Skip to content

Commit 8d427d7

Browse files
committed
chore: upgrade provider
1 parent 2483267 commit 8d427d7

File tree

157 files changed

+60498
-42886
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

157 files changed

+60498
-42886
lines changed

API.md

Lines changed: 55446 additions & 42729 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

package.json

Lines changed: 1 addition & 1 deletion
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

src/ad-secret-backend/index.ts

Lines changed: 25 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,6 +74,12 @@ export interface AdSecretBackendConfig extends cdktf.TerraformMetaArguments {
7474
*/
7575
readonly description?: string;
7676
/**
77+
* If set, opts out of mount migration on path updates.
78+
*
79+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/ad_secret_backend#disable_remount AdSecretBackend#disable_remount}
80+
*/
81+
readonly disableRemount?: boolean | cdktf.IResolvable;
82+
/**
7783
* Use anonymous bind to discover the bind DN of a user.
7884
*
7985
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/ad_secret_backend#discoverdn AdSecretBackend#discoverdn}
@@ -252,7 +258,7 @@ export class AdSecretBackend extends cdktf.TerraformResource {
252258
terraformResourceType: 'vault_ad_secret_backend',
253259
terraformGeneratorMetadata: {
254260
providerName: 'vault',
255-
providerVersion: '3.8.2',
261+
providerVersion: '3.9.0',
256262
providerVersionConstraint: '~> 3.7'
257263
},
258264
provider: config.provider,
@@ -274,6 +280,7 @@ export class AdSecretBackend extends cdktf.TerraformResource {
274280
this._defaultLeaseTtlSeconds = config.defaultLeaseTtlSeconds;
275281
this._denyNullBind = config.denyNullBind;
276282
this._description = config.description;
283+
this._disableRemount = config.disableRemount;
277284
this._discoverdn = config.discoverdn;
278285
this._formatter = config.formatter;
279286
this._groupattr = config.groupattr;
@@ -475,6 +482,22 @@ export class AdSecretBackend extends cdktf.TerraformResource {
475482
return this._description;
476483
}
477484

485+
// disable_remount - computed: false, optional: true, required: false
486+
private _disableRemount?: boolean | cdktf.IResolvable;
487+
public get disableRemount() {
488+
return this.getBooleanAttribute('disable_remount');
489+
}
490+
public set disableRemount(value: boolean | cdktf.IResolvable) {
491+
this._disableRemount = value;
492+
}
493+
public resetDisableRemount() {
494+
this._disableRemount = undefined;
495+
}
496+
// Temporarily expose input value. Use with caution.
497+
public get disableRemountInput() {
498+
return this._disableRemount;
499+
}
500+
478501
// discoverdn - computed: false, optional: true, required: false
479502
private _discoverdn?: boolean | cdktf.IResolvable;
480503
public get discoverdn() {
@@ -892,6 +915,7 @@ export class AdSecretBackend extends cdktf.TerraformResource {
892915
default_lease_ttl_seconds: cdktf.numberToTerraform(this._defaultLeaseTtlSeconds),
893916
deny_null_bind: cdktf.booleanToTerraform(this._denyNullBind),
894917
description: cdktf.stringToTerraform(this._description),
918+
disable_remount: cdktf.booleanToTerraform(this._disableRemount),
895919
discoverdn: cdktf.booleanToTerraform(this._discoverdn),
896920
formatter: cdktf.stringToTerraform(this._formatter),
897921
groupattr: cdktf.stringToTerraform(this._groupattr),

src/ad-secret-library/index.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ export class AdSecretLibrary extends cdktf.TerraformResource {
8484
terraformResourceType: 'vault_ad_secret_library',
8585
terraformGeneratorMetadata: {
8686
providerName: 'vault',
87-
providerVersion: '3.8.2',
87+
providerVersion: '3.9.0',
8888
providerVersionConstraint: '~> 3.7'
8989
},
9090
provider: config.provider,

src/ad-secret-role/index.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ export class AdSecretRole extends cdktf.TerraformResource {
7272
terraformResourceType: 'vault_ad_secret_role',
7373
terraformGeneratorMetadata: {
7474
providerName: 'vault',
75-
providerVersion: '3.8.2',
75+
providerVersion: '3.9.0',
7676
providerVersionConstraint: '~> 3.7'
7777
},
7878
provider: config.provider,

src/alicloud-auth-backend-role/index.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -120,7 +120,7 @@ export class AlicloudAuthBackendRole extends cdktf.TerraformResource {
120120
terraformResourceType: 'vault_alicloud_auth_backend_role',
121121
terraformGeneratorMetadata: {
122122
providerName: 'vault',
123-
providerVersion: '3.8.2',
123+
providerVersion: '3.9.0',
124124
providerVersionConstraint: '~> 3.7'
125125
},
126126
provider: config.provider,

src/approle-auth-backend-login/index.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ export class ApproleAuthBackendLogin extends cdktf.TerraformResource {
6666
terraformResourceType: 'vault_approle_auth_backend_login',
6767
terraformGeneratorMetadata: {
6868
providerName: 'vault',
69-
providerVersion: '3.8.2',
69+
providerVersion: '3.9.0',
7070
providerVersionConstraint: '~> 3.7'
7171
},
7272
provider: config.provider,

src/approle-auth-backend-role-secret-id/index.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,7 @@ export class ApproleAuthBackendRoleSecretId extends cdktf.TerraformResource {
9090
terraformResourceType: 'vault_approle_auth_backend_role_secret_id',
9191
terraformGeneratorMetadata: {
9292
providerName: 'vault',
93-
providerVersion: '3.8.2',
93+
providerVersion: '3.9.0',
9494
providerVersionConstraint: '~> 3.7'
9595
},
9696
provider: config.provider,

src/approle-auth-backend-role/index.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -144,7 +144,7 @@ export class ApproleAuthBackendRole extends cdktf.TerraformResource {
144144
terraformResourceType: 'vault_approle_auth_backend_role',
145145
terraformGeneratorMetadata: {
146146
providerName: 'vault',
147-
providerVersion: '3.8.2',
147+
providerVersion: '3.9.0',
148148
providerVersionConstraint: '~> 3.7'
149149
},
150150
provider: config.provider,

src/audit/index.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ export class Audit extends cdktf.TerraformResource {
7878
terraformResourceType: 'vault_audit',
7979
terraformGeneratorMetadata: {
8080
providerName: 'vault',
81-
providerVersion: '3.8.2',
81+
providerVersion: '3.9.0',
8282
providerVersionConstraint: '~> 3.7'
8383
},
8484
provider: config.provider,

src/auth-backend/index.ts

Lines changed: 25 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,12 @@ export interface AuthBackendConfig extends cdktf.TerraformMetaArguments {
1414
*/
1515
readonly description?: string;
1616
/**
17+
* If set, opts out of mount migration on path updates.
18+
*
19+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/auth_backend#disable_remount AuthBackend#disable_remount}
20+
*/
21+
readonly disableRemount?: boolean | cdktf.IResolvable;
22+
/**
1723
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/auth_backend#id AuthBackend#id}
1824
*
1925
* Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
@@ -362,7 +368,7 @@ export class AuthBackend extends cdktf.TerraformResource {
362368
terraformResourceType: 'vault_auth_backend',
363369
terraformGeneratorMetadata: {
364370
providerName: 'vault',
365-
providerVersion: '3.8.2',
371+
providerVersion: '3.9.0',
366372
providerVersionConstraint: '~> 3.7'
367373
},
368374
provider: config.provider,
@@ -374,6 +380,7 @@ export class AuthBackend extends cdktf.TerraformResource {
374380
forEach: config.forEach
375381
});
376382
this._description = config.description;
383+
this._disableRemount = config.disableRemount;
377384
this._id = config.id;
378385
this._local = config.local;
379386
this._namespace = config.namespace;
@@ -407,6 +414,22 @@ export class AuthBackend extends cdktf.TerraformResource {
407414
return this._description;
408415
}
409416

417+
// disable_remount - computed: false, optional: true, required: false
418+
private _disableRemount?: boolean | cdktf.IResolvable;
419+
public get disableRemount() {
420+
return this.getBooleanAttribute('disable_remount');
421+
}
422+
public set disableRemount(value: boolean | cdktf.IResolvable) {
423+
this._disableRemount = value;
424+
}
425+
public resetDisableRemount() {
426+
this._disableRemount = undefined;
427+
}
428+
// Temporarily expose input value. Use with caution.
429+
public get disableRemountInput() {
430+
return this._disableRemount;
431+
}
432+
410433
// id - computed: true, optional: true, required: false
411434
private _id?: string;
412435
public get id() {
@@ -507,6 +530,7 @@ export class AuthBackend extends cdktf.TerraformResource {
507530
protected synthesizeAttributes(): { [name: string]: any } {
508531
return {
509532
description: cdktf.stringToTerraform(this._description),
533+
disable_remount: cdktf.booleanToTerraform(this._disableRemount),
510534
id: cdktf.stringToTerraform(this._id),
511535
local: cdktf.booleanToTerraform(this._local),
512536
namespace: cdktf.stringToTerraform(this._namespace),

src/aws-auth-backend-cert/index.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ export class AwsAuthBackendCert extends cdktf.TerraformResource {
7272
terraformResourceType: 'vault_aws_auth_backend_cert',
7373
terraformGeneratorMetadata: {
7474
providerName: 'vault',
75-
providerVersion: '3.8.2',
75+
providerVersion: '3.9.0',
7676
providerVersionConstraint: '~> 3.7'
7777
},
7878
provider: config.provider,

src/aws-auth-backend-client/index.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,7 @@ export class AwsAuthBackendClient extends cdktf.TerraformResource {
9696
terraformResourceType: 'vault_aws_auth_backend_client',
9797
terraformGeneratorMetadata: {
9898
providerName: 'vault',
99-
providerVersion: '3.8.2',
99+
providerVersion: '3.9.0',
100100
providerVersionConstraint: '~> 3.7'
101101
},
102102
provider: config.provider,

src/aws-auth-backend-identity-whitelist/index.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ export class AwsAuthBackendIdentityWhitelist extends cdktf.TerraformResource {
6666
terraformResourceType: 'vault_aws_auth_backend_identity_whitelist',
6767
terraformGeneratorMetadata: {
6868
providerName: 'vault',
69-
providerVersion: '3.8.2',
69+
providerVersion: '3.9.0',
7070
providerVersionConstraint: '~> 3.7'
7171
},
7272
provider: config.provider,

src/aws-auth-backend-login/index.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,7 @@ export class AwsAuthBackendLogin extends cdktf.TerraformResource {
108108
terraformResourceType: 'vault_aws_auth_backend_login',
109109
terraformGeneratorMetadata: {
110110
providerName: 'vault',
111-
providerVersion: '3.8.2',
111+
providerVersion: '3.9.0',
112112
providerVersionConstraint: '~> 3.7'
113113
},
114114
provider: config.provider,

src/aws-auth-backend-role-tag/index.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,7 @@ export class AwsAuthBackendRoleTag extends cdktf.TerraformResource {
9090
terraformResourceType: 'vault_aws_auth_backend_role_tag',
9191
terraformGeneratorMetadata: {
9292
providerName: 'vault',
93-
providerVersion: '3.8.2',
93+
providerVersion: '3.9.0',
9494
providerVersionConstraint: '~> 3.7'
9595
},
9696
provider: config.provider,

src/aws-auth-backend-role/index.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -210,7 +210,7 @@ export class AwsAuthBackendRole extends cdktf.TerraformResource {
210210
terraformResourceType: 'vault_aws_auth_backend_role',
211211
terraformGeneratorMetadata: {
212212
providerName: 'vault',
213-
providerVersion: '3.8.2',
213+
providerVersion: '3.9.0',
214214
providerVersionConstraint: '~> 3.7'
215215
},
216216
provider: config.provider,

src/aws-auth-backend-roletag-blacklist/index.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ export class AwsAuthBackendRoletagBlacklist extends cdktf.TerraformResource {
6666
terraformResourceType: 'vault_aws_auth_backend_roletag_blacklist',
6767
terraformGeneratorMetadata: {
6868
providerName: 'vault',
69-
providerVersion: '3.8.2',
69+
providerVersion: '3.9.0',
7070
providerVersionConstraint: '~> 3.7'
7171
},
7272
provider: config.provider,

src/aws-auth-backend-sts-role/index.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ export class AwsAuthBackendStsRole extends cdktf.TerraformResource {
6666
terraformResourceType: 'vault_aws_auth_backend_sts_role',
6767
terraformGeneratorMetadata: {
6868
providerName: 'vault',
69-
providerVersion: '3.8.2',
69+
providerVersion: '3.9.0',
7070
providerVersionConstraint: '~> 3.7'
7171
},
7272
provider: config.provider,

src/aws-secret-backend-role/index.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,7 @@ export class AwsSecretBackendRole extends cdktf.TerraformResource {
114114
terraformResourceType: 'vault_aws_secret_backend_role',
115115
terraformGeneratorMetadata: {
116116
providerName: 'vault',
117-
providerVersion: '3.8.2',
117+
providerVersion: '3.9.0',
118118
providerVersionConstraint: '~> 3.7'
119119
},
120120
provider: config.provider,

src/aws-secret-backend/index.ts

Lines changed: 25 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,12 @@ export interface AwsSecretBackendConfig extends cdktf.TerraformMetaArguments {
2626
*/
2727
readonly description?: string;
2828
/**
29+
* If set, opts out of mount migration on path updates.
30+
*
31+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/aws_secret_backend#disable_remount AwsSecretBackend#disable_remount}
32+
*/
33+
readonly disableRemount?: boolean | cdktf.IResolvable;
34+
/**
2935
* Specifies a custom HTTP IAM endpoint to use.
3036
*
3137
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/aws_secret_backend#iam_endpoint AwsSecretBackend#iam_endpoint}
@@ -108,7 +114,7 @@ export class AwsSecretBackend extends cdktf.TerraformResource {
108114
terraformResourceType: 'vault_aws_secret_backend',
109115
terraformGeneratorMetadata: {
110116
providerName: 'vault',
111-
providerVersion: '3.8.2',
117+
providerVersion: '3.9.0',
112118
providerVersionConstraint: '~> 3.7'
113119
},
114120
provider: config.provider,
@@ -122,6 +128,7 @@ export class AwsSecretBackend extends cdktf.TerraformResource {
122128
this._accessKey = config.accessKey;
123129
this._defaultLeaseTtlSeconds = config.defaultLeaseTtlSeconds;
124130
this._description = config.description;
131+
this._disableRemount = config.disableRemount;
125132
this._iamEndpoint = config.iamEndpoint;
126133
this._id = config.id;
127134
this._maxLeaseTtlSeconds = config.maxLeaseTtlSeconds;
@@ -185,6 +192,22 @@ export class AwsSecretBackend extends cdktf.TerraformResource {
185192
return this._description;
186193
}
187194

195+
// disable_remount - computed: false, optional: true, required: false
196+
private _disableRemount?: boolean | cdktf.IResolvable;
197+
public get disableRemount() {
198+
return this.getBooleanAttribute('disable_remount');
199+
}
200+
public set disableRemount(value: boolean | cdktf.IResolvable) {
201+
this._disableRemount = value;
202+
}
203+
public resetDisableRemount() {
204+
this._disableRemount = undefined;
205+
}
206+
// Temporarily expose input value. Use with caution.
207+
public get disableRemountInput() {
208+
return this._disableRemount;
209+
}
210+
188211
// iam_endpoint - computed: false, optional: true, required: false
189212
private _iamEndpoint?: string;
190213
public get iamEndpoint() {
@@ -338,6 +361,7 @@ export class AwsSecretBackend extends cdktf.TerraformResource {
338361
access_key: cdktf.stringToTerraform(this._accessKey),
339362
default_lease_ttl_seconds: cdktf.numberToTerraform(this._defaultLeaseTtlSeconds),
340363
description: cdktf.stringToTerraform(this._description),
364+
disable_remount: cdktf.booleanToTerraform(this._disableRemount),
341365
iam_endpoint: cdktf.stringToTerraform(this._iamEndpoint),
342366
id: cdktf.stringToTerraform(this._id),
343367
max_lease_ttl_seconds: cdktf.numberToTerraform(this._maxLeaseTtlSeconds),

src/azure-auth-backend-config/index.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ export class AzureAuthBackendConfig extends cdktf.TerraformResource {
8484
terraformResourceType: 'vault_azure_auth_backend_config',
8585
terraformGeneratorMetadata: {
8686
providerName: 'vault',
87-
providerVersion: '3.8.2',
87+
providerVersion: '3.9.0',
8888
providerVersionConstraint: '~> 3.7'
8989
},
9090
provider: config.provider,

src/azure-auth-backend-role/index.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -150,7 +150,7 @@ export class AzureAuthBackendRole extends cdktf.TerraformResource {
150150
terraformResourceType: 'vault_azure_auth_backend_role',
151151
terraformGeneratorMetadata: {
152152
providerName: 'vault',
153-
providerVersion: '3.8.2',
153+
providerVersion: '3.9.0',
154154
providerVersionConstraint: '~> 3.7'
155155
},
156156
provider: config.provider,

0 commit comments

Comments
 (0)