion: '3.8.2',
providerVersion: '3.9.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
Expand All @@ -374,6 +380,7 @@ export class AuthBackend extends cdktf.TerraformResource {
forEach: config.forEach
});
this._description = config.description;
this._disableRemount = config.disableRemount;
this._id = config.id;
this._local = config.local;
this._namespace = config.namespace;
Expand Down Expand Up @@ -407,6 +414,22 @@ export class AuthBackend extends cdktf.TerraformResource {
return this._description;
}

// disable_remount - computed: false, optional: true, required: false
private _disableRemount?: boolean | cdktf.IResolvable;
public get disableRemount() {
return this.getBooleanAttribute('disable_remount');
}
public set disableRemount(value: boolean | cdktf.IResolvable) {
this._disableRemount = value;
}
public resetDisableRemount() {
this._disableRemount = undefined;
}
// Temporarily expose input value. Use with caution.
public get disableRemountInput() {
return this._disableRemount;
}

// id - computed: true, optional: true, required: false
private _id?: string;
public get id() {
Expand Down Expand Up @@ -507,6 +530,7 @@ export class AuthBackend extends cdktf.TerraformResource {
protected synthesizeAttributes(): { [name: string]: any } {
return {
description: cdktf.stringToTerraform(this._description),
disable_remount: cdktf.booleanToTerraform(this._disableRemount),
id: cdktf.stringToTerraform(this._id),
local: cdktf.booleanToTerraform(this._local),
namespace: cdktf.stringToTerraform(this._namespace),
Expand Down
2 changes: 1 addition & 1 deletion src/aws-auth-backend-cert/index.ts
Original file line number Diff line number Diff line change
Expand Up @@ -72,7 +72,7 @@ export class AwsAuthBackendCert extends cdktf.TerraformResource {
terraformResourceType: 'vault_aws_auth_backend_cert',
terraformGeneratorMetadata: {
providerName: 'vault',
providerVersion: '3.8.2',
providerVersion: '3.9.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
Expand Down
2 changes: 1 addition & 1 deletion src/aws-auth-backend-client/index.ts
Original file line number Diff line number Diff line change
Expand Up @@ -96,7 +96,7 @@ export class AwsAuthBackendClient extends cdktf.TerraformResource {
terraformResourceType: 'vault_aws_auth_backend_client',
terraformGeneratorMetadata: {
providerName: 'vault',
providerVersion: '3.8.2',
providerVersion: '3.9.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
Expand Down
2 changes: 1 addition & 1 deletion src/aws-auth-backend-identity-whitelist/index.ts
Original file line number Diff line number Diff line change
Expand Up @@ -66,7 +66,7 @@ export class AwsAuthBackendIdentityWhitelist extends cdktf.TerraformResource {
terraformResourceType: 'vault_aws_auth_backend_identity_whitelist',
terraformGeneratorMetadata: {
providerName: 'vault',
providerVersion: '3.8.2',
providerVersion: '3.9.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
Expand Down
2 changes: 1 addition & 1 deletion src/aws-auth-backend-login/index.ts
Original file line number Diff line number Diff line change
Expand Up @@ -108,7 +108,7 @@ export class AwsAuthBackendLogin extends cdktf.TerraformResource {
terraformResourceType: 'vault_aws_auth_backend_login',
terraformGeneratorMetadata: {
providerName: 'vault',
providerVersion: '3.8.2',
providerVersion: '3.9.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
Expand Down
2 changes: 1 addition & 1 deletion src/aws-auth-backend-role-tag/index.ts
Original file line number Diff line number Diff line change
Expand Up @@ -90,7 +90,7 @@ export class AwsAuthBackendRoleTag extends cdktf.TerraformResource {
terraformResourceType: 'vault_aws_auth_backend_role_tag',
terraformGeneratorMetadata: {
providerName: 'vault',
providerVersion: '3.8.2',
providerVersion: '3.9.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
Expand Down
2 changes: 1 addition & 1 deletion src/aws-auth-backend-role/index.ts
Original file line number Diff line number Diff line change
Expand Up @@ -210,7 +210,7 @@ export class AwsAuthBackendRole extends cdktf.TerraformResource {
terraformResourceType: 'vault_aws_auth_backend_role',
terraformGeneratorMetadata: {
providerName: 'vault',
providerVersion: '3.8.2',
providerVersion: '3.9.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
Expand Down
2 changes: 1 addition & 1 deletion src/aws-auth-backend-roletag-blacklist/index.ts
Original file line number Diff line number Diff line change
Expand Up @@ -66,7 +66,7 @@ export class AwsAuthBackendRoletagBlacklist extends cdktf.TerraformResource {
terraformResourceType: 'vault_aws_auth_backend_roletag_blacklist',
terraformGeneratorMetadata: {
providerName: 'vault',
providerVersion: '3.8.2',
providerVersion: '3.9.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
Expand Down
2 changes: 1 addition & 1 deletion src/aws-auth-backend-sts-role/index.ts
Original file line number Diff line number Diff line change
Expand Up @@ -66,7 +66,7 @@ export class AwsAuthBackendStsRole extends cdktf.TerraformResource {
terraformResourceType: 'vault_aws_auth_backend_sts_role',
terraformGeneratorMetadata: {
providerName: 'vault',
providerVersion: '3.8.2',
providerVersion: '3.9.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
Expand Down
2 changes: 1 addition & 1 deletion src/aws-secret-backend-role/index.ts
Original file line number Diff line number Diff line change
Expand Up @@ -114,7 +114,7 @@ export class AwsSecretBackendRole extends cdktf.TerraformResource {
terraformResourceType: 'vault_aws_secret_backend_role',
terraformGeneratorMetadata: {
providerName: 'vault',
providerVersion: '3.8.2',
providerVersion: '3.9.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
Expand Down
26 changes: 25 additions & 1 deletion src/aws-secret-backend/index.ts
Original file line number Diff line number Diff line change
Expand Up @@ -26,6 +26,12 @@ export interface AwsSecretBackendConfig extends cdktf.TerraformMetaArguments {
*/
readonly description?: string;
/**
* If set, opts out of mount migration on path updates.
*
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/aws_secret_backend#disable_remount AwsSecretBackend#disable_remount}
*/
readonly disableRemount?: boolean | cdktf.IResolvable;
/**
* Specifies a custom HTTP IAM endpoint to use.
*
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/aws_secret_backend#iam_endpoint AwsSecretBackend#iam_endpoint}
Expand Down Expand Up @@ -108,7 +114,7 @@ export class AwsSecretBackend extends cdktf.TerraformResource {
terraformResourceType: 'vault_aws_secret_backend',
terraformGeneratorMetadata: {
providerName: 'vault',
providerVersion: '3.8.2',
providerVersion: '3.9.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
Expand All @@ -122,6 +128,7 @@ export class AwsSecretBackend extends cdktf.TerraformResource {
this._accessKey = config.accessKey;
this._defaultLeaseTtlSeconds = config.defaultLeaseTtlSeconds;
this._description = config.description;
this._disableRemount = config.disableRemount;
this._iamEndpoint = config.iamEndpoint;
this._id = config.id;
this._maxLeaseTtlSeconds = config.maxLeaseTtlSeconds;
Expand Down Expand Up @@ -185,6 +192,22 @@ export class AwsSecretBackend extends cdktf.TerraformResource {
return this._description;
}

// disable_remount - computed: false, optional: true, required: false
private _disableRemount?: boolean | cdktf.IResolvable;
public get disableRemount() {
return this.getBooleanAttribute('disable_remount');
}
public set disableRemount(value: boolean | cdktf.IResolvable) {
this._disableRemount = value;
}
public resetDisableRemount() {
this._disableRemount = undefined;
}
// Temporarily expose input value. Use with caution.
public get disableRemountInput() {
return this._disableRemount;
}

// iam_endpoint - computed: false, optional: true, required: false
private _iamEndpoint?: string;
public get iamEndpoint() {
Expand Down Expand Up @@ -338,6 +361,7 @@ export class AwsSecretBackend extends cdktf.TerraformResource {
access_key: cdktf.stringToTerraform(this._accessKey),
default_lease_ttl_seconds: cdktf.numberToTerraform(this._defaultLeaseTtlSeconds),
description: cdktf.stringToTerraform(this._description),
disable_remount: cdktf.booleanToTerraform(this._disableRemount),
iam_endpoint: cdktf.stringToTerraform(this._iamEndpoint),
id: cdktf.stringToTerraform(this._id),
max_lease_ttl_seconds: cdktf.numberToTerraform(this._maxLeaseTtlSeconds),
Expand Down
2 changes: 1 addition & 1 deletion src/azure-auth-backend-config/index.ts
Original file line number Diff line number Diff line change
Expand Up @@ -84,7 +84,7 @@ export class AzureAuthBackendConfig extends cdktf.TerraformResource {
terraformResourceType: 'vault_azure_auth_backend_config',
terraformGeneratorMetadata: {
providerName: 'vault',
providerVersion: '3.8.2',
providerVersion: '3.9.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
Expand Down
2 changes: 1 addition & 1 deletion src/azure-auth-backend-role/index.ts
Original file line number Diff line number Diff line change
Expand Up @@ -150,7 +150,7 @@ export class AzureAuthBackendRole extends cdktf.TerraformResource {
terraformResourceType: 'vault_azure_auth_backend_role',
terraformGeneratorMetadata: {
providerName: 'vault',
providerVersion: '3.8.2',
providerVersion: '3.9.0',
providerVersionConstraint: '~> 3.7'
},
provider: config.provider,
Expand Down
Loading

0 comments on commit 0814cc5

Please sign in to comment.